Latest publications 15 Dec 2025 Quantum technology primer: Overview Learn about quantum technologies, the principles that enable their unique capabilities, and how organisations can prepare. 04 Dec 2025 Principles for the secure integration of Artificial Intelligence in Operational Technology This publication provides guidance for critical infrastructure owners and operators for integrating AI into operational technology (OT) environments. It outlines key principles to leverage the benefits of AI in OT systems while minimising risk. 20 Nov 2025 Bulletproof defense: mitigating risks from bulletproof hosting providers This document provides internet service providers (ISPs) and network defenders recommendations to mitigate potential cybercriminal activity enabled by bulletproof hosting (BPH) providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 27 Nov 2023 Hardening Linux workstations and servers This publication has been developed to assist organisations in understanding how to harden Linux workstations and servers. 27 Nov 2023 Implementing application control Application control is one of the most effective mitigation strategies in ensuring the security of systems. As such, application control forms part of the Essential Eight from the Strategies to mitigate cybersecurity incidents. This publication provides guidance on what application control is, what application control is not, and how to implement application control. 27 Nov 2023 Implementing multi-factor authentication This publication has been developed to provide guidance on what multi-factor authentication is, different multi-factor authentication methods that exist and why some multi-factor authentication methods are more secure, and therefore more effective, than others. 27 Nov 2023 Restricting Microsoft Office macros This publication has been developed to discuss approaches that can be applied by organisations to secure systems against malicious Microsoft Office macros while balancing both their business and security requirements. 27 Nov 2023 Restricting administrative privileges Learn how to restrict the use of administrative privileges. Restricting administrative privileges forms part of the Essential Eight from the Strategies to mitigate cybersecurity incidents. 27 Nov 2023 Essential Eight explained This publication provides an overview of the Essential Eight. Pagination Previous page ‹‹ Page 13 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary