The Australian Government has unveiled its new Cyber Security Strategy for 2023-2030, which aims to protect against escalating cyber threats through a layered approach. The strategy introduces six ‘shields’ designed to empower Australian citizens and businesses. Shields five and six focus on sovereign capabilities and resilient region and global leadership respectively. Shield five aims to bolster Australia’s cyber skills and encourage technological innovation, while shield six underlines the importance of securing government agencies by adopting internationally recognized zero-trust approaches. The move to zero trust architecture is underpinned by Attribute-Based Access Control (ABAC) technology. ABAC enables dynamic access control to information and helps with digital forensics in the case of a breach. The strategy also highlights the importance of developing sovereign technology and supporting Australian businesses in the cyber sector. Overall, the Cyber Security Strategy signals a commitment to addressing cyber threats and building Australia’s cyber capabilities.
iTWire – Unleash the Power of the Six Shields of Cyber Security
Latest from Blog
Financial sector prime target for DDoS attacks, Akamai study finds
TLDR: – Financial services sector remains the top target for DDoS attacks for the second consecutive year – APJ region faces significant cybersecurity challenges with a high threat score for phishing A
Watch out for serverless architecture’s cybersecurity risks for businesses
Serverless Architecture and Cybersecurity Risks TLDR: Move towards serverless architecture presents new security challenges Threat actors are exploring vulnerabilities in serverless environments Today’s cybersecurity landscape is rapidly evolving with the adoption of
Ivanti alerts on exploited CSA vulnerability in recent cyber attacks
Article Summary TLDR: Ivanti warns of critical Cloud Services Appliance (CSA) flaw being exploited in attacks Threat actors are exploiting CVE-2024-8963 admin bypass vulnerability to access restricted functionality Ivanti Warns of Another
Beware Vanilla Tempest hackers target healthcare sectors, Microsoft alerts
TLDR: Vanilla Tempest, a ransomware group, is targeting healthcare organizations in the US using a new ransomware strain called “INC.” The attackers use tools like Supper backdoor, AnyDesk, and MEGA to further
Internet baffled by mysterious ‘Noise Storms’ stumping experts
TLDR: Internet intelligence firm GreyNoise has been tracking large waves of “Noise Storms” containing spoofed internet traffic since January 2020 The purpose and origin of these noise storms, suspected to be covert
Top 20 Linux Admin Tools for 2024
TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary
Evergy chooses OneLayer Bridge for private LTE network management and security
TLDR: Evergy has selected OneLayer Bridge for private LTE network management and security in a multi-year deal. The platform will help manage and secure thousands of devices on Evergy’s private LTE network,
Bogus job tempts aerospace, energy workers
TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives
Picus Security Secures $45M for Enhanced Exposure Management Solutions
TLDR: Picus Security has received a $45M investment from Riverwood Capital to enhance its exposure management platform. The investment will help Picus expand its capabilities in attack surface management, automated penetration testing,
Secure solar power with effective cybersecurity for renewable energy success
TLDR: Solar energy systems are vulnerable to outside attacks through inverters, microgrids, and DoS attacks. Cybersecurity professionals can protect solar energy by teaching security, updating software, and setting up a strong firewall.