Vulnerable Australia Boosts National Cyber Security

Australia unveiled a multi-million-dollar cyber scheme to combat hacking recently, as Prime Minister Malcolm Turnbull acknowledged an attack on the country's weather bureau but stopped short of blaming it on China.

The Australian leader added that it was safe to assume "efforts are made by foreign actors, both governmental and non-governmental, to penetrate" local agencies.

"I can confirm reports that the Bureau of Meteorology suffered a significant cyber intrusion which was first discovered early last year, and the department of parliamentary services suffered a similar intrusion in recent years," Turnbull said in Sydney as he announced Aus$230 million (US$180 million) in new government funding.

"I don't have anything further to add than what I've said today," he replied when asked at a press conference if the weather bureau attack came from China.

The Australian Broadcasting Corporation in December cited an unnamed official blaming Beijing for the major cyber-attack, where hackers got inside computer systems at the bureau, which owns one of the nation's largest supercomputers and has links to the defense department.

Turnbull said the new funding, which comes on top of an allocation of Aus$400 million over the next decade to strengthen cyber security, would include support for regular meetings between government, businesses and researchers on tackling emerging concerns.

The additional money would also help to boost international efforts, particularly in the Indo-Pacific region, to take down cyber criminals.

"The Australian Crime Commission estimates the annual cost of cybercrime to Australia is over Aus$1 billion in direct costs," the prime minister added.

"But some estimates put the real costs to be as high as one percent of GDP (gross domestic product) a year, or about Aus$17 billion."

Turnbull said the government was focusing not just on defensive measures but also offense, stressing that the Australian Signals Directorate (ASD) -- like allies the United States and Britain -- had "very considerable capabilities", without elaborating.

Regional superpower China, Australia's largest trading partner, has been accused of organized hacking against the US government and private firms, as well as other countries.

In 2013, Chinese hackers were accused of stealing the top-secret blueprints of Australia's new intelligence agency headquarters.

Two years earlier the computers of the prime minister, foreign minister and defense minister were all suspected of being hacked in attacks reportedly originating in China.

Security Week

« Healthcare Execs Credit IT With Improving Care
Related Aspects Of A Breach: Impact Of Partners & Suppliers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.