The role of cyberspace in contemporary grand strategy is undeniable. US–Russian relations are now plagued by debates of online influence operations, while China is formulating plans to become a ‘cyber superpower’. As the strategic significance …
World leaders now discuss cybersecurity as a priority issue with their counterparts in many guises, be it the seemingly endless revelations of state led cyber espionage, state sponsored information leaks, or cyber criminals enjoying an …
Yesterday the Australian Cyber Security Centre (ACSC) released its second annual Threat Report (PDF), outlining the cybersecurity challenges Australia faces and further developing Australia’s approach to cyberspace. This year’s ACSC report offers a detailed breakdown …
While ISIS is clearly a complex thorn in the side of the Turkish government, Turkish President Recep Tayyip Erdogan faces a broad range of interconnected problems related to Syria that are destabilising the nation’s security …
This piece is drawn from Agenda for Change 2016: strategic choices for the next government. Regardless of their political stripes, the next Australian government has a solid foundation from which to approach cyber policy, comprised …
There’s a great deal to be positive about with the launch of the Australian Cyber Security Review and Strategy. Yes, it took a little longer than promised, but the headlines are good news for the …
With a war of words akin to the build-up to a heavyweight boxing match, the highly anticipated courtroom battle between Apple and the FBI was called off, leaving fight fans without a clear cut understanding …
‘In 30 years of practice I don’t think I’ve seen a legal brief that was more intended to smear the other side with false accusations and innuendo, and less intended to focus on the real …
Last week I gave a conference presentation examining how the public and private sectors work together, and at times clash, on issues of national security. Using Rod Lyon’s excellent schematic, I examined how the private …
The much-anticipated launch of the 2016 Defence White Paper presented the Australian government with an opportunity to set out a clear understanding of how it views the current and future cyber threat environment. It was …
The launch of the 2015 SDSR provided evidence that UK Defence and Security agencies are being re-invigorated after a period of extensive cuts. Over the next ten years £178 billion will be spent on a …
The Wednesday hacking of the Bureau of Meteorology (BoM) by apparent ‘Chinese’ actors was another example, if one was needed, of the persistent threat to Australian computer networks, both government and private sector. It’s a …