Latest publications 25 Mar 2026 Securing space This guidance explains LEO SATCOM cyber security risks and provides mitigation strategies and considerations. It also includes questions to help organisations ensure secure and resilient services from providers. 18 Mar 2026 Quantum technology primer: Communications Learn about quantum communications, their cyber security impacts, current limitations, and the potential risks organisations should consider. 05 Mar 2026 Artificial intelligence and machine learning: Supply chain risks and mitigations This guidance is intended for organisations and staff that deploy or develop AI or ML systems and components. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 16 Jun 2023 Small business cyber security guide This guide includes basic security measures to help protect your business against common cyber threats. 22 May 2023 Cyber supply chain risk management All organisations should consider cyber supply chain risk management. If a supplier, manufacturer, distributor or retailer (i.e. businesses that constitute a cyber supply chain) are involved in products or services used by an organisation, there will be a cyber supply chain risk originating from those businesses. Likewise, an organisation will transfer any cyber supply chain risk they hold to their customers. 22 May 2023 Identifying cyber supply chain risks This guidance has been developed to assist organisations in identifying risks associated with their use of suppliers, manufacturers, distributors and retailers (i.e. businesses that constitute their cyber supply chain). 20 Apr 2023 Cyber security best practices for smart cities This guidance is the result of a collaborative effort from the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ). 28 Mar 2023 Remote access to operational technology environments Many critical infrastructure providers are moving to support remote working arrangements. In doing so, modifying cyber security defences for operational technology environments (OTE) is not a decision that should be taken lightly. 01 Mar 2023 Technical example: Patch applications Patching applications is one of the most effective controls an organisation can implement to prevent cyber criminals from gaining access to their devices and sensitive information. Patches improve the security of applications by fixing known vulnerabilities. Pagination Previous page ‹‹ Page 16 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary