Latest publications 09 Apr 2026 Detecting socially engineered messages Socially engineered messages pose a significant threat to organisations. They can have a big impact, helping malicious actors access accounts, systems or sensitive information. Learn how to spot a socially engineered message, including through email, SMS, social media or messaging apps. 09 Apr 2026 Security tips for social media and messaging services It's a great way to stay in touch and share content online. This guide covers the risks of using social media and messaging apps and what to look out for. It also covers ways to help keep accounts safe for business and personal use. 25 Mar 2026 Securing space This guidance explains LEO SATCOM cyber security risks and provides mitigation strategies and considerations. It also includes questions to help organisations ensure secure and resilient services from providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 23 May 2025 AI data security This publication provides essential data security guidance for organisations that develop and/or use AI systems, including businesses, government and critical infrastructure. It highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes, and presents an in-depth examination of 3 areas of data security risks in AI systems: data supply chain, maliciously modified (poisoned) data, and data drift. 21 May 2025 Convoluted layers: An artificial intelligence primer Rapid advances in artificial intelligence (AI), along with public releases of AI products, have prompted governments, businesses and criminals to accelerate efforts to incorporate this new technology into their operations. This advice provides definitions for some of the most commonly encountered AI terms in cyber security and a brief typology of cyber threats that will arise from AI. 19 May 2025 Geo-blocking in context: Realities, risks and recommendations This guidance is intended for decision makers and cyber security practitioners. It highlights what to be aware of when identifying the source of a threat and the potential implications of geo-blocking in a broader cyber security strategy. 17 Mar 2025 Preparing for and responding to denial-of-service attacks Although organisations cannot avoid being targeted by denial-of-service attacks, there are a number of measures that organisations can implement to prepare for and potentially reduce the impact if targeted. Preparing for denial-of-service attacks before they occur is by far the best strategy, it is very difficult to respond once they begin and efforts at this stage are unlikely to be effective. 19 Feb 2025 Quantum technology primer: Overview Learn about quantum technologies, the principles that enable their unique capabilities, and how organisations can prepare. 05 Feb 2025 Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances This guidance has been developed with contributions from partnering agencies and is included in a series of publications aiming to draw attention to the importance of edge device cyber security measures. Pagination Previous page ‹‹ Page 7 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary