Latest Blog.
Macquarie Announces New Canberra Government Data Centre
|Macquarie Data Centres invest $100M in Australian data centres this year with both Fortune 100 and 42% of Federal Government now leveraging its facilities. Macq...
![Aidan Tudehope Aidan Tudehope](https://macquariegovernment.com/wp-content/uploads/sites/4/2019/06/AidanImage.png)
Australian Organisations Take Note: Countering PRC State-Sponsored Cyber Threats
|The Australian Cyber Security Centre (ACSC) is urging Australian organisations to be vigilant against cyberattacks by state-sponsored actors of the People’s Republic of China (PRC). A joint Cybersecurity Advisory (CSA) issued in February by the ACS...
SIGBox Secure View: Enhanced Security for Sharing PROTECTED Classified Data
|Australian government agencies operate in an ever-changing digital world where collaboration is crucial. Data loss protection is essential when sharing necessary information with external partners, like law enforcement, external contractors working o...
Essential Eight and Legacy Systems
|In the many discussions I’ve had with our agency customers around their efforts to implement Essential Eight security, the most common obstacle encountered is deploying the strategies on the legacy systems remaining in their environments. By ‘...
Sovereign Cloud and AI: Where do I want my data stored?
|In 2006, Clive Humbly coined the term, “Data is the new oil.” Today, data and the significance of where and how it is stored, processed, and managed cannot be overstated. As an Australian, my preference would always be for data to be retained wit...
Safeguarding Against Cyber Supply Chain Compromises: Lessons from the XZ Utils Attack
|The recent cyber-attack on XZ Utils, a popular software used for file compression, underscores the escalating threat landscape targeting software supply chains. The breach, which involved malicious code inserted into the software’s updates, exposed...
Navigating the Labyrinth: The Threat Landscape of Large Language Models and ASCII Art-Based Jailbreaks
|Large Language Models (LLMs) are the new kid on the block and as businesses race to train and utilise these models to gain competitive advantage, red teamers and the usual cyber adversaries are also learning how to exploit them. The sophistication an...
Beyond the Essential Eight (E8) – where to from here?
|As the Australian government moves towards its next phase of the Cyber Security Strategy and consults industry to make legislative reforms, some quiet debate remains within government and industry circles about replacing the nation’s Essential Eig...
The Evolving Threat Landscape of DDoS Attacks: Insights from Macquarie Government's Security Operations Centre
|Within the Security Operations Centre (SOC) at Macquarie Government, we have been witnessing firsthand the transformation of the cybersecurity landscape, particularly the progression of Distributed Denial of Service (DDoS) attacks. Gone are the days ...
Developing Australia’s Defence Industry Base Report
|Today at the National Press Club the Sovereign Australian Prime Alliance (SAPA) launched a new report that sets out the pathway for creating Australian Headquartered businesses and highly skilled jobs in shipbuilding, cyber defence, space, missiles, ...
Team Australia approach needed to win the cyber war
|Aidan Tudehope This article appeared in the Canberra Times on 20 November 2023. The Albanese Government has just released its much-anticipated Australian Cyber Security Strategy 2023-30 (the Strategy), a new national roadmap to put Australia on...