The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

FMI on Data Analytics
Process instrumentation market to be US$38 billion by 2...
Last week

Gartner on CX
ExtraHop earns customers’ choice distinction in Gartner...
Last week

FMI on Big Data
Digital health market to be USD $2.586 trillion by 2032...
Last week

ADAPT on Data breach
Cybersecurity funding to surge this financial year: Ada...
Last week

FMI on Firewall
Demand for advanced security driving Firewall as a Serv...
Last month
Reviews

Gaming
Invite-only panel reviews Australia's Security of Criti...
Tue, 29th Nov 2022

Norton
Hands-on review: Norton Identity Advisor Plus
Fri, 11th Nov 2022

Google
Hands-on review: Yubikey 5C NFC
Thu, 22nd Sep 2022

CrowdStrike
Hands-on intrusion attempts up 50% year-over-year - rep...
Wed, 14th Sep 2022
Expert columns

By Tosin Vaithilingam of BitTitan
Seven ways to avoid those data migration nightmares
Yesterday

By Jack Misiura of The Missing Link
Input Validation and the problems with Sanitisation
Last week

By Andrew Kay of Illumio
What do you need to do to raise your cyber resilience?
Last week

By Shani Czyzyk of Radware
How threat intelligence can improve DDoS protection
Last month

By Bogdan Botezatu of Bitdefender
Take the Password Pledge and secure the digital you
Last month
Interviews

Discussing NetApp
Exclusive: NetApp ready to defend with new ransomware g...
Last month

Discussing Network visibility
Exclusive: Nozomi Networks provides cyber visibility
Fri, 10th Mar 2023

Discussing CyberArk
Exclusive: CyberArk highlights the importance of identi...
Thu, 1st Dec 2022

Discussing Data Protection
Exclusive: Trustwave strengthens cybersecurity as threa...
Fri, 2nd Sep 2022

Discussing Contact Centre
How protected are migrants and refugees from cybercrime...
Wed, 31st Aug 2022
More expert columns

By Jason Whyte of Trustwave
Five reasons why a career in cybersecurity is worth pur...
Last month

By Louis Tague of Mandiant
Staying ahead of the changing threat landscape in 2023
Last month

By Jennifer Cheng of Proofpoint
The APJ Threat Landscape -Why Employees Might Be Your B...
Last month

By Ilan Rubin of Wavelink
The need to create a strong cyber response framework
Last month

By Jen Locklear of ConnectWise
How To Overcome the IT Skills Gap With Upskilling
Last month

By Pieter Danhieux of Secure Code Warrior
Australia is turning a corner on security-by-design
Last month
Top players
You can read more from the top players Fortinet, Kaspersky, Trend Micro, Palo Alto Networks, and Symantec.
Recent news

About KnowBe4
Top risky security behaviours of employees revealed
Yesterday

About Ransomware
Salvador Technology announces expanded channel partner ...
Yesterday

About Thales
Thales unveils CipherTrust Data Security Platform as-a-...
Yesterday

About Fortinet
A cyber-aware workforce critical to strong security pos...
Yesterday

About Verizon
Ransomware, social engineering costs skyrocket – report
Yesterday
More expert columns

By Pieter Danhieux of Secure Code Warrior
Australia is turning a corner on security-by-design
Last month

By Clarence Dent of WalkMe
Protect Your Employees From Becoming A ‘Single Point of...
Last month

By Andrew Solovay of TechLoot
The high cost of the cybersecurity skills gap: Why we n...
Last month

By Rob Dooley of Rapid7
Building resilience in a persistently elevated threat c...
Last month

By Dan Daniels of Gigamon
What exactly is hybrid cloud – the advantages and disad...
Last month

By Thomas Naylor of The Missing Link
Four reasons to train your employees in cybersecurity i...
Last month
Video interviews

Discussing Passwords
Video: 10 Minute IT Jams - An update from Okta
Last month

Discussing Secureworks
Video: 10 Minute IT Jams - An update from Secureworks
Wed, 19th Apr 2023

Discussing Data breach
Video: 10 Minute IT Jams - An update from Varonis
Wed, 12th Apr 2023

Discussing Data Protection
Video: 10 Minute IT Jams - An update from Cequence Secu...
Fri, 24th Mar 2023

Discussing Tanium
Video: 10 Minute IT Jams - The latest from Tanium
Thu, 23rd Mar 2023
Even more expert columns

By Thomas Naylor of The Missing Link
Four reasons to train your employees in cybersecurity i...
Last month

By Alice Kalambokas of Infosys Consulting
Managing cybersecurity risk in a transformational lands...
Last month

By Ted Garner of Konica Minolta
The often-overlooked cybersecurity risk: unsecured prin...
Last month

By Rajeevan Kanagasabai of Ribbon Communications ANZ
Helping to win the battle to curb SMS and voice fraud
Last month

By Ilan Rubin of Wavelink
Why securing digital assets is critical for businesses
Fri, 28th Apr 2023

By Tim Wallen of Logpoint
Why SAP systems are a worrying security blind spot
Fri, 21st Apr 2023

By Mark Lukie of Barracuda APAC
You’ve dealt with the ransomware, how come it’s back?
Thu, 20th Apr 2023

By Amir Jerbi of Aqua Security
The truth revealed - agentless security is not real sec...
Wed, 19th Apr 2023

By Rob Dooley of Rapid7
What am I walking into? How to prepare for your first C...
Wed, 19th Apr 2023

By Matias Madou of Secure Code Warrior
Why achieving API best practice requires a security ret...
Thu, 13th Apr 2023
More news

About Small Business
ConnectWise announces updates and big wins at recent co...
Yesterday

About Duo
DUO appointed distributor for Silverfort in New Zealand
Yesterday

About CISOs
Nuspire unveils where CISOs are spending security budge...
Yesterday

About Apple
Apple unveils new and updated privacy and security feat...
Yesterday

About Strategy
Australian enterprises prioritise the Essential Eight
3 days ago
Even more news

About Ransomware
Secureworks unveils an integrated MDR solution for OT a...
Last week

About Barracuda
Aussie MSPs expect revenue growth despite economy press...
Last week

About Amazon Web Services
Salt Security attains AWS security competency status
Last week

About Amazon Web Services
Netskope Intelligent SSE integrates with Amazon Securit...
Last week

About CrowdStrike
CrowdStrike teams up with AWS to safeguard AI in the cl...
Last week
Other guides
You can read other related guides from Breach Prevention, Network Management, Artificial Intelligence, Network Security, and Firewall.
Powered by