Vulnerable Australia Boosts National Cyber Security

Australia unveiled a multi-million-dollar cyber scheme to combat hacking recently, as Prime Minister Malcolm Turnbull acknowledged an attack on the country's weather bureau but stopped short of blaming it on China.

The Australian leader added that it was safe to assume "efforts are made by foreign actors, both governmental and non-governmental, to penetrate" local agencies.

"I can confirm reports that the Bureau of Meteorology suffered a significant cyber intrusion which was first discovered early last year, and the department of parliamentary services suffered a similar intrusion in recent years," Turnbull said in Sydney as he announced Aus$230 million (US$180 million) in new government funding.

"I don't have anything further to add than what I've said today," he replied when asked at a press conference if the weather bureau attack came from China.

The Australian Broadcasting Corporation in December cited an unnamed official blaming Beijing for the major cyber-attack, where hackers got inside computer systems at the bureau, which owns one of the nation's largest supercomputers and has links to the defense department.

Turnbull said the new funding, which comes on top of an allocation of Aus$400 million over the next decade to strengthen cyber security, would include support for regular meetings between government, businesses and researchers on tackling emerging concerns.

The additional money would also help to boost international efforts, particularly in the Indo-Pacific region, to take down cyber criminals.

"The Australian Crime Commission estimates the annual cost of cybercrime to Australia is over Aus$1 billion in direct costs," the prime minister added.

"But some estimates put the real costs to be as high as one percent of GDP (gross domestic product) a year, or about Aus$17 billion."

Turnbull said the government was focusing not just on defensive measures but also offense, stressing that the Australian Signals Directorate (ASD) -- like allies the United States and Britain -- had "very considerable capabilities", without elaborating.

Regional superpower China, Australia's largest trading partner, has been accused of organized hacking against the US government and private firms, as well as other countries.

In 2013, Chinese hackers were accused of stealing the top-secret blueprints of Australia's new intelligence agency headquarters.

Two years earlier the computers of the prime minister, foreign minister and defense minister were all suspected of being hacked in attacks reportedly originating in China.

Security Week

« Healthcare Execs Credit IT With Improving Care
Related Aspects Of A Breach: Impact Of Partners & Suppliers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.