The Ultimate Guide to Cybersecurity
2024 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports
Gartner on Data Protection
Australia's information security spending forecast to e...
Today
IoT Analytics on IoT
IoT market projected to grow 17% annually till 2030, re...
Last week
IDC MarketScape on Cyber Threats
Sophos leads in IDC MarketScape's cybersecurity assessm...
Last week
Miercom on Cyber Threats
Check Point's Infinity Platform crowned leading Zero Tr...
Last week
Gartner on Dyslexia
IWD 2024: Celebrating Women and Neurodiverse Individual...
This month
Featured news
About Privileged Access Management
Exclusive: How Okta is fortifying digital identities
Last week
About Data management
Exclusive: Nutanix enters an exciting phase as enterpri...
This month
About Cyber Threats
Exclusive: Aura sheds insights on the state of cybersec...
This month
About Data Protection
Exclusive: Why Commvault's focused on cyber resilience
This month
About Digital Transformation
Exclusive: Tenable highlights the importance of a compa...
Last month
About Public Sector
Exclusive: Why Elastic continues to see positive moment...
Last month
About Insurance
Exclusive: The BlueVoyant philosophy driving success
Last month
About Cloud Services
Exclusive: How Amdocs is powering CSPs in the B2B telec...
Last month
About CIOs
Exclusive: Claroty's cybersecurity evolution in ANZ dig...
Last month
About Endpoint Protection
ManageEngine Endpoint Central: Revolutionising endpoint...
Mon, 15th Jan 2024
About Software-as-a-Service
Exclusive: What sets Exabeam apart from the competition
Mon, 15th Jan 2024
About Cyber Threats
Exclusive: How DigiCert is preparing for a post-quantum...
Fri, 22nd Dec 2023
Expert columns
By Mary Mangione of Yubico
How AI and cybersecurity is shaping the 2024 election l...
Yesterday
By George Moawad of Genetec
Ensuring security without compromising privacy
Yesterday
By George Moawad of Genetec
AI in physical security: Opportunities, risks, and resp...
Last week
By George Moawad of Genetec
A proactive approach to cyber and physical security
Last week
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Last week
Interviews
Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Tue, 17th Oct 2023
Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023
Discussing Network Infrastructure
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023
Discussing Bring Your Own Device
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
Discussing CIOs
Exclusive: Why blueAPACHE chose to partner with CyberAr...
Fri, 23rd Jun 2023
More expert columns
By Saba Hasan of PureSquare
IWD 2024: Let's create a secure digital world for women...
This month
By Kavitha Mariappan of Zscaler
IWD 2024: Advancing inclusivity - Women leaders coding ...
This month
By Deepa Kuppuswamy of ManageEngine
IWD 2024: A mentor mindset: The next generation of wome...
This month
By Michelle Accardi of Liongard
IWD 2024: My journey breaking barriers and leading in c...
This month
By Tracey Cotter-Martin of Datacom
IWD 2024: Why real equity needs to be the goal in emerg...
This month
By Lisa Tetrault of Arctic Wolf
IWD 2024: Cybersecurity is stronger with diversity
This month
Top players
You can read more from the top players Fortinet, Kaspersky, Trend Micro, Check Point Software, and Palo Alto Networks.
Recent news
About Threat intelligence
CrowdStrike & NVIDIA team up for AI-powered cybersecuri...
Today
About Cybercrime
Quorum Cyber shines in Microsoft Security Excellence Aw...
Today
About Cloud Security
Zscaler boosts AI capabilities with cybersecurity start...
Today
About Threat intelligence
Big move for Google Cloud with launch of Security Comma...
Yesterday
About Virtualisation
Qrypt to provide quantum-secure encryption for Nvidia's...
Yesterday
More expert columns
By Lisa Tetrault of Arctic Wolf
IWD 2024: Cybersecurity is stronger with diversity
This month
By Jessie Jamieson of Tenable
IWD 2024: Moving past quotas: Inclusivity & neurodivers...
This month
By Melissa Cantell of Aon New Zealand
IWD 2024: The big risk of too few women in Aotearoa's t...
This month
By Sarah Danzl of Skillable
IWD 2024: Building a more equitable leadership pipeline
This month
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
This month
By Elly Beal of Pentest People
IWD 2024: Mentorship, diversity, and effective communic...
This month
Video interviews
Discussing Cloud Services
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023
Discussing Cyber attacks
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023
Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023
Discussing Cloud Services
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023
Discussing Printing
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns
By Elly Beal of Pentest People
IWD 2024: Mentorship, diversity, and effective communic...
This month
By Yvonne Eskenzi of Eskenzi PR
IWD 2024: Active allyship: Making cyber a place for all
This month
By Teresa Matos of Mindera
IWD 2024: Expert security insight from within the gamin...
This month
By Camilla Currrin of Trend Micro
IWD 2024: Better together: why the UK’s tech sector nee...
This month
By Barb Huelskamp of Qualys
IWD 2024: Empowering women in tech - Lessons in support...
This month
By Jane Ng of ESET
IWD 2024: Championing women in STEM and cybersecurity: ...
This month
By Jo Stewart-Rattray of ISACA
IWD 2024: Championing women in cybersecurity every step...
This month
By Sarah Cleveland of ExtraHop
IWD 2024: How genuine inclusiveness let me shine in US ...
This month
By Minya Vasili of Exclusive Networks
IWD 2024: Gearing up for next-gen female leaders in cyb...
This month
By Amanda Levine of Tufin
IWD 2024: Balancing a successful high-tech career with ...
This month
More news
About Telecommunications
Kordia CEO Shaun Rendell steps down for health reasons
Last week
About Developers
TCG & OST2 launch TPM security training for software de...
Last week
About Software-as-a-Service
Cado Security boosts platform with SaaS environment sup...
Last week
About Cyber Threats
UK wind energy firms lack sufficient cybersecurity, war...
Last week
About Privacy
Leaked secrets on GitHub rose by 28% in 2023, report re...
Last week
Even more news
About Identity Theft
London startup Mindgard launches tool mitigating AI dat...
Last week
About Malware
Australia ranks high in global malware detection rates,...
Last week
About Small Business
Sophos 2024 report reveals top cybersecurity threats to...
Last week
About Research and Development
Innovate UK hosts cyber security demo for top industry ...
Last week
About Data Protection
Cloudflare launches Defensive AI for threat protection
Last week
Job moves
Move at HSBC
James Berry named new APAC managing director at Diversi...
This month
Move at Penetration testing
Major coup for Mindgard with new VP from cybersecurity ...
This month
Move at WatchGuard Technologies
WatchGuard appoints Zayed Alji as new Partner Manager i...
Last month
Move at Acronis
Acronis appoints Kelly Johnson as General Manager for A...
Last month
Move at LogRhythm
LogRhythm appoints Mazen Dohaji as GM & VP for new META...
Last month
Other guides
You can read other related guides from Breach Prevention, Firewall, Cloud Services, Artificial Intelligence, and Network Management.
Powered by