Latest publications 22 Aug 2024 Best practices for event logging and threat detection This publication defines a baseline for event logging best practices to mitigate cyber threats. 06 Aug 2024 Essential Eight Assessment Process Guide This publication provides advice on how to assess the implementation of the Essential Eight. 16 Jul 2024 Hardening Microsoft Windows 10 and Windows 11 Workstations Workstations are often targeted by malicious actors using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 and Windows 11. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 22 Aug 2024 Best practices for event logging and threat detection This publication defines a baseline for event logging best practices to mitigate cyber threats. 06 Aug 2024 Essential Eight Assessment Process Guide This publication provides advice on how to assess the implementation of the Essential Eight. 16 Jul 2024 Hardening Microsoft Windows 10 and Windows 11 Workstations Workstations are often targeted by malicious actors using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 and Windows 11. 27 Jun 2024 Exploring memory safety in critical open source projects This publication follows the December 2023 release of The Case for Memory Safe Roadmaps, which recommended software manufacturers create memory safe roadmaps, including plans to address memory safety in external dependencies, which commonly include open source software (OSS). Today’s publication provides a starting point for these roadmaps by investigating the scale of memory safety risk in selected OSS. 12 Jun 2024 Managing the Risks of Legacy IT: Practitioner Guidance This publication provides guidance for practitioners on managing the risks posed by legacy IT and outlines low-cost mitigations that organisations can draw upon. 12 Jun 2024 Managing the Risks of Legacy IT: Executive Guidance This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT. Pagination Page 1 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats