Cybersecurity

Discussion paper

24 Aug 2017

This paper argues that the requirement for purpose-driven and mission-specific cyber security education is increasing, and recommends that this become a focus of new initiatives in cyber security education.

Literature review

22 Aug 2017

This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.

Briefing paper

4 May 2017

This paper offers recommendations for the development of Australia’s national cyber information sharing system.

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...

Research report

26 Jan 2017

Cyberattacks and data breaches are facts of life for government agencies, businesses and individuals alike in today’s digitized and networked world. Just a few of the most high-profile breaches in 2016 alone include the hacking and subsequent release of emails from members of the Democratic...

Audio interview

13 Jan 2017

The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.

As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...

Technical report

29 Dec 2016

The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.

Guide

15 Dec 2016

In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...

Research report

24 Nov 2016

On 31 August 2016, the Senate referred the 2016 Census to the Senate Economics References Committee for inquiry and report by 24 November 2016. The terms of reference include the following matters:

The 2016 Census, with particular reference to:

a) the preparation, administration...

Research report

24 Nov 2016

The Australian Government’s new paradigm of online engagement and services for Australians is not coming. It’s already here.

Government’s response to the eCensus events of 9 August 2016 provides an opportunity to change the conversation about cyber security: to one of trust and confidence...

Research report

27 Sep 2016

The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement,...

Blog post

15 Sep 2016

Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted...

Discussion paper

14 Sep 2016

Cooperative Intelligent Transport Systems (C-ITS) enable real-time wireless communication between vehicles, roadside infrastructure, mobile devices and back-office systems. They have been developed as a way to deliver a safer and more efficient transport network that is less congested and more environmentally friendly.

C-ITS are...

Research report

13 Jun 2016

The digital economy is built on data—massive streams of data being created, collected, combined and shared—for which traditional governance frameworks and risk-mitigation strategies are insufficient. In the digital age, analyzing and acting on insights from data can introduce entirely new classes of risk. These include...

Commentary

Article

24 May 2016

The Australian Federal election is likely to be dominated, understandably, by economic and social issues. But Australia’s security and foreign policy environment is marked by rapid change and complex uncertainty.

From terrorism to resource insecurity, from the assertive rise of China to the impact...

Research report

5 May 2016

In June 2014, the Australian National Audit Office tabled in Parliament ANAO Audit Report No.50 2013–14, Cyber Attacks: Securing Agencies’ ICT Systems . The report examined implementation of the mandatory strategies in the Australian Government Information Security Manual (ISM).

The Joint Committee of Public...

Strategy

9 Apr 2016

This Cyber Security Strategy sets out the Australian Government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting interests online.

Research report

1 Mar 2016

As journalists around the world have become more vulnerable, their need for security tools has grown exponentially. There is no question that the digital world has made journalism a riskier profession. But it can also make it safer. Digital technology can offer tools to minimize...

Strategy

10 Dec 2015

The Internet and other information technologies have transformed the way New Zealanders live. Connectivity is an integral part of New Zealand’s economic growth and international competitiveness.

Ninety percent of New Zealand households and 96 percent of businesses now have an Internet connection. New Zealanders...

Commentary

Article

24 Nov 2015

This article argues that the Chinese purchase of the century-long lease to the port of Darwin is part of a broader expansionist agenda of the Chinese state as it attempts to dominate the western Pacific under the “Chinese Dream” aspiration. It shows the importance of...