News: Information Influence and Cyber
Professor Olaf Maennel appointed Joint Chair in Cybersecurity
![Professor Olaf Maennuel](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2025-01/professor-olaf-maennel.jpg?h=f0d95172&itok=orDAuPNY)
We’re excited to announce Professor Olaf Maennel has been appointed to the position of Defence Science and Technology Group - University of Adelaide Joint Chair in Cybersecurity. This position is co-funded by DSTG and the University of Adelaide.
[Read more about Professor Olaf Maennel appointed Joint Chair in Cybersecurity]
Influencing regional security
![Professor Joanne Wallis](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-09/joanne-2.jpg?h=d7251bd8&itok=QfAtmPKS)
Australia’s relationships in the Pacific Islands region have always been important to successive governments but never more so than in these times of global upheaval.
Creating resilience against mass influence campaigns
![Dr Rachel Stephens](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-09/rachelstephens.jpg?h=6f3f5d60&itok=pIMK3wYF)
With the volume of information – whether genuine or misinformation – available, how can we help people develop their critical thinking skills and build resilience against mass influence campaigns?
[Read more about Creating resilience against mass influence campaigns]
Understanding mass influence campaigns
![Associate Professor Carolyn Semmler](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-09/29553_uoa-2.jpg?h=e19d3d3d&itok=kwdtadCE)
Cyber-based attacks are not just limited to security networks.
Advanced cyber deception techniques
![Professor Debi Ashenden](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-08/professor-debi-ashenden.jpg?h=03e6bad4&itok=w5IqNdsz)
Cyber attacks are increasingly automated, however at their core are people, no matter how remote they are.
Autonomous cyber defence tools
![Associate Professor Hung Nguyen](/defence-security/sites/default/files/styles/ua_landscape/public/media/images/2023-08/2022_09_30_straight_up_media_hung_nguyen_0006.jpg?h=21ab2bcd&itok=IJBXwnz5)
The digital networks we use every day for business, recreation and security have become so complex that it’s impossible for anyone to understand and eliminate all the vulnerabilities in a given system, even with the most advanced tools.