The Ultimate Guide to Cybersecurity
2024 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports
Gartner on Firewalls
Radware introduces AI SOC Xpert for enhanced security
Today
Gartner on Data Analytics
Neo4j surpasses USD $200m ARR, eyes further AI growth
Today
Gartner Peer Insights on Firewalls
WatchGuard wins TrustRadius awards for cybersecurity
This month
Gartner on Firewalls
NTT DATA & Palo Alto Networks launch new MXDR service
Last month
Gartner on Firewalls
Fortinet launches AI-powered data loss prevention solut...
Last month
Featured news
About Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
About Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
About Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Last month
About Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
Last month
About EduTech
Exclusive: Australians express rising concern over AI i...
Last month
About Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last month
About Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Last month
About Network Infrastructure
Exclusive: Ericsson’s Nathan McGregor outlines wireless...
Last month
About Software Updates
Exclusive: AUS 3C report reveals how different generati...
Tue, 1st Oct 2024
About Social Media
Exclusive: Yubico finds majority still using outdated m...
Thu, 26th Sep 2024
About Digital Transformation
Exclusive: Lumify Group's CEO highlights expansion in A...
Tue, 24th Sep 2024
About Leadership
Titan of Tech - Jason Oeltjen of Ping Identity
Tue, 17th Sep 2024
About Cloud Services
Exclusive: Bugcrowd's Nick McKenzie discusses the evolv...
Thu, 5th Sep 2024
About Women in Technology
Women in Cyber: Jill Macmurchy talks resilience and div...
Wed, 4th Sep 2024
About Security breaches
Titans of Tech - Pieter Danhieux of Secure Code Warrior
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Gigamon CEO highlights importance of deep ob...
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Yubico's Geoff Schomburgk discusses future o...
Fri, 23rd Aug 2024
About Sustainability
Exclusive: Greenbox's CEO discusses e-waste, AI, and fu...
Fri, 23rd Aug 2024
Expert columns
By Troy Ridgewell of Versent
VPNs are falling short: Why it’s time to move to Zero T...
2 days ago
By Dr Martin J. Kraemer of KnowBe4
Social media ban to put TikTok security concerns under ...
Last week
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last week
By Geoff Schomburgk of Yubico
Clarifying perceptions related to passkeys and MFA
Last week
By Adam Barnett of Rapid7
November Patch Tuesday reveals 90 vulnerabilities
Last week
Interviews
Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
Discussing Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Last month
Discussing Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
Last month
Discussing EduTech
Exclusive: Australians express rising concern over AI i...
Last month
More expert columns
By Thomas Fikentscher of CyberArk
Platform consolidation key to cybersecurity success
Last week
By Andrew Wilson of Senetas
Preparing for the quantum era: Safeguarding Australia a...
Last week
By Aaron Sharp of Verizon
How data breaches erode trust and what companies can do
This month
By Mark Thomas of Arctic Wolf
Threat actors increasingly strike out of hours, forcing...
This month
By Heng Mok of Zscaler
Enterprise data and Generative AI: Safeguarding innovat...
This month
By Matthew Pines of SentinelOne
The security challenges posed by increasing use of gene...
This month
Top players
Recent news
About Digital Transformation
Palo Alto Networks honours New Zealand partners' succes...
Today
About Data Protection
SMBiT joins DSI to help develop SMB cybersecurity stand...
Today
About Threat intelligence
Surge in financial phishing attacks in Southeast Asia
Today
About Digitisation
AI-driven fraud & deepfakes pose escalating global thre...
Today
About Cloud Security
Exabeam partners with Wiz to boost cloud security detec...
Today
More news
About Collaboration
Exabeam & Wiz partner to boost cloud security solutions
Today
About Dark web
Accenture expands AI cybersecurity services & workforce
Today
About Software-as-a-Service
Igel & Zscaler team up to enhance remote work security
Today
About Ransomware
Akamai enhances Guardicore for AWS with agentless suppo...
Today
About Ransomware
AI's growing impact on cybersecurity threat & defence
Today
Even more news
About Collaboration
AuditBoard study reveals internal audit struggles in 20...
Today
About Collaboration
GitHub launches AUD $1.91m fund for open source securit...
Today
About Unified Communications
Dell partners with Intel to boost AI in telecom sector
Today
About Malware
Critical needrestart vulnerabilities found in Ubuntu Se...
Today
About Threat intelligence
Arctic Wolf launches new threat intelligence module upd...
Today
Job moves
Move at Proofpoint
Proofpoint appoints JP Yu to lead operations in SAK reg...
2 days ago
Move at Secureworks
Todd Chronert named new Chief Revenue Officer at Red Ca...
2 days ago
Move at Deloitte
Coalition expands Australian team with cyber experts
This month
Move at Microsoft
Genetec appoints Dale Simons as Account Executive for V...
This month
Move at Google
Bugcrowd appoints Trey Ford & reveals new services
This month
Other guides
You can read other related guides from Breach Prevention, Firewalls, Artificial Intelligence, Risk & Compliance, and Advanced Persistent Threat Protection.
Powered by