Latest publications 09 Apr 2026 Detecting socially engineered messages Socially engineered messages pose a significant threat to organisations. They can have a big impact, helping malicious actors access accounts, systems or sensitive information. Learn how to spot a socially engineered message, including through email, SMS, social media or messaging apps. 09 Apr 2026 Security tips for social media and messaging services It's a great way to stay in touch and share content online. This guide covers the risks of using social media and messaging apps and what to look out for. It also covers ways to help keep accounts safe for business and personal use. 25 Mar 2026 Securing space This guidance explains LEO SATCOM cyber security risks and provides mitigation strategies and considerations. It also includes questions to help organisations ensure secure and resilient services from providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 04 Sep 2025 A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity This guidance, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and international partners, presents a shared vision of Software Bill of Materials (SBOM) and the value that increased software component and supply chain transparency can offer to the global community. 04 Sep 2025 End of support for Microsoft Windows and Microsoft Windows server Support for Microsoft Windows and Microsoft Windows Server users following the expiration of the specified servicing timeline. 26 Aug 2025 Managing cryptographic keys and secrets This guide has been developed to help organisational personnel in understanding the threat environment and the value of implementing secure keys and secrets management to make better informed decisions. 14 Aug 2025 Foundations for OT cybersecurity: Asset inventory guidance for owners and operators This guidance outlines how OT owners and operators can create and maintain an asset inventory and OT taxonomy, to protect their most vital assets. It includes steps for defining scope and objectives for the inventory, identifying assets, collecting attributes, creating a taxonomy, managing data, and implementing asset life cycle management. 29 Jul 2025 Gateway security guidance package: Executive guidance The purpose of this guidance is to inform decision-makers at the executive level of their responsibilities, the appropriate considerations needed to make informed risk-based decisions, and to meet policy obligations when leading the design or consumption of their organisation’s gateway services. 29 Jul 2025 Gateway security guidance package: Overview This page provides an overview of ASD’s Gateway security guidance package. Pagination Previous page ‹‹ Page 5 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary