Latest publications 15 Dec 2025 Quantum technology primer: Overview Learn about quantum technologies, the principles that enable their unique capabilities, and how organisations can prepare. 04 Dec 2025 Principles for the secure integration of Artificial Intelligence in Operational Technology This publication provides guidance for critical infrastructure owners and operators for integrating AI into operational technology (OT) environments. It outlines key principles to leverage the benefits of AI in OT systems while minimising risk. 20 Nov 2025 Bulletproof defense: mitigating risks from bulletproof hosting providers This document provides internet service providers (ISPs) and network defenders recommendations to mitigate potential cybercriminal activity enabled by bulletproof hosting (BPH) providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 25 Oct 2024 Safe software deployment: How software manufacturers can ensure reliability for customers It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements. 02 Oct 2024 Essential Eight assessment process guide This publication provides advice on how to assess the implementation of the Essential Eight. 02 Oct 2024 Essential Eight maturity model and ISM mapping This publication provides a mapping between the Essential Eight and the controls within the Information security manual (ISM). 02 Oct 2024 Principles of operational technology cyber security Critical infrastructure organisations provide vital services, including supplying clean water, energy, and transportation, to the public. These organisations rely on operational technology (OT) to control and manage the physical equipment and processes that provide these critical services. As such, the continuity of vital services relies on critical infrastructure organisations ensuring the cybersecurity and safety of their OT. 22 Aug 2024 Best practices for event logging and threat detection This publication defines a baseline for event logging best practices to mitigate cyber threats. 30 Jul 2024 Secure by Design foundations ASD’s ACSC's Secure by Design foundations represent a first step in a new approach to assist technology manufacturers and customers to adopt Secure by Design. While the foundations are primarily designed to foster discussion within technology manufacturers on how to best approach Secure by Design, they contain relevant information and actions for technology customers. Pagination Previous page ‹‹ Page 9 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary