Latest publications 23 Jan 2026 Hardening Microsoft Windows 11 workstations This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 11. While this publication refers to workstations, most recommendations are equally applicable to servers (with the exception of Domain Controllers) using Microsoft Windows Server. Security features discussed in this publication, along with the names and locations of Group Policy settings, are taken from Microsoft Windows 11 version 25H2. 15 Jan 2026 Secure connectivity principles for Operational Technology (OT) How organisations should design, secure, and manage connectivity in operational technology (OT). 14 Jan 2026 Artificial intelligence for small business This guide explains the key cyber security risks of adopting AI technologies and how to reduce while adopting. While traditional threats such as phishing, ransomware and insider threats are still relevant, this guide focuses on other risks that AI introduces. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 22 Aug 2024 Best practices for event logging and threat detection This publication defines a baseline for event logging best practices to mitigate cyber threats. 30 Jul 2024 Secure by Design foundations ASD’s ACSC's Secure by Design foundations represent a first step in a new approach to assist technology manufacturers and customers to adopt Secure by Design. While the foundations are primarily designed to foster discussion within technology manufacturers on how to best approach Secure by Design, they contain relevant information and actions for technology customers. 27 Jun 2024 Exploring memory safety in critical open source projects This publication follows the December 2023 release of The Case for Memory Safe Roadmaps, which recommended software manufacturers create memory safe roadmaps, including plans to address memory safety in external dependencies, which commonly include open source software (OSS). Today’s publication provides a starting point for these roadmaps by investigating the scale of memory safety risk in selected OSS. 12 Jun 2024 Managing the risks of legacy IT: Practitioner guidance This publication provides guidance for practitioners on managing the risks posed by legacy IT and outlines low-cost mitigations that organisations can draw upon. 12 Jun 2024 Managing the risks of legacy IT: Executive guidance This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT. 16 May 2024 Ten things to know about data security This publication has been developed to assist business owners and information technology managers, particularly those unfamiliar with cybersecurity, with ten things they should know about data security. Pagination Previous page ‹‹ Page 10 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary