Latest publications 30 May 2023 Essential Eight Explained This publication provides an overview of the ACSC's Essential Eight. 22 May 2023 Cyber Supply Chain Risk Management All organisations should consider cyber supply chain risk management. If a supplier, manufacturer, distributor or retailer (i.e. businesses that constitute a cyber supply chain) are involved in products or services used by an organisation, there will be a cyber supply chain risk originating from those businesses. Likewise, an organisation will transfer any cyber supply chain risk they hold to their customers. 22 May 2023 Identifying Cyber Supply Chain Risks This guidance has been developed to assist organisations in identifying risks associated with their use of suppliers, manufacturers, distributors and retailers (i.e. businesses that constitute their cyber supply chain). All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 30 May 2023 Essential Eight Explained This publication provides an overview of the ACSC's Essential Eight. 22 May 2023 Identifying Cyber Supply Chain Risks This guidance has been developed to assist organisations in identifying risks associated with their use of suppliers, manufacturers, distributors and retailers (i.e. businesses that constitute their cyber supply chain). 22 May 2023 Cyber Supply Chain Risk Management All organisations should consider cyber supply chain risk management. If a supplier, manufacturer, distributor or retailer (i.e. businesses that constitute a cyber supply chain) are involved in products or services used by an organisation, there will be a cyber supply chain risk originating from those businesses. Likewise, an organisation will transfer any cyber supply chain risk they hold to their customers. 11 May 2023 Planning for Post-Quantum Cryptography A cryptographically relevant quantum computer (CRQC) will render most contemporary public key cryptography insecure, thus making ubiquitous secure communications based on current public key cryptography technology infeasible. As the creation of a CRQC presents new cyber security risks, organisations are encouraged to consider anticipating future requirements and dependencies of vulnerable systems during the transition to post-quantum cryptography (PQC) standards. 20 Apr 2023 Cybersecurity Best Practices for Smart Cities This guidance is the result of a collaborative effort from the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ). 13 Apr 2023 Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC) and the following international partners provide the recommendations in this guide as a roadmap for technology manufacturers to ensure security of their products. Pagination Page 1 Next page ›› Alerts and Advisories Advice and guidance News and media Releases Programs Publications Reports and statistics Glossary Threats