Latest publications 23 Jan 2026 Hardening Microsoft Windows 11 workstations This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 25H2. 15 Jan 2026 Secure connectivity principles for Operational Technology (OT) How organisations should design, secure, and manage connectivity in operational technology (OT). 14 Jan 2026 Artificial intelligence for small business This guide explains the key cyber security risks of adopting AI technologies and how to reduce while adopting. While traditional threats such as phishing, ransomware and insider threats are still relevant, this guide focuses on other risks that AI introduces. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 22 Jan 2025 Detecting and mitigating Active Directory compromises This publication provides an overview of techniques used to compromise Active Directory, and recommended strategies to mitigate these techniques. By implementing the recommendations in this publication, organisations can significantly improve their Active Directory security, and therefore their overall network security posture. 14 Jan 2025 Secure by Demand This Secure by Demand guide, authored by CISA with contributions from the following partners, describes how OT owners and operators should integrate security into their procurement process when purchasing industrial automation and control systems as well as other OT products. 12 Dec 2024 Vulnerability disclosure programs explained A vulnerability disclosure program (VDP) is a collection of processes and procedures designed to identify, verify, resolve and report on vulnerabilities disclosed by people who may be internal or external to organisations. The importance of developing, implementing and maintaining a well thought-out VDP cannot be underestimated. It is an integral part of professional organisations’ business operations. 12 Dec 2024 Cyber security incident response planning: Practitioner guidance ASD defines a cyber security incident as an unwanted or unexpected cyber security event, or a series of such events, that has either compromised business operations or has a significant probability of compromising business operations. 12 Dec 2024 Cyber security incident response planning: Executive guidance The Australian Signals Directorate (ASD) is responsible for monitoring and responding to cyber threats targeting Australian interests. Reporting cyber security incidents to ASD ensures that timely assistance can be provided, if required. This may be in the form of investigations or remediation advice. 05 Dec 2024 Choosing secure and verifiable technologies The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and international partners have provided recommendations in this guide as a roadmap for choosing secure and verifiable technologies. Pagination Previous page ‹‹ Page 8 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary