PM commits $1.46 billion to improving cyber security networks
- 23 January, 2013 12:01
Prime Minister Julia Gillard.
Prime Minister Julia Gillard has announced that $1.46 billion has been set aside by the Australian federal government to strengthen cyber networks as part of a National Security Strategy (PDF).
The funding ,which will be spread out to the year 2020, is designed to strengthen what Gillard described as Australia’s “most sensitive” networks.
In addition, a new Australian Cyber Security Centre will be established by the end of 2013 which will combine existing cyber security capabilities across the Attorney-General’s Department, Defence, Australian Security Intelligence Organisation (ASIO), the Australian Federal Police (AFP) and the Australian Crime Commission in one location.
According to Gillard, the centre will provide Australia with an expanded and more agile response capability to deal with all cyber issues--be they related to government, industry, crime or security.
“Importantly it will also create a hub for greater collaboration with the private sector, state and territory governments and international partners to combat the full breadth of cyber threats,” she said during a speech delivered in Canberra.
“Malicious cyber activity will likely be with us for many decades to come, so we must be prepared for a long, persistent fight.”
Gillard also announced that she has established the Office of the Cyber Policy Coordinator to provide leadership and coordination.
“For the public sector, we must ensure that our most important networks are some of the hardest to compromise in the world,” she said.
“But government alone cannot develop a secure and safe digital environment.”
Gillard added that the federal government must continue to work closely with the information security industry and international partners to develop a set of “global norms” for online behaviour.
“The Internet must remain open but also be secure.”
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Tolly Report: Performance Survey of Virtual Environment Security
This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand and on-access scanning functions, during distributed definition updates. Click to download how the four competing options ranked against each other.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.