Cyber intelligence (Computer security)

Research report

24 Sep 2018

For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.

Strategy

21 Sep 2018

This document outlines the steps the U.S government is taking to advance an open, secure, interoperable and reliable cyberspace. Given the interconnected and global nature of cyberspace, the State Department engages in key diplomatic and programmatic initiatives to support many key objectives reflected in this...

Research report

21 Aug 2018

With around 50,000 ships at sea or in port at any one time, the maritime transport industry is highly exposed to cyberattacks. The International Maritime Organisation (IMO) reacted quickly in introducing guidelines in response to terrorist attacks on shipping, but has arguably been slower in...

Research report

4 Jul 2018

This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...

Research report

28 Jun 2018

In the future, the quest to achieve an advantage in emerging technologies, such as artificial intelligence, will only intensify. This report argues that the U.S and Australia must look to enhance their own competitiveness in these strategic technologies.

Research report

28 Jun 2018

The objective of the audit was to assess the effectiveness of the management of cyber risks by the Department of the Treasury, National Archives of Australia and Geoscience Australia.

Policy report

Spare the costs, spoil the bad state actor: deterrence in cyberspace requires consequences
1 Jun 2018

Cyberattacks initiated by nation states have become the new normal, and countries including Australia have struggled with the challenge of how to respond to them. Far too often they’re considered a low priority. This paper offers a way forward, presenting a framework for deterrence -...

Journal article

20 May 2018

This article discusses privacy concerns generated by China's nationwide smart city campaign and further investigates why China's latest Cybersecurity Law is not adequate to address the risks to citizens' privacy.

Strategy

1 May 2018

The aim of this document is to outline Australia’s current national security science and technology priorities and coordination of efforts, to best take advantage of investment in science and technology and address gaps in immediate and future national security capability.

Policy report

1 May 2018

This resource argues that due to the incompatibility of current technologies and legislation, Australian law enforcement and intelligence agencies may need to operate in a grey area which lacks legislative direction. Regardless of their professionalism, this introduces risks for information security and human rights.

Research report

25 Apr 2018

This report is about the human experience of the Internet. It is an independent, open source compilation of data, research and stories, that show how the Internet evolves each year across five issues.

Briefing paper

10 Apr 2018

For Australia, both defensive and offensive cyber capabilities are now an essential component of our nation’s military arsenal, and a necessary step to ensure that we keep up with global players.

Research report

2 Mar 2018

This report found there is no whole-of-government capability to detect and respond effectively to cyber security incidents. There is very limited sharing of information on incidents amongst agencies, and some agencies have poor detection and response practices and procedures.

Guide

A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth)
19 Feb 2018

This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...

Survey

6 Feb 2018

This survey of 385 not for profit organisations identified a significant under-investment in IT, with many organisations using systems that aren’t working well enough to provide efficient services.

Research report

13th Edition
17 Jan 2018

The Global Risks Report 2018 is published at a time of encouraging headline global growth. Any breathing space this offers to leaders should not be squandered: the urgency of facing up to systemic challenges has intensified over the past year amid proliferating signs of uncertainty,...

Research report

12 Dec 2017

This report assesses the national approach of Asia–Pacific countries to the challenges and opportunities of cyberspace, taking a holistic approach that assesses governance and legislation, law enforcement, military capacity and policy involvement, and business and social engagement in cyber policy and security issues.

Research report

10 Nov 2017

In 2017, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) teamed up for the second year in a row to look at the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 343...

Research report

Inquiry based on Auditor-General's report 42 (2016-17)
15 Oct 2017

As technology evolves, more and more government services are being delivered online. New technology can deliver efficiencies to services and products, but it also carries new and significant risks. With increasing volumes of data being collected and used by various government systems, the security of...

Strategy

4 Oct 2017

This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.

Overview

 

Items: 64