Vulnerable Australia Boosts National Cyber Security

Australia unveiled a multi-million-dollar cyber scheme to combat hacking recently, as Prime Minister Malcolm Turnbull acknowledged an attack on the country's weather bureau but stopped short of blaming it on China.

The Australian leader added that it was safe to assume "efforts are made by foreign actors, both governmental and non-governmental, to penetrate" local agencies.

"I can confirm reports that the Bureau of Meteorology suffered a significant cyber intrusion which was first discovered early last year, and the department of parliamentary services suffered a similar intrusion in recent years," Turnbull said in Sydney as he announced Aus$230 million (US$180 million) in new government funding.

"I don't have anything further to add than what I've said today," he replied when asked at a press conference if the weather bureau attack came from China.

The Australian Broadcasting Corporation in December cited an unnamed official blaming Beijing for the major cyber-attack, where hackers got inside computer systems at the bureau, which owns one of the nation's largest supercomputers and has links to the defense department.

Turnbull said the new funding, which comes on top of an allocation of Aus$400 million over the next decade to strengthen cyber security, would include support for regular meetings between government, businesses and researchers on tackling emerging concerns.

The additional money would also help to boost international efforts, particularly in the Indo-Pacific region, to take down cyber criminals.

"The Australian Crime Commission estimates the annual cost of cybercrime to Australia is over Aus$1 billion in direct costs," the prime minister added.

"But some estimates put the real costs to be as high as one percent of GDP (gross domestic product) a year, or about Aus$17 billion."

Turnbull said the government was focusing not just on defensive measures but also offense, stressing that the Australian Signals Directorate (ASD) -- like allies the United States and Britain -- had "very considerable capabilities", without elaborating.

Regional superpower China, Australia's largest trading partner, has been accused of organized hacking against the US government and private firms, as well as other countries.

In 2013, Chinese hackers were accused of stealing the top-secret blueprints of Australia's new intelligence agency headquarters.

Two years earlier the computers of the prime minister, foreign minister and defense minister were all suspected of being hacked in attacks reportedly originating in China.

Security Week

« Healthcare Execs Credit IT With Improving Care
Related Aspects Of A Breach: Impact Of Partners & Suppliers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Hexiosec

Hexiosec

Hexiosec (formerly Red Maple Technologies) is a technical consultancy and product company founded and run by engineers from the UK Intelligence and Defence communities.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.