Latest news
Search news stories
Enter a keyword to search news.
Advanced cyber deception techniques
![Professor Debi Ashenden](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-08/professor-debi-ashenden.jpg?h=03e6bad4&itok=w5IqNdsz)
Cyber attacks are increasingly automated, however at their core are people, no matter how remote they are.
Autonomous cyber defence tools
![Associate Professor Hung Nguyen](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-08/2022_09_30_straight_up_media_hung_nguyen_0006.jpg?h=21ab2bcd&itok=IJBXwnz5)
The digital networks we use every day for business, recreation and security have become so complex that it’s impossible for anyone to understand and eliminate all the vulnerabilities in a given system, even with the most advanced tools.