Vulnerable Australia Boosts National Cyber Security

Australia unveiled a multi-million-dollar cyber scheme to combat hacking recently, as Prime Minister Malcolm Turnbull acknowledged an attack on the country's weather bureau but stopped short of blaming it on China.

The Australian leader added that it was safe to assume "efforts are made by foreign actors, both governmental and non-governmental, to penetrate" local agencies.

"I can confirm reports that the Bureau of Meteorology suffered a significant cyber intrusion which was first discovered early last year, and the department of parliamentary services suffered a similar intrusion in recent years," Turnbull said in Sydney as he announced Aus$230 million (US$180 million) in new government funding.

"I don't have anything further to add than what I've said today," he replied when asked at a press conference if the weather bureau attack came from China.

The Australian Broadcasting Corporation in December cited an unnamed official blaming Beijing for the major cyber-attack, where hackers got inside computer systems at the bureau, which owns one of the nation's largest supercomputers and has links to the defense department.

Turnbull said the new funding, which comes on top of an allocation of Aus$400 million over the next decade to strengthen cyber security, would include support for regular meetings between government, businesses and researchers on tackling emerging concerns.

The additional money would also help to boost international efforts, particularly in the Indo-Pacific region, to take down cyber criminals.

"The Australian Crime Commission estimates the annual cost of cybercrime to Australia is over Aus$1 billion in direct costs," the prime minister added.

"But some estimates put the real costs to be as high as one percent of GDP (gross domestic product) a year, or about Aus$17 billion."

Turnbull said the government was focusing not just on defensive measures but also offense, stressing that the Australian Signals Directorate (ASD) -- like allies the United States and Britain -- had "very considerable capabilities", without elaborating.

Regional superpower China, Australia's largest trading partner, has been accused of organized hacking against the US government and private firms, as well as other countries.

In 2013, Chinese hackers were accused of stealing the top-secret blueprints of Australia's new intelligence agency headquarters.

Two years earlier the computers of the prime minister, foreign minister and defense minister were all suspected of being hacked in attacks reportedly originating in China.

Security Week

« Healthcare Execs Credit IT With Improving Care
Related Aspects Of A Breach: Impact Of Partners & Suppliers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.