{"id":10777,"date":"2018-08-26T11:18:40","date_gmt":"2018-08-26T11:18:40","guid":{"rendered":"http:\/\/9ec6b337-f973-4e89-8da5-1ca52f24661d"},"modified":"2018-08-26T11:18:40","modified_gmt":"2018-08-26T11:18:40","slug":"cyber-defence-goes-missing-in-australian-cabinet-reshuffle","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/","title":{"rendered":"Cyber defence goes missing in Australian Cabinet reshuffle"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/03\/20\/402e7f57-e194-4eeb-b7d3-a409bb927f00\/thumbnail\/770x578\/d2d93ab9dbab4a0ada06f0b195599feb\/cert-australia-cybersecurity-jcsc.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>A new prime minister needs to make a coded statement or two when choosing their new ministry. An obvious statement of <a href=\"https:\/\/www.zdnet.com\/article\/dutton-retains-home-affairs-and-fifield-communications-as-scott-morrison-unveils-ministry\/\" target=\"_blank\">Scott Morrison&#8217;s new ministry<\/a>, announced on Sunday, is that cybersecurity is no longer worth specific attention.<\/p>\n<p>Angus Taylor, who was previously the junior Minister for Law Enforcement and Cyber Security under Home Affairs Minister Peter Dutton, is now the Minister for Energy. I&#8217;m sure we&#8217;ll all appreciate his views on what he&#8217;s called the <a href=\"https:\/\/www.theguardian.com\/world\/2014\/jul\/25\/the-inconvenient-truth-in-the-push-to-scrap-the-renewable-energy-target\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;new climate religion&#8221;<\/a>, which has &#8220;little basis on fact and everything to do with blind faith&#8221;. We may also be amused by his support for <a href=\"https:\/\/stopthesethings.com\/2015\/10\/27\/angus-taylor-mp-retailer-boycott-wind-farms-will-not-be-built-where-there-is-negative-community-reaction\/\" target=\"_blank\" rel=\"noopener noreferrer\">loopy theories<\/a> about the dangers of wind farms.<\/p>\n<p>But Taylor hasn&#8217;t been replaced. There&#8217;s now no specific focus on law enforcement and cybersecurity. Those responsibilities have apparently been absorbed back into the general ministerial overview and guidance provided by Dutton himself.<\/p>\n<p>While he&#8217;s still Minister for Home Affairs, Dutton has lost the Immigration portfolio. That was a slab of work. One might argue, therefore, that he now has more time on his hands, and that a junior minister for the cybers is no longer needed.<\/p>\n<p>First, Dutton isn&#8217;t exactly strong on the idea that digital communications need to be protected. As a former cop, and as what might politely be called a law-and-order maximalist, Dutton sees digital communications as something to be intercepted, and the more interception of it the better.<\/p>\n<p>Only in April, Dutton&#8217;s head of department Mike Pezzullo was sprung proposing that the Australian Signals Directorate (ASD) be allowed to <a href=\"https:\/\/www.zdnet.com\/article\/who-leaked-the-idea-of-asd-spying-on-australians-and-why\/\" target=\"_blank\">spy on Australian citizens<\/a>. While government figures attempted to hose that down as being <a href=\"http:\/\/www.abc.net.au\/news\/2018-04-29\/labor-blames-government-for-security-leak\/9708594\" target=\"_blank\" rel=\"noopener noreferrer\">not a &#8220;formal&#8221; proposal<\/a>, it was nevertheless somewhere in Pezzullo&#8217;s brain, and therefore in Dutton&#8217;s. Dutton would also not be averse to <a href=\"http:\/\/www.abc.net.au\/news\/2018-08-14\/australian-army-call-out-powers-peter-dutton\/10064716\" target=\"_blank\" rel=\"noopener noreferrer\">deploying soldiers on the streets<\/a>.<\/p>\n<p>It&#8217;s not too hard to imagine this duo seeing national security and digital privacy as being mutually exclusive, to the detriment of the latter. After all, the government is already misrepresenting the <a href=\"https:\/\/www.zdnet.com\/article\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\" target=\"_blank\">anti-encryption legislation<\/a> currently under consideration.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>While a junior minister might also be a close friend of Laura Norder, a second mind in the room could better represent the views of the cyber defenders. At the very least, they&#8217;d be better able to handle the intellectually challenging technicalities of the portfolio, something Dutton may not have the &#8230; er &#8230; time for.<\/p>\n<p>Second, the new government structure for Australia&#8217;s cyber defences is only eight weeks old.