This discussion paper seeks the public's views about how the Australian government can encourage businesses to invest in cyber security, including through possible regulatory changes.
All governments, civil society groups and businesses—large and small—need to know how to manage and mitigate the risk of ransomware, but organisations can’t deal with the attacks on their own. This policy report addresses key areas in Australia where new policies and strategies and improved...
The world is now at the precipice of another technological and social revolution—the quantum revolution. This report focuses on analysis, and building policy recommendations, to help Australia better leverage the quantum revolution.
This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
This guide for policymakers describes subsea cables' essential functions, planning processes and common threats. It also outlines the economic and strategic interests at stake, and offers some recommendations for protecting America's centrality in subsea networks.
These guidelines are intended for Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), cyber security professionals and information technology managers. As such, these guidelines discuss both governance and technical concepts in order to support the protection of organisations’ information and systems.
For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
This resource updates information on prudential considerations and key principles issued to APRA-regulated entities in July 2015. It has been developed in response to the growing use of the cloud by APRA-regulated entities for higher inherent risk activities, and observed areas of weakness in how...
This paper forms part of a research project that examines cybercrime laws in the member countries of the Gulf Cooperation Council (GCC). Its aim is to assess whether these laws are fit for purpose, and to gauge their impact on the economy, security and civil...