It was encouraging to read Microsoft’s thoughts on the transition to post-quantum cryptography—the new generation of encryption designed to resist future quantum computers. Few companies straddle as much of the quantum landscape, including hardware, error …
A patrol boat shadows an unflagged vessel near a cable landing station in the Pacific. There’s no nearby base. No time to escalate. But a single secure message, sent from a handheld device, alerts regional …
Australia’s security risks are sharpest where people and technology meet. This is the space where data flows, disinformation spreads and innovation thrives—and where defences can be breached. Australia’s Cyber Security Strategy recognises that lasting protection …
Is it possible to use the free market to drive the right incentives for organisations to appropriately prioritise cybersecurity? This was the subject of a recent discussion hosted by the University of New South Wales …
Australians expect the government to have the authority to intervene to keep communities safe during a bushfire, flood or cyclone. The same principle should apply in the digital age, where cyberattacks can cripple hospitals, shut …




