The Ultimate Guide to Cybersecurity
2024 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports
Gartner Peer Insights on Firewalls
WatchGuard wins TrustRadius awards for cybersecurity
Last week
Gartner on Firewalls
NTT DATA & Palo Alto Networks launch new MXDR service
Last month
Gartner on Firewalls
Fortinet launches AI-powered data loss prevention solut...
Last month
Juniper Research on Firewalls
Satellite IoT revenue to reach USD $5.8 billion by 2027
Last month
Gartner on Firewalls
NTT DATA & Palo Alto partner on cybersecurity service
Last month
Featured news
About Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
About Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
About Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Last month
About Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
Last month
About EduTech
Exclusive: Australians express rising concern over AI i...
Last month
About Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last month
About Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Last month
About Network Infrastructure
Exclusive: Ericsson’s Nathan McGregor outlines wireless...
Last month
About Software Updates
Exclusive: AUS 3C report reveals how different generati...
Tue, 1st Oct 2024
About Social Media
Exclusive: Yubico finds majority still using outdated m...
Thu, 26th Sep 2024
About Digital Transformation
Exclusive: Lumify Group's CEO highlights expansion in A...
Tue, 24th Sep 2024
About Leadership
Titan of Tech - Jason Oeltjen of Ping Identity
Tue, 17th Sep 2024
About Cloud Services
Exclusive: Bugcrowd's Nick McKenzie discusses the evolv...
Thu, 5th Sep 2024
About Women in Technology
Women in Cyber: Jill Macmurchy talks resilience and div...
Wed, 4th Sep 2024
About Security breaches
Titans of Tech - Pieter Danhieux of Secure Code Warrior
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Gigamon CEO highlights importance of deep ob...
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Yubico's Geoff Schomburgk discusses future o...
Fri, 23rd Aug 2024
About Sustainability
Exclusive: Greenbox's CEO discusses e-waste, AI, and fu...
Fri, 23rd Aug 2024
About Cloud Services
Exclusive: Cohesity's Greg Statton discusses the key to...
Tue, 20th Aug 2024
Expert columns
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Today
By Geoff Schomburgk of Yubico
Clarifying perceptions related to passkeys and MFA
Yesterday
By Adam Barnett of Rapid7
November Patch Tuesday reveals 90 vulnerabilities
Yesterday
By Thomas Fikentscher of CyberArk
Platform consolidation key to cybersecurity success
Yesterday
By Andrew Wilson of Senetas
Preparing for the quantum era: Safeguarding Australia a...
3 days ago
Interviews
Discussing Digital Transformation
CyberArk highlights new security threats at Impact Worl...
Last month
Discussing Firewalls
Okta's redrawing its cybersecurity boundaries, says CSO
Last month
Discussing Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Last month
Discussing Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
Last month
Discussing EduTech
Exclusive: Australians express rising concern over AI i...
Last month
More expert columns
By Aaron Sharp of Verizon
How data breaches erode trust and what companies can do
Last week
By Mark Thomas of Arctic Wolf
Threat actors increasingly strike out of hours, forcing...
Last week
By Heng Mok of Zscaler
Enterprise data and Generative AI: Safeguarding innovat...
Last week
By Matthew Pines of SentinelOne
The security challenges posed by increasing use of gene...
Last week
By COSBOA
Join the fight against cyber crime: Enrol in Cyber Ward...
Last week
By Sam Salehi of Qualys
Navigating the evolving landscape of cyber risk managem...
This month
Top players
Recent news
About Near Field Communication
Yubico launches Yubico Enrollment Suite for enterprises
Today
About Identity Theft
Experts urge vigilance against growing digital fraud ri...
Today
About Cloud Security
Cloud security critical as AI adoption set to soar in 2...
Today
About Machine learning
Vectra AI enhances platform with 40 new Azure detection...
Today
About Collaboration
iSANZ Awards honour New Zealand's cybersecurity leaders
Today
More news
About Firewalls
Claroty finds vulnerabilities in OvrC platform affectin...
Yesterday
About Customer Experience
Kaseya predicts a technology boom for MSPs and SMBs
Yesterday
About Enterprise security
Yubico launches YubiKey Bio Series for enhanced securit...
Yesterday
About Smart Cities
Device Authority's KSaaS surpasses 11m global authentic...
Yesterday
About Public Sector
Trustwave & Cybereason announce cybersecurity merger
Yesterday
Even more news
About Malware
Mouse motion simulators pose potential cyberthreat risk
Yesterday
About Botnet
Androxgh0st botnet expands with Mozi IoT capabilities
Yesterday
About Malware
Kaspersky aids INTERPOL in disrupting global cybercrime
Yesterday
About Software-as-a-Service
AppOmni partners with Cisco for SaaS zero trust securit...
Yesterday
About Data Analytics
DXC Technology boosts global STEM education initiatives
Yesterday
Job moves
Move at Deloitte
Coalition expands Australian team with cyber experts
Last week
Move at Microsoft
Genetec appoints Dale Simons as Account Executive for V...
Last week
Move at Google
Bugcrowd appoints Trey Ford & reveals new services
Last week
Move at OpenText
EasyDMARC appoints Allan Richards to boost global MSP g...
Last month
Move at PayPal
DigiCert appoints Lakshmi Hanspal as Chief Trust Office...
Last month
Other guides
You can read other related guides from Breach Prevention, Firewalls, Artificial Intelligence, Risk & Compliance, and Network Infrastructure.
Powered by