Latest Blog.
Macquarie Announces New Canberra Government Data Centre
|Macquarie Data Centres invest $100M in Australian data centres this year with both Fortune 100 and 42% of Federal Government now leveraging its facilities. Macq...

The UK NCSC 10 Steps and how they compare to the ACSC Essential Eight
|The NCSC “10 Steps to Cyber Resilience” is a set of high-level guidelines developed by the UK’s National Cyber Security Centre (NCSC). It provides organizations with a framework to improve their cybersecurity posture. The 10 Steps cover various...
A turning point in approach to defence
|By Aidan Tudehope The importance of cyber security to Canberra’s and the Australian Defence Force’s capabilities has never been more clear-cut. With the release of the public version of the Defence Strategic Review, which sets the agenda fo...
Podcast: The role of context and evidence in cybersecurity
|Click the above link to hear Corelight’s Jean Schaffer and Macquarie Government’s Catháir Kerr discuss the importance of evidence and context versus raw data in cybersecurity detection and response. In an over thirty year career in US governm...
What is a secure cloud?
|A secure cloud is a cloud computing environment – typically on Infrastructure-as-a-Service (IaaS) that has implemented various measures to protect data and applications stored within it from unauthorized access, theft, or damage. View article
What is a PROTECTED cloud?
|A PROTECTED cloud is a cloud computing service that has been assessed by the Australian Signals Directorate (ASD) to meet the security standards required for handling classified information by Australian government agencies. The DTA requires all ...
Australian Government Cybersecurity
|Australian government agencies are required to meet a range of cybersecurity frameworks and strategies to ensure the protection of government information and systems. These are set out by the Australian Cyber Security Centre (ACSC) and are mandatory ...
The role of Email and Network Sandboxing in Gateways
|The Australian Cyber Security Centre (ACSC) Gateway Technology Guides cover a range of topics, including sandbox technology. According to the guide, a sandbox is a secure environment where potentially malicious code can be executed safely, away fr...
Data Loss Prevention for Australian Government
|Australian government agencies handle sensitive information related to our national security, citizens’ personal information, and other confidential data. The consequences of a data breach can be severe and can lead to a loss of public trust, finan...
ATO Renews Cyber Security Contract with Macquarie Government
|The Australian Tax Office (ATO) has extended its cybersecurity support deal with Macquarie Government at a cost of $32.7 million. The secure internet gateway (SIG) and cybersecurity services contract has been extended until December 2024 and the tota...
The role of Security Domains in Gateway Design
|Secure Internet Gateways like Macquarie Government’s SIGNET play an important role in protecting digital government. To better understand how gateways work, it helps to understand the “security domains” they protect. In an earlier post, we d...