Despite information security figuring in the defence and national security consciousness since well before the end of the Cold War, we remain in the early days of cyber. For some years after September 2001, when …
Chinese Communist Party leaders use ‘collective study sessions’ to identify emerging technologies that they can harness politically. Given the merging of civil and military industrial goals in China, the international community needs to recognise the …
The Chinese Communist Party’s foreign influence work is not reduced to one single dedicated organ; instead, state, party and military agencies have fronts that engage in influence operations and are led by CCP’s top leadership. …
Increasingly, people worry about the concentration of power in the digital environment, and the control that large companies exercise over users’ data and experiences online. The Australian government has opted to regulate ‘big tech’ for …
When you type a website address into your browser, you expect that it will take you to the site you’re trying to visit. Increasingly, however, criminals and even state-backed hackers are using a technique known …