Australian Cyber Security Centre
Jul 25, 2019 - The ACSC and Splunk Boss of the Security Operations Centre (BOTS) Day is underway today with up to 650 players participating across Australia and New Zealand. The region’s biggest capture-the-flag-style event tests the skills of cyber security professionals in our largest business, government and education organisations.
May 6, 2019 - Our Joint Cyber Security Centre (JCSC) program brings together business and the research community along with state, territory and Australian Government agencies in an open and cooperative environment.
May 6, 2019 - The ACSC partnership program is open to wide range of industry, the research community, as well as to state, territory and Australian Government. We engage with partners across the whole of the Australian economy to increase their cyber resilience and to share situational awareness. Organisations who become ACSC partners can access timely alerts and advisories, rapidly share insights, and increasingly work together to solve common challenges.
Nov 6, 2018 - The Australian Cyber Security Centre (ACSC) is currently in the process of updating its contact list for our partners. Our cyber community is experiencing rapid change and people are often on the move, falling outside of the information loop. We want to ensure that, in times of crisis, we are able to quickly inform the cyber community. As an ACSC partner you will receive a message from ASD.Assist@defence.gov.au asking you to update your contact details.
Sep 11, 2018 - Losing control of your email service is devastating, even if your company has merged or shut down. A domain name is a core foundation of every business and email is an essential service. Allowing corporate domain names to expire puts businesses at risk, potentially exposing clients’ personal and confidential information, client-legal privileged information and financial details.
Aug 20, 2018 - Threats to our cyber safety and security are intensifying as cyber criminals target our homes, businesses, phones and computers, infrastructure and community. Now working from new purpose-built headquarters, the Australian Cyber Security Centre (ACSC) is building on decades of quiet success by Australian agencies. Officially opened by Prime Minister Malcolm Turnbull, the ACSC demonstrates the Australian Government"s commitment to online security in a world where new threats are always emerging.
Jul 1, 2018 - Working from new purpose-built headquarters after its official launch in August, the ACSC and its network of Joint Cyber Security Centres (JCSCs) across the country are building on decades of quiet success by Australian agencies. The ACSC, part of the Australian Signals Directorate (ASD), demonstrates the Australian Government's commitment to cyber security in a world where new threats are always emerging.
Oct 15, 2017 - This is the third Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. For the first time, this year’s Threat Report also includes insights into how the ACSC works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
Oct 15, 2016 - This is the second Australian Cyber Security Centre (ACSC) Threat Report. It continues to reflect the experience, focus, and mandates of the ACSC’s member organisations. This report provides an insight into what the Centre has been seeing, learning, and responding to, focusing on specific areas of change or new knowledge obtained. But we at the ACSC are not just focused on the problem. Importantly, this document also contains mitigation and remediation advice to assist organisations to prevent, and respond to, cyber threats.
Jul 15, 2015 - This report describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. It also offers mitigation advice on how organisations can defend against these activities.