Australia To Spend Another A$1billion On Cyber Security

Over the next decade Australia will spend A$1.35 billion (US$926.1 million) on its cyber security defence, Prime Minister Scott Morrison has said recently while the Australian capital Canberra has suffered a wave of serious cyber attacks.  The Australian Prime Minister has  said a “sophisticated state-based actor” has been cyber-attacking many areas of government, essential services and aspects of the critical infrastructure.

Although they have not laid blame for the attacks, a number of expert sources have told our correspondent that they think China is behind the attacks.

“The federal government’s top priority is protecting our nation’s economy, national security and sovereignty. Malicious cyber activity undermines that,” Morrison said in a statement.

The expenditure includes A$470 million for an extra 500 security experts in the Australian Signals Directorate, which is the country’s cyber intelligence agency. This investment is part of a A$15 billion in cyber warfare capabilities, Australia’s Minister for Defence Linda Reynolds said, a plan that was accelerated after an electronic attack on Australia’s parliament in 2019.

Australian is a part of the Five Eyes intelligence network, along with Britain, Canada, New Zealand and the United States but its cybersecurity funding pales compared to cyber-powers such as the US, China or Russia. The funding is intended to ensure Australia has the tools and capabilities to fight back and keep itself safe. 

Despite being major trade partners, Australia has not help back in criticising China, recently calling for an investigation into the origins of the coronavirus pandemic. It has also spoken out over what it describes as China's economic "coercion", covert influence campaigns and the use of technology companies like Huawei as a tool of intelligence-gathering and geopolitical leverage. In response, China has warned its students and tourists against going to Australia, applied trade sanctions on Australian goods and sentenced an Australian citizen to death for drug trafficking.

Cyber security startups have called on the Australian government to use the funds to help Australian businesses develop herd immunity from cyber-attacks.

"Using the COVID-19 analogy, Australia needs herd immunity to guard against the most determined attackers," Sam Crowther, the founder of cyber security startup Kasada, said. 

As part of the investment plan, A$12 million would be spent on "active disruption" options to protect Australian users to enable  Australia's major telecommunications providers to prevent malicious cyber activity from reaching millions of Australians by blocking known malicious websites and computer viruses. The Government said further details would be revealed when it released its 2020 Cyber Security Strategy.

Reuters:       WIO News:     Sydney Morning Herald:      ABC

You Might Also Read: 

Australia Creates Regional Cyber Innovation Centres:

 

« Attacks On Financial Services Are Increasingly Sophisticated
Security Risks of Contactless Payment »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.