This discussion paper seeks the public's views about how the Australian government can incentivise businesses to invest in cyber security, including through possible regulatory changes.
Digitisation of elections in Australia induces new vulnerabilities that malign foreign entities can exploit to subvert our democratic sovereignty. Despite this threat landscape, according to this paper, Australia’s digital-analogue hybridity safeguards federal elections from hard cyber security risks that might seek to directly tamper with...
For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
This document represents the process and reflections on the creation and curation of an open source 'texthack' for a media studies textbook for students in Australia, New Zealand, and the Pacific. This document is provided as a resource for anyone contemplating a similar texthack project...
This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.