The Ultimate Guide to Cybersecurity
2024 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports
Gartner on Storage
Scality named Visionary in 2024 Gartner Magic Quadrant
Yesterday
Gartner on Digital Transformation
BeyondTrust named leader in 2024 KuppingerCole PAM repo...
Last week
Gartner on Firewalls
Browser Detection and Response: Challenging Gartner’s p...
Last week
Gartner on Digital Transformation
Intelliworx partners with Humanity Health for IT servic...
Last week
IDC MarketScape on Firewalls
Sophos named leader in IDC MarketScape 2024 for MDR ser...
Last month
Featured news
About Shadow IT
Okta's redrawing its cybersecurity boundaries, says CSO
Today
About Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Yesterday
About Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
2 days ago
About EduTech
Exclusive: Australians express rising concern over AI i...
2 days ago
About Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last week
About Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Last week
About Network Infrastructure
Exclusive: Ericsson’s Nathan McGregor outlines wireless...
This month
About Software Updates
Exclusive: AUS 3C report reveals how different generati...
Last month
About Social Media
Exclusive: Yubico finds majority still using outdated m...
Last month
About Digital Transformation
Exclusive: Lumify Group's CEO highlights expansion in A...
Last month
About Leadership
Titan of Tech - Jason Oeltjen of Ping Identity
Last month
About Cloud Services
Exclusive: Bugcrowd's Nick McKenzie discusses the evolv...
Last month
About Women in Technology
Women in Cyber: Jill Macmurchy talks resilience and div...
Last month
About Security breaches
Titans of Tech - Pieter Danhieux of Secure Code Warrior
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Gigamon CEO highlights importance of deep ob...
Tue, 27th Aug 2024
About Cloud Services
Exclusive: Yubico's Geoff Schomburgk discusses future o...
Fri, 23rd Aug 2024
About Sustainability
Exclusive: Greenbox's CEO discusses e-waste, AI, and fu...
Fri, 23rd Aug 2024
About Cloud Services
Exclusive: Cohesity's Greg Statton discusses the key to...
Tue, 20th Aug 2024
About Cloud Services
Exclusive: Genetec’s Leon Langlais on security and data...
Mon, 12th Aug 2024
About AI Security
Sydney to host Security Exhibition & Conference 2024
Thu, 8th Aug 2024
About Ransomware
Exclusive: Secureworks riding cybersecurity leadership ...
Tue, 30th Jul 2024
About Cloud Services
Exclusive: Cohesity reveals three pillars driving its s...
Mon, 29th Jul 2024
About Customer service
Exclusive: Rimini Street's approach to financial suppor...
Wed, 24th Jul 2024
Expert columns
By Karthik Krishnan of Concentric AI
Cyber Awareness Month: Tips on leveraging DSPM to impro...
Today
By Matt Caffrey of Barracuda
Why you need layered email security to protect against ...
Yesterday
By Stephen Kho of Avast
Protect your mini-me: How to prevent child identity the...
Yesterday
By Clark Whitty of Spirent
To avoid the next major outage, we need continuous test...
Yesterday
By Staff Writer
Industry leaders on what businesses, policymakers and t...
2 days ago
Interviews
Discussing Shadow IT
Okta's redrawing its cybersecurity boundaries, says CSO
Today
Discussing Software-as-a-Service
How Okta partners with NextGen to enable Australian cyb...
Yesterday
Discussing Browser Extension Security
Exclusive: SquareX Chief Architect on cybersecurity inn...
2 days ago
Discussing EduTech
Exclusive: Australians express rising concern over AI i...
2 days ago
Discussing Ransomware
Exclusive: Mandiant Consulting highlights evolving cybe...
Last week
More expert columns
By Pavan Thatha of Radware
GenAI bot traffic and cyberSecurity: What IT leaders ne...
3 days ago
By Fabio Fratucello of CrowdStrike
Why legacy SIEM tools have failed security teams
3 days ago
By Matthew Salier of Australian Cyber Collaboration Centre
How we can help younger Australians tackle cybersecurit...
4 days ago
By Paul Berkovic of Rayven
Why Australian companies are still failing miserably at...
Last week
By Ashley Diffey of Ping Identity
Three phases in the evolving Australian business conver...
Last week
By Derek Manky of Fortinet
As attackers embrace artificial intelligence, every org...
Last week
Top players
You can read more from the top players Fortinet, Kaspersky, Azure, Trend Micro, and Check Point Software.
Recent news
About Ransomware
Zscaler report reveals rise in global ransomware attack...
Today
About Malware
UK consumers concerned as mobile fraud & attacks rise
Today
About Online Safety
Cyber safety campaign launched for high school students
Today
About Data Protection
AI's role in cybersecurity: balancing power & risks
Today
About Software-as-a-Service
Pax8 adds Commvault to cloud commerce marketplace for S...
Yesterday
More news
About Cloud Services
Sectigo launches SiteLock 2.0 to enhance SMB security
Yesterday
About Software
Kiwi charities urged to prioritise expert IT over volun...
Yesterday
About Data Protection
New course launched to enhance TPM skills for developer...
Yesterday
About Collaboration
US indictment reveals Anonymous Sudan's true motives
Yesterday
About Cyber Threats
Arctic Wolf report reveals IT security gaps in A/NZ reg...
Yesterday
Even more news
About Data Protection
Gathid Software earns ISO 27001:2022 certification
Yesterday
About Ransomware
ExtraHop unveils new file analysis features for RevealX
Yesterday
About Productivity
Kaspersky report reveals frequent issues in industrial ...
Yesterday
About Collaboration
Microsoft warns of AI-driven cyber threats & ransomware...
Yesterday
About Cloud Services
Businesses paying ransomware ransoms doubles in 2024
Yesterday
Job moves
Move at Fuji Xerox
CrowdStrike appoints Louis Tague as ANZ Sales VP
Yesterday
Move at Qualys
Cequence Security appoints Randolph Barr as new CISO
2 days ago
Move at ECI Software Solutions
MaxMine appoints Shaun Mitchell as new COO
3 days ago
Move at Microsoft
Saviynt appoints Nupur Goyal as VP of product marketing
Last week
Move at Cisco
Contrast Security appoints Faya Peng as ADR division GM
Last week
Other guides
You can read other related guides from Breach Prevention, Firewalls, Artificial Intelligence, Risk & Compliance, and Network Infrastructure.
Powered by