The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

Canalys on AWS
CrowdStrike receives multiple honours at 2023 AWS Partn...
Yesterday

Frost & Sullivan on Apps
Absolute Software unveils Application Health for enhanc...
Last month

Forrester Research on PAM
Forrester names CyberArk a privileged identity manageme...
Fri, 13th Oct 2023

Canalys on Managed Services
Business reliance on IT managed services increases in 2...
Thu, 28th Sep 2023

Forrester Research on IT Infrastructure
Check Point a leader in zero trust platform providers: ...
Fri, 22nd Sep 2023
Featured news

About Barracuda
Bad bots make up 30% of internet traffic and they’re af...
Last month

About Ebooks
Cybersecurity: The big lessons from APRA’s stocktake
Mon, 9th Oct 2023

About Barracuda
How OT/IT security gaps threaten industrial transformat...
Mon, 2nd Oct 2023

About IT Training
The rise of CISO stress: Recognising and reconciling th...
Fri, 22nd Sep 2023

About Canon
How do the Zero Trust principles apply to printing?
Tue, 19th Sep 2023
Expert columns

By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Yesterday

By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
2 days ago

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
3 days ago

By Vivek Ramachandran of SquareX
The quest for email privacy in a world full of trackers
4 days ago
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last week
Interviews

Discussing Gartner
Exclusive: Synopsys and the evolution of robust securit...
Last week

Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Tue, 17th Oct 2023

Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023

Discussing Machine learning
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023

Discussing Communications
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
More expert columns

By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Last week

By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Last week

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last week

By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Last week

By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Last week

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month
Top players
You can read more from the top players Fortinet, Gartner, Kaspersky, Trend Micro, and Check Point Software.
Recent news

About WatchGuard Technologies
WatchGuard unveils cybersecurity threats predicted for ...
Yesterday

About Productivity
UK businesses regret two-thirds of recent software purc...
Yesterday

About Sophos
Cybercriminals wary of AI usage in operations – Sophos
Yesterday

About Robotics
Maximising AI potential depends on efficient underlying...
Yesterday

About CrowdStrike
CrowdStrike expands operations with new hub in Singapor...
2 days ago
More expert columns

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month

By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Last month

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
Last month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
Last month

By Garett Paton of Dell Technologies
GenAI is transformative, but there are also security ri...
Tue, 31st Oct 2023

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023
Video interviews

Discussing Mobile threats
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023

Discussing Acronis
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023

Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023

Discussing Commvault
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023

Discussing Ricoh
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023

By Jennifer Cheng of Proofpoint
Female representation in cybersecurity leadership roles...
Mon, 30th Oct 2023

By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Thu, 26th Oct 2023

By Graham Hawkey of Osirium
How stronger endpoint control protects systems and data
Thu, 26th Oct 2023

By Etuate Cocker of Fortinet
Is it wise to put all your security solutions in one cy...
Wed, 25th Oct 2023

By Chris Barton of Absolute Software
Now is the time for self-healing systems in healthcare
Wed, 25th Oct 2023

By James Nielson of OPSWAT
A cyber resilience guide to securing critical infrastru...
Tue, 24th Oct 2023

By Mark Jones of Tesserent
Data is not gold – it's uranium so handle with care
Mon, 23rd Oct 2023

By Lena Fuks of Aqua Security
Five misconfigurations threatening your AWS environment...
Fri, 20th Oct 2023

By Ilan Rubin of Wavelink
Four steps organisations can take to improve cybersecur...
Thu, 19th Oct 2023
More news

About DigiCert
DigiCert forecasts digital trust trends for APAC in 202...
2 days ago

About Milestone Systems
Gallagher Security promotes federated identity at Welli...
3 days ago

About NCSC
UK and South Korea warn of cyber threats from North Kor...
3 days ago

About SonicWALL
SonicWall expands services with acquisition of Solution...
3 days ago

About Resellers
Infinigate outlines 2024 ICT industry trends & opportun...
3 days ago
Even more news

About Barracuda
Predicting 2024's cybersecurity threats: insights from ...
3 days ago

About Scams
KnowBe4 offers top cybersecurity tips for a safe 2023 h...
3 days ago

About Qualys
Exclusive: Qualys' risk-based approach to cybersecurity
4 days ago

About Barracuda
A reality check on email security threats in healthcare
4 days ago

About Nintex
Exclusive: Eight vendor AI security predictions for 202...
4 days ago
Other guides
You can read other related guides from Breach Prevention, Artificial Intelligence, Network Management, Network Security, and Firewall.
Powered by