Media and Resources

Stay up-to-date with all the news and views from the CSCRC.

13/7/2022

New Cyber Honeypot Tech Lures Thieves

Australian students, researchers and industry professionals have developed a suite of cutting-edge cyber honeypot technology. DecaaS (Deception as a Service) uses machine learning models to create highly realistic but fake versions of data and digital assets that are attractive to hackers.

13/7/2022

Cyber Security CRC and CSIRO Projects named winners at NSW IAWARDS

Two cutting-edge research projects led by the Cyber Security Cooperative Research Centre and CSIRO’s Data61 have been recognised as winners at the New South Wales iAwards 2022.

11/2/2022

REPORT: HOW SMALL BUSINESSES CAN BUILD CYBER STRENGTH AND SMARTS

Small-to-medium enterprises (SMEs) are the lifeblood of Australia’s economy, comprising more than 90 per cent of the economy. However, when it comes to cyber security uplift, the sector faces many challenges. An Australian-first pilot project carried out by the CSCRC, in collaboration with CyberCX and CSIRO’s Data61 has identified common weaknesses in organisations and offers practical solutions to help overcome some of the barriers.

1/11/2021

CSCRC ransomware campaign drives awareness

Ransomware attacks across Australia continue to bring businesses to their knees, causing massive disruptions and costing millions to remediate. Alarmingly, however, most Australians have a limited understanding of how ransomware attacks occur, which is why the Cyber Security Cooperative Research Centre (CSCRC) has launched a new awareness campaign, Be aware of ransomware.

12/10/2021

Cyber insurance driving ransomware threat, says CSCRC

While cyber insurance can play a positive role in uplifting cyber security, the payment of ransoms by insurers should be banned, according to a new Cyber Security Cooperative Research Centre (CSCRC) policy paper.

6/5/2021

Game-Changing Data Privacy Tool to Shore Up Secure Data Sharing

A new online privacy tool will help Australian organisations assess the risk of data theft and help ensure targeted and effective cyber security protections are implemented.