WEBSITEthe critical technology race?Who is leadingThe Critical Tech Tracker covers 64 critical technologies spanning defence, space,
energy, the environment, AI, biotech, robotics, cyber, computing, advanced materials
and key quantum technology areas. It provides a leading indicator of a
country’s research performance, strategic intent and potential future science and
technology capability.
EVENT
WEBSITEPRESSURE POINTSChina's air and maritime coercionEXPLORE THE INTERACTIVE MAP NOW

All Work

Reaction isn’t enough. Australia should aim at preventing cybercrime

In case we forgot, Typhoon attacks remind us of China’s cyber capability—and intent

State-sponsored economic cyber-espionage for commercial purposes: Governmental practices in protecting IP-intensive industries

State-sponsored economic cyber-espionage for commercial purposes: Assessing the preparedness of emerging economies to defend against cyber-enabled IP theft

Stop the World, an ASPI Podcast - bannerASPI 2024

Building cyber resilience with Lieutenant General Michelle McGuinness

Jaque Silva/SOPA Images/LightRocket via Getty Images.Jaque Silva/SOPA Images/LightRocket via Getty Images.

Cyber security means sticking with trusted, not any, providers

Data protection, binary code with China flag. Photo: Getty Images.Data protection, binary code with China flag. Photo: Getty Images.

China’s hackers targeted our MPs. We need to talk about this relationship

Exfiltrate, encrypt, extort - static bannerProduced by Jake Moody of Leading Hand Design

Exfiltrate, encrypt, extort

Defining offensive cyber capabilities - static bannerPhotograph by Flickr user: John McSporran

Defining offensive cyber capabilities

Tank firing

Australia’s Offensive Cyber Capability