Latest publications 15 Dec 2025 Quantum technology primer: Overview Learn about quantum technologies, the principles that enable their unique capabilities, and how organisations can prepare. 04 Dec 2025 Principles for the secure integration of Artificial Intelligence in Operational Technology This publication provides guidance for critical infrastructure owners and operators for integrating AI into operational technology (OT) environments. It outlines key principles to leverage the benefits of AI in OT systems while minimising risk. 20 Nov 2025 Bulletproof defense: mitigating risks from bulletproof hosting providers This document provides internet service providers (ISPs) and network defenders recommendations to mitigate potential cybercriminal activity enabled by bulletproof hosting (BPH) providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 04 Feb 2025 Mitigation strategies for edge devices: Executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. 04 Feb 2025 Mitigation strategies for edge devices: Practitioner guidance This publication expands on Mitigation strategies for edge devices: executive guidance. It provides IT practitioners with a list of mitigation strategies for the most common types of edge devices and appliances across enterprise networks and large organisations. 30 Jan 2025 Content credentials: Strengthening multimedia integrity in the generative AI era This cybersecurity information sheet discusses how Content Credentials (especially Durable ones) can be valuable to protect the provenance of media, raises awareness of the state of this solution, provides recommended practices to ensure the preservation of provenance, and discusses the importance of widespread adoption across the information ecosystem. 22 Jan 2025 Detecting and mitigating Active Directory compromises This publication provides an overview of techniques used to compromise Active Directory, and recommended strategies to mitigate these techniques. By implementing the recommendations in this publication, organisations can significantly improve their Active Directory security, and therefore their overall network security posture. 22 Jan 2025 "Bulletproof" hosting providers Bulletproof hosting (BPH) providers lease cybercriminals a virtual and/or physical infrastructure from which to operate. BPH providers are a specific class of internet infrastructure service that enables malicious actors (including cybercriminals) to host illicit content and run operations on the internet. 14 Jan 2025 Secure by Demand This Secure by Demand guide, authored by CISA with contributions from the following partners, describes how OT owners and operators should integrate security into their procurement process when purchasing industrial automation and control systems as well as other OT products. Pagination Previous page ‹‹ Page 7 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary