The Ultimate Guide to Cybersecurity
2024 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports
Enterprise Management Associates on SIEM
Exabeam, LogRhythm merge to form AI-driven security gia...
2 days ago
Gartner on Cloud Services
Radware launches DNSaaS & NoKey to boost cloud services
2 days ago
IDC on Smartphones
BlackBerry launches CylanceMDR Pro to tackle cyber thre...
Last week
Gartner on Advanced Persistent Threat Protection
Report reveals global struggles in vulnerability respon...
This month
FMI on Robots
Industry 4.0 market to surge from USD $93.6bn to USD $5...
This month
Featured news
About Customer service
Exclusive: Rimini Street's approach to financial suppor...
4 days ago
About EduTech
Exclusive: Why creating phishing-resistant users is key...
This month
About Women in Technology
Exclusive: InfoTrack's Global CTO on innovation and wom...
This month
About Cloud Services
Exclusive: DigiCert's CEO emphasises quantum readiness
Last month
About Software-as-a-Service
Exclusive: How Katana is supporting Paralympics New Zea...
Last month
About Managed Services
Exclusive: How SonicWall is staying ahead of cyber thre...
Fri, 24th May 2024
About Investment
Exclusive: How Cado Security continues to innovate
Tue, 21st May 2024
About Business Intelligence
Exclusive: How Teradata is supporting the Australian Go...
Tue, 14th May 2024
About Government
Exclusive: How AvePoint is tackling complex data manage...
Fri, 10th May 2024
About Passwords
Exclusive: Insights from Yubico on World Password Day
Wed, 1st May 2024
Expert columns
By Sajeeb Lohani of Bugcrowd
Unlocking the ingenuity of the crowd: Winning the war o...
Today
By Micah Heaton of BlueVoyant
Three ways CISOs can use Microsoft Copilot for security...
Yesterday
By Ilan Rubin of Wavelink
The truth about SD-WAN and how it can support businesse...
3 days ago
By Craig Searle of Trustwave
Understanding and defending against the dangers of usin...
3 days ago
By Eva Abergel of Radware
How to neutralise a web DDoS tsunami attack
Last week
Interviews
Discussing Customer service
Exclusive: Rimini Street's approach to financial suppor...
4 days ago
Discussing EduTech
Exclusive: Why creating phishing-resistant users is key...
This month
Discussing Women in Technology
Exclusive: InfoTrack's Global CTO on innovation and wom...
This month
Discussing Cloud Services
Exclusive: DigiCert's CEO emphasises quantum readiness
Last month
Discussing Software-as-a-Service
Exclusive: How Katana is supporting Paralympics New Zea...
Last month
More expert columns
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Last week
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
This month
By Padmakumar Nair of Ennoventure
AI innovations in crafting unbreakable anti-counterfeit...
This month
By Greg Wiseman of Rapid7
Patch Tuesday has revealed 139 vulnerabilities
This month
By Jayden Soh of StarHub
Safeguarding businesses against deepfake threats to emp...
This month
By Nam Lam of Sailpoint
Celebrating win-win-win-win relationships in business
This month
Top players
You can read more from the top players Fortinet, Kaspersky, Vested, Trend Micro, and Check Point Software.
Recent news
About Smartphones
Security advocate backs Australia's social media ban fo...
2 days ago
About Antivirus
Enhanced cybersecurity measures urged by Software@Scale
3 days ago
About Firewalls
AI solutions from Zyxel Networks boost manufacturing ef...
3 days ago
About Digital Transformation
Life sciences firms face rising cyber threats amid AI o...
3 days ago
About Spam
Kaspersky highlights the critical role of phone numbers...
3 days ago
More expert columns
By Nam Lam of Sailpoint
Celebrating win-win-win-win relationships in business
This month
By Chris Fisher of Vectra AI
Getting the balance right between business innovation, ...
This month
By Mina Mousa of Extreme Networks
Adapting cybersecurity strategies to the escalating thr...
This month
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Last month
By Ian Thornton-Trump of Cyjax
The new way international politics could affect your li...
Last month
By Grant Wild of Wild Tech
How the midmarket can maximise the success of their AI ...
Last month
Video interviews
Discussing Cloud Services
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023
Discussing Cyber attacks
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023
Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023
Discussing Cloud Services
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023
Discussing Printing
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns
By Grant Wild of Wild Tech
How the midmarket can maximise the success of their AI ...
Last month
By Matias Madou of Secure Code Warrior
How AI can help developers boost the security of new co...
Last month
By Matt Caffrey of Barracuda Networks
The six big challenges facing Australian MSPs in 2024
Last month
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
By Manish Naik of IMS Nucleii
Addressing the IT skills gap in the UK
Last month
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Last month
By Abdul Khader Aslam of Equinix
Protecting data centres against emerging cybersecurity ...
Last month
By Les Williamson of Check Point Software Technologies
The challenges in maintaining effective cybersecurity
Last month
By Audra Simons of Everfox
Fighting back against the growing threat of ransomware
Last month
By Adam Barnett of Rapid7
Patch Tuesday has revealed 51 vulnerabilities
Last month
More news
About Cloud Services
Westcon-Comstor partners with AppViewX to boost quantum...
3 days ago
About Malware
Dragos uncovers new malware FrostyGoop targeting ICS sy...
4 days ago
About Data Protection
Konica Minolta report reveals 2024 Australian IT trends
4 days ago
About Software-as-a-Service
CyberGrape partners with MyCISO to enhance security ser...
4 days ago
About Business Continuity
Ignition & ExtraHop join forces to boost UK cyber defen...
4 days ago
Even more news
About Encryption
Ransomware recovery costs soar in energy & water sector...
4 days ago
About Telemarketing
Freelance computer security & writing skills surge in Q...
4 days ago
About Bring Your Own Device
Fortinet reveals rising cyber threats targeting Paris 2...
Last week
About Public Sector
Armis achieves Australian IRAP Protected level certific...
Last week
About Storage
Acronis True Image returns with enhanced cybersecurity ...
Last week
Job moves
Move at BlackFog
BlackFog announces new leadership to drive growth & inn...
Yesterday
Move at Sophos
Sophos appoints Teresa Anania as new Chief Customer Off...
4 days ago
Move at Trend Micro
Trend Micro appoints Chris Zamagias to lead ANZ partner...
4 days ago
Move at UK Government
Intelliworx promotes Johnson to lead client operations ...
Last week
Move at Trend Micro
Alchemy CyberDefence appoints Ben Ross as Managing Dire...
Last week
Other guides
You can read other related guides from Breach Prevention, Firewalls, Artificial Intelligence, Risk & Compliance, and Network Infrastructure.
Powered by