The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
This resource outlines Australia's cyber affairs agenda for the next three years, with the hope of creating the environment for digital trade to generate economic growth and opportunities for Australia.
This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.
An interdisciplinary exercise generated three overarching policy recommendations to improve cyber security in Australia: create and enforce technology security standards, craft international agreements to address cyber security challenges, and improve risk awareness to keep users safe online.
This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.
The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.
This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...
The inaugural Australia–US Cyber Security Dialogue held in Washington DC in September 2016 examined cybersecurity issues and how best to manage them in a cooperative manner.
The dialogue was facilitated by ASPI and the Center for Strategic and International Studies (CSIS).
This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.
When the Australian Signals Directorate (ASD) released its Top Four Strategies to Mitigate Targeted Cyber Intrusions in 2011, it was revolutionary, because it cut to the chase. Do these four things first, before anything else, and you'll repel 85 percent of targeted...
The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.
As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...
CSIS began work in late 2014 with leading experts to develop recommendations on cybersecurity for the next presidential administration. The CSIS Cyber Policy Task Force divided its work among two groups, one in Washington D.C. and the other in Silicon Valley. Each group brought a...
The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...
The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale....
The growing use of online and cloud services in the community means electronic evidence is moving beyond the physical jurisdiction of Australian law enforcement agencies. This paper looks at the legal and technical issues inherent in collecting electronic evidence from online and cloud services. The...
Across the world, there are conflicting ideas about how to manage the dynamic environment of cyberspace. States have the liberty of implementing legislation for the domestic regulation of cyberspace, but disagreements arise over national visions for the management of cyberspace internationally. Many...
Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.
We reviewed the...
The global economy is a complex cyber ecosystem. The movement of goods and services across cities, nations and the world assumes secure and assured access to the internet. Many processes are becoming automated and all manner of devices are being connected to...
The governance of cyber security has become a pressing challenge to both the public and private sector. Currently, cyber crime is the second most-reported economic crime, affecting 32 per cent of organisations, at a cost to the Australian economy that is estimated...