Australian Cyber Security Centre
May 6, 2019 - Our Joint Cyber Security Centre (JCSC) program brings together business and the research community along with state, territory and Australian Government agencies in an open and cooperative environment.
May 6, 2019 - The ACSC partnership program is open to wide range of industry, the research community, as well as to state, territory and Australian Government. We engage with partners across the whole of the Australian economy to increase their cyber resilience and to share situational awareness. Organisations who become ACSC partners can access timely alerts and advisories, rapidly share insights, and increasingly work together to solve common challenges.
Nov 6, 2018 - The Australian Cyber Security Centre (ACSC) is currently in the process of updating its contact list for our partners. Our cyber community is experiencing rapid change and people are often on the move, falling outside of the information loop. We want to ensure that, in times of crisis, we are able to quickly inform the cyber community. As an ACSC partner you will receive a message from ASD.Assist@defence.gov.au asking you to update your contact details.
Sep 11, 2018 - Losing control of your email service is devastating, even if your company has merged or shut down. A domain name is a core foundation of every business and email is an essential service. Allowing corporate domain names to expire puts businesses at risk, potentially exposing clients’ personal and confidential information, client-legal privileged information and financial details.
Aug 20, 2018 - Threats to our cyber safety and security are intensifying as cyber criminals target our homes, businesses, phones and computers, infrastructure and community. Now working from new purpose-built headquarters, the Australian Cyber Security Centre (ACSC) is building on decades of quiet success by Australian agencies. Officially opened by Prime Minister Malcolm Turnbull, the ACSC demonstrates the Australian Government"s commitment to online security in a world where new threats are always emerging.
Jul 1, 2018 - Working from new purpose-built headquarters after its official launch in August, the ACSC and its network of Joint Cyber Security Centres (JCSCs) across the country are building on decades of quiet success by Australian agencies. The ACSC, part of the Australian Signals Directorate (ASD), demonstrates the Australian Government's commitment to cyber security in a world where new threats are always emerging.
Oct 15, 2017 - This is the third Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. For the first time, this year’s Threat Report also includes insights into how the ACSC works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
Apr 15, 2017 - This is the first Australian Cyber Security Centre (ACSC) Cyber Security Survey to look across both the government and private sectors in combination. It provides an overview of how prepared Australian organisations are to meet the growing cyber threat.
Oct 15, 2016 - This is the second Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. But we at the ACSC are not just focused on the problem. Importantly, this document also contains mitigation and remediation advice to assist organisations to prevent, and respond to, cyber threats.
Dec 15, 2015 - The 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks. Download: