The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

Canalys on AWS
CrowdStrike receives multiple honours at 2023 AWS Partn...
Last week

Frost & Sullivan on Apps
Absolute Software unveils Application Health for enhanc...
Last month

Forrester Research on PAM
Forrester names CyberArk a privileged identity manageme...
Fri, 13th Oct 2023

Canalys on Managed Services
Business reliance on IT managed services increases in 2...
Thu, 28th Sep 2023

Forrester Research on IT Infrastructure
Check Point a leader in zero trust platform providers: ...
Fri, 22nd Sep 2023
Featured news

About Barracuda
Bad bots make up 30% of internet traffic and they’re af...
Last month

About Ebooks
Cybersecurity: The big lessons from APRA’s stocktake
Mon, 9th Oct 2023

About Barracuda
How OT/IT security gaps threaten industrial transformat...
Mon, 2nd Oct 2023

About IT Training
The rise of CISO stress: Recognising and reconciling th...
Fri, 22nd Sep 2023

About Canon
How do the Zero Trust principles apply to printing?
Tue, 19th Sep 2023
Expert columns

By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Last week

By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Last week

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Last week

By Vivek Ramachandran of SquareX
The quest for email privacy in a world full of trackers
Last week
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last month
Interviews

Discussing Gartner
Exclusive: Synopsys and the evolution of robust securit...
Last month

Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Tue, 17th Oct 2023

Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023

Discussing Machine learning
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023

Discussing Communications
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
More expert columns

By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Last month

By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Last month

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last month

By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Last month

By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Last month

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month
Top players
You can read more from the top players Fortinet, Gartner, Kaspersky, Trend Micro, and Check Point Software.
Recent news

About Managed Services
Exclusive: Why WithSecure continues to expand and evolv...
Today

About Hackers
DerScanner introduces Supply Chain Security to protect ...
Last week

About Jamf
ArtificiaI Intelligence and Cybersecurity: The Bad and ...
Last week

About Versent
Australian tech sector struggles with balancing data se...
Last week

About Software
Military cyber security market to reach $7.2 billion by...
Last week
More expert columns

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month

By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Last month

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
Last month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
Last month

By Garett Paton of Dell Technologies
GenAI is transformative, but there are also security ri...
Tue, 31st Oct 2023

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023
Video interviews

Discussing Mobile threats
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023

Discussing Acronis
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023

Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023

Discussing Commvault
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023

Discussing Ricoh
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023

By Jennifer Cheng of Proofpoint
Female representation in cybersecurity leadership roles...
Mon, 30th Oct 2023

By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Thu, 26th Oct 2023

By Graham Hawkey of Osirium
How stronger endpoint control protects systems and data
Thu, 26th Oct 2023

By Etuate Cocker of Fortinet
Is it wise to put all your security solutions in one cy...
Wed, 25th Oct 2023

By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Wed, 25th Oct 2023

By James Nielson of OPSWAT
A cyber resilience guide to securing critical infrastru...
Tue, 24th Oct 2023

By Mark Jones of Tesserent
Data is not gold – it's uranium so handle with care
Mon, 23rd Oct 2023

By Lena Fuks of Aqua Security
Five misconfigurations threatening your AWS environment...
Fri, 20th Oct 2023

By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Thu, 19th Oct 2023
More news

About IT Training
CybeReady & Securus360 join forces to boost cybersecuri...
Last week

About Hackers
Eagers Automotive partners with SentinelOne to boost cy...
Last week

About ABB
ABB research reveals potential for broad IIoT adoption ...
Last week

About Microsoft 365
Egress launches AI-driven solution to combat 'Graymail'...
Last week

About Venafi
Venafi forecasts rise of '1000x developer' & hacker thr...
Last week
Even more news

About WatchGuard Technologies
WatchGuard unveils cybersecurity threats predicted for ...
Last week

About Productivity
UK businesses regret two-thirds of recent software purc...
Last week

About Sophos
Cybercriminals wary of AI usage in operations – Sophos
Last week

About Robotics
Maximising AI potential depends on efficient underlying...
Last week

About CrowdStrike
CrowdStrike expands operations with new hub in Singapor...
Last week
Other guides
You can read other related guides from Breach Prevention, Artificial Intelligence, Network Management, Network Security, and Firewall.
Powered by