Latest publications 18 Mar 2026 Quantum technology primer: Communications Learn about quantum communications, their cyber security impacts, current limitations, and the potential risks organisations should consider. 05 Mar 2026 Artificial intelligence and machine learning: Supply chain risks and mitigations This guidance is intended for organisations and staff that deploy or develop AI or ML systems and components. 19 Feb 2026 Quantum technology primer: Computing Explore quantum computing, the threat it poses to current cryptography, and how organisations can reduce risks to their data and systems. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 12 Jun 2024 Managing the risks of legacy IT: Executive guidance This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT. 16 May 2024 Ten things to know about data security This publication has been developed to assist business owners and information technology managers, particularly those unfamiliar with cyber security, with ten things they should know about data security. 16 Apr 2024 Deploying AI systems securely AI security is a rapidly evolving area of research. As agencies, industry, and academia discover potential weaknesses in AI technology and techniques to exploit them, organizations will need to update their AI systems to address the changing risks, in addition to applying traditional IT best practices to AI systems. 26 Mar 2024 Travelling with mobile devices Learn how to keep mobile devices secure when travelling. This guidance provides advice from both an individual and organisational perspective. 21 Feb 2024 Blueprint for Secure Cloud The Blueprint provides better practice guidance, configuration guides and templates covering risk management, architecture and standard operating procedures developed as per the controls in ASD’s Information security manual (ISM). 24 Jan 2024 Engaging with artificial intelligence The purpose of this paper is to provide organisations with guidance on how to use artificial intelligence (AI) systems securely. The paper summarises some important threats related to AI systems and includes cyber security mitigation strategies to aid organisations in engaging with AI while managing risk. It provides mitigations to assist both organisations that maintain their own AI systems and organisations that use third-party AI systems. Pagination Previous page ‹‹ Page 11 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary