Latest Blog.
PSPF Direction on cyber threat visibility
|In July, the Home Affairs Secretary issued a Direction under the Protective Security Policy Framework (PSPF), supporting visibility of the cyber threat facing Australian government entities. The Direction, the third of three issued that day, requi...
PSPF Direction on Technology Risk Management
|In July, Home Affairs issued a Direction under the Protective Security Policy Framework (PSPF) requiring Non-Corporate-Commonwealth Entities to conduct a stocktake and develop a Technology Risk Management Plan for all their internet-connected assets ...
PSPF Direction on Foreign Ownership, Control or Influence
|On 8th July 2024, Home Affairs Secretary, Stephanie Foster PSM, issued three Protective Security Directions under the Protective Security Policy Framework (PSPF) which every Commonwealth Non-Corporate Entity is required to implement. The fact that...
Australian Organisations Take Note: Countering PRC State-Sponsored Cyber Threats
|The Australian Cyber Security Centre (ACSC) is urging Australian organisations to be vigilant against cyberattacks by state-sponsored actors of the People’s Republic of China (PRC). A joint Cybersecurity Advisory (CSA) issued in February by the A...
Essential Eight and Legacy Systems
|In the many discussions I’ve had with our agency customers around their efforts to implement Essential Eight security, the most common obstacle encountered is deploying the strategies on the legacy systems remaining in their environments. By ‘...
Team Australia approach needed to win the cyber war
|Aidan Tudehope This article appeared in the Canberra Times on 20 November 2023. The Albanese Government has just released its much-anticipated Australian Cyber Security Strategy 2023-30 (the Strategy), a new national roadmap to put Australia on...
Reducing the risk of supply chain data breaches
|If you are sharing government data with third party service providers, are you certain that information remains secure, even if the sharing is for legitimate government approved purposes? Amid the increased cyber security threats facing Australian...
The UK NCSC 10 Steps and how they compare to the ACSC Essential Eight
|The NCSC “10 Steps to Cyber Resilience” is a set of high-level guidelines developed by the UK’s National Cyber Security Centre (NCSC). It provides organizations with a framework to improve their cybersecurity posture. The 10 Steps cover various...
A turning point in approach to defence
|By Aidan Tudehope The importance of cyber security to Canberra’s and the Australian Defence Force’s capabilities has never been more clear-cut. With the release of the public version of the Defence Strategic Review, which sets the agenda fo...
Podcast: The role of context and evidence in cybersecurity
|Click the above link to hear Corelight’s Jean Schaffer and Macquarie Government’s Catháir Kerr discuss the importance of evidence and context versus raw data in cybersecurity detection and response. In an over thirty year career in US governm...