This paper argues that the requirement for purpose-driven and mission-specific cyber security education is increasing, and recommends that this become a focus of new initiatives in cyber security education.
This report examines the existing limited research on women in the cyber security industry, and women in science, technology, mathematics, and engineering (STEM) and information and communication technology (ICT) to identify barriers to women’s labour market participation.
The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.
This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...
Cyberattacks and data breaches are facts of life for government agencies, businesses and individuals alike in today’s digitized and networked world. Just a few of the most high-profile breaches in 2016 alone include the hacking and subsequent release of emails from members of the Democratic...
The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.
As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...
The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...
On 31 August 2016, the Senate referred the 2016 Census to the Senate Economics References Committee for inquiry and report by 24 November 2016. The terms of reference include the following matters:
The 2016 Census, with particular reference to:
a) the preparation, administration...
The Australian Government’s new paradigm of online engagement and services for Australians is not coming. It’s already here.
Government’s response to the eCensus events of 9 August 2016 provides an opportunity to change the conversation about cyber security: to one of trust and confidence...
The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement,...
Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted...
Cooperative Intelligent Transport Systems (C-ITS) enable real-time wireless communication between vehicles, roadside infrastructure, mobile devices and back-office systems. They have been developed as a way to deliver a safer and more efficient transport network that is less congested and more environmentally friendly.
The digital economy is built on data—massive streams of data being created, collected, combined and shared—for which traditional governance frameworks and risk-mitigation strategies are insufficient. In the digital age, analyzing and acting on insights from data can introduce entirely new classes of risk. These include...
The Australian Federal election is likely to be dominated, understandably, by economic and social issues. But Australia’s security and foreign policy environment is marked by rapid change and complex uncertainty.
From terrorism to resource insecurity, from the assertive rise of China to the impact...
In June 2014, the Australian National Audit Office tabled in Parliament ANAO Audit Report No.50 2013–14, Cyber Attacks: Securing Agencies’ ICT Systems . The report examined implementation of the mandatory strategies in the Australian Government Information Security Manual (ISM).
The Joint Committee of Public...
This Cyber Security Strategy sets out the Australian Government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting interests online.
As journalists around the world have become more vulnerable, their need for security tools has grown exponentially. There is no question that the digital world has made journalism a riskier profession. But it can also make it safer. Digital technology can offer tools to minimize...
The Internet and other information technologies have transformed the way New Zealanders live. Connectivity is an integral part of New Zealand’s economic growth and international competitiveness.
Ninety percent of New Zealand households and 96 percent of businesses now have an Internet connection. New Zealanders...
This article argues that the Chinese purchase of the century-long lease to the port of Darwin is part of a broader expansionist agenda of the Chinese state as it attempts to dominate the western Pacific under the “Chinese Dream” aspiration. It shows the importance of...