The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

Frost & Sullivan on Apps
Absolute Software unveils Application Health for enhanc...
This month

Forrester Research on PAM
Forrester names CyberArk a privileged identity manageme...
Last month

Canalys on Managed Services
Business reliance on IT managed services increases in 2...
Thu, 28th Sep 2023

Forrester Research on IT Infrastructure
Check Point a leader in zero trust platform providers: ...
Fri, 22nd Sep 2023

Forrester Research on ML
Versa named a leader in zero trust edge solutions by Fo...
Fri, 18th Aug 2023
Featured news

About Barracuda
Bad bots make up 30% of internet traffic and they’re af...
This month

About Ebooks
Cybersecurity: The big lessons from APRA’s stocktake
Last month

About Barracuda
How OT/IT security gaps threaten industrial transformat...
Last month

About IT Training
The rise of CISO stress: Recognising and reconciling th...
Fri, 22nd Sep 2023

About Canon
How do the Zero Trust principles apply to printing?
Tue, 19th Sep 2023
Expert columns

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Today

By Vivek Ramachandran of SquareX
The quest for email privacy in a world full of trackers
Yesterday
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last week

By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Last week

By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Last week
Interviews

Discussing Gartner
Exclusive: Synopsys and the evolution of robust securit...
Last week

Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Last month

Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023

Discussing Machine learning
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023

Discussing Communications
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
More expert columns

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last week

By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Last week

By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Last week

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
This month

By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
This month

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
This month
Top players
You can read more from the top players Fortinet, Gartner, Kaspersky, Trend Micro, and Check Point Software.
Recent news

About Barracuda
Predicting 2024's cybersecurity threats: insights from ...
Today

About Scams
KnowBe4 offers top cybersecurity tips for a safe 2023 h...
Today

About Qualys
Exclusive: Qualys' risk-based approach to cybersecurity
Yesterday

About Barracuda
A reality check on email security threats in healthcare
Yesterday

About Nintex
Exclusive: Eight vendor AI security predictions for 202...
Yesterday
More expert columns

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
This month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
This month

By Garett Paton of Dell Technologies
GenAI is transformative, but there are also security ri...
Last month

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Last month

By Jennifer Cheng of Proofpoint
Female representation in cybersecurity leadership roles...
Last month

By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Last month
Video interviews

Discussing Mobile threats
Video: 10 Minute IT Jams - An update from Appdome with ...
Last month

Discussing Acronis
Video: 10 Minute IT Jams - An update from Acronis with ...
Last month

Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Last month

Discussing Commvault
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023

Discussing Ricoh
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns

By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Last month

By Graham Hawkey of Osirium
How stronger endpoint control protects systems and data
Last month

By Etuate Cocker of Fortinet
Is it wise to put all your security solutions in one cy...
Last month

By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Last month

By James Nielson of OPSWAT
A cyber resilience guide to securing critical infrastru...
Last month

By Mark Jones of Tesserent
Data is not gold – it's uranium so handle with care
Last month

By Lena Fuks of Aqua Security
Five misconfigurations threatening your AWS environment...
Last month

By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Last month

By Robin Long of Rapid7
Increase cyber effectiveness and innovation through ope...
Last month

By Prakash Sinha of Radware
How application security reinforces an identity-as-a-pe...
Last month
More news

About Yubico
Rising cybersecurity threats prompt shift from traditio...
Yesterday

About Communications
SpeQtral & Toshiba extend partnership to build Singapor...
Yesterday

About Kaspersky
Employees breaching security policies equal threat to c...
Last week

About EMEA
Infinigate adds Bugcrowd to portfolio to boost cybersec...
Last week

About Qualys
Qualys launches advanced TruRisk Platform for agile cyb...
Last week
Even more news

About SailPoint
Navigating the complexities of cybersecurity in a SaaS-...
Last week

About WatchGuard Technologies
Video: 10 Minute IT Jams - An update from WatchGuard Te...
Last week

About VirusTotal
Google Cloud unveils cybersecurity predictions for 2024...
Last week

About Innovation
UK cybersecurity startup Intruder features in Deloitte'...
Last week

About OpenText
Australian businesses downplay cyber threat despite ris...
Last week
Other guides
You can read other related guides from Breach Prevention, Artificial Intelligence, Network Management, Network Security, and Firewall.
Powered by