Whitepaper

The Big Problem with Small Drones

KEY TAKE AWAYS Exponential growth in small Unmanned Aerial Systems (sUAS) is creating new risks for governments. State and non-state actors are increasingly employing military- and consumer-grade sUAS to attack personnel, facilities and critical infrastructure. Governments must employ a multi-layered approach to counter sUAS and keep pace with emerging threats. Counter-sUAS solutions must be cost

The Big Problem with Small Drones Read More »

Mission-Critical Broadband Device Procurement

Today’s PPDR (Public Protection and Disaster Relief) devices are still mostly built on narrowband technologies, providing mission-critical voice and short messaging services. These services are often available within nationwide PPDR network coverage, utilising dedicated frequency bands. The narrowband PPDR device ecosystem is well established, including infrastructure and terminal suppliers, system integrators, service providers and resellers.

Mission-Critical Broadband Device Procurement Read More »

Balancing the pendulum

Data is valuable. A host of organisations, including governments at all levels, insurance companies, banks, transport operators, health service providers and more, have massive datasets and many are happy to share de-identified data for the public good. Data sharing can boost economic growth and propel innovation. But there are privacy and other ethical implications. Practical

Balancing the pendulum Read More »

Growing Globally Competitive Industries: Powered by Australia’s innovation technology

The past decade has seen an acceleration in changes to the world’s economic, political, environmental and social frameworks. Global economies are becoming more competitive more rapidly. Australia has both a significant opportunity to benefit as it has a challenge to keep pace and compete. Technology is driving the growth globally; it is both solving and

Growing Globally Competitive Industries: Powered by Australia’s innovation technology Read More »

Understanding Cyber Attacks

The changing threat landscape reality and the frequency, sophistication and targeted nature of adversaries requires an evolution of security operational practices with a combination of prevention, detection and response of cyberattacks. Most organization have the means to detect known attacks, although a few of these can still slip by. What has been historically difficult is

Understanding Cyber Attacks Read More »