<\/p>\n<p>The ASD became a statutory authority, taking with it the Australian Cyber Security Centre (ACSC), on July 1. ASD reports to the Minister for Defence, now Christopher Pyne. Cybersecurity policy development, however, remains within the Department of Home Affairs. Sorting out how that will work in practice will take time.<\/p>\n<p>New <a href=\"https:\/\/www.zdnet.com\/article\/former-telstra-ciso-burgess-to-take-helm-of-asd\/\" target=\"_blank\">ASD chief Mike Burgess<\/a>, and ACSC boss Alastair MacGibbon, are both generally well-regarded, and have reputations for getting things done. But again, some dedicated ministerial resources might help smooth the integration of policy and process between Defence and Home Affairs.<\/p>\n<p>One can only hope that having set up the new cyber structures, and having installed good people to sort it out, that Australia will continue to move forward without dedicated ministerial oversight, or Malcolm Turnbull&#8217;s hands-on enthusiasm.<\/p>\n<p>On matters digital more broadly, it&#8217;s worth noting that Human Services Minister Michael Keenan continues to include Digital Transformation in his responsibilities. In Turnbull&#8217;s ministry, he was styled &#8220;Minister Assisting the Prime Minister for Digital Transformation&#8221;. Now he&#8217;s &#8220;Minister for Human Services and Digital Transformation&#8221;.<\/p>\n<p>Once more, the PM is no longer taking a hands-on approach, which some might see as demoting the importance of digital transformation. It also means that Keenan is now to blame when it all goes wrong.<\/p>\n<p>It&#8217;s also worth noting that Marise Payne, a reportedly competent defence minister who seems to understand the role of cybers in her portfolio, is now foreign minister. I expect her to continue to support Australia&#8217;s assertive diplomatic efforts in the cyber realm through our Ambassador for Cyber Affairs Dr Tobias Feakin.<\/p>\n<h3><strong>Related Coverage<\/strong><\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/dutton-retains-home-affairs-and-fifield-communications-as-scott-morrison-unveils-ministry\/\" target=\"_blank\">Dutton retains Home Affairs and Fifield Communications as Scott Morrison unveils ministry<\/a><\/strong><\/p>\n<p>Peter Dutton and Mitch Fifield will continue as Home Affairs and Communications ministers, respectively, while Karen Andrews will head up Industry, Science and Technology and Michael Keenan retains Human Services and Digital Transformation, with no cybersecurity department under the new Morrison government.<\/p>\n<p><strong><a href=\"https:\/\/hub.zdnet.com\/article\/treasurer-assumes-interim-responsibility-for-australias-national-security\/\">Treasurer assumes interim responsibility for Australia&#8217;s national security<\/a><\/strong><\/p>\n<p>After failing to take Liberal Party leadership from Prime Minister Malcolm Turnbull, Peter Dutton has resigned from his post as the head of Australia&#8217;s Home Affairs portfolio.<\/p>\n<p><strong><a href=\"https:\/\/hub.zdnet.com\/article\/taylor-praises-home-affairs-for-sparking-collaboration-within-government\/\">Taylor praises Home Affairs for sparking collaboration within government<\/a><\/strong><\/p>\n<p>Despite still pushing the &#8216;stop the bots&#8217; approach to cyber defence, Australia&#8217;s cyber minister didn&#8217;t touch on the impending &#8216;decryption&#8217; legislation.<\/p>\n<p><strong><a href=\"https:\/\/hub.zdnet.com\/article\/australian-government-committed-to-no-backdoors-taylor\/\">Australian government committed to &#8216;no backdoors&#8217;: Taylor<\/a><\/strong><\/p>\n<p>&#8216;We simply don&#8217;t need to weaken encryption in order to get what we need,&#8217; says cyber security minister Angus Taylor, but trust in our civilisation is crumbling.<\/p>\n<p><strong><a href=\"https:\/\/hub.zdnet.com\/article\/australian-government-bans-chinese-vendors-for-5g\/\">Australian government bans Chinese vendors for 5G<\/a><\/strong><\/p>\n<p>Huawei and ZTE have effectively been banned from taking place in 5G network rollouts in Australia, including 4G evolutionary networks, under a national security decision.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prime Minister Scott Morrison&#8217;s new ministry cuts the Australian government&#8217;s focus on cybersecurity at exactly the time it needs it most.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10778,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-10777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-26T11:18:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber defence goes missing in Australian Cabinet reshuffle\",\"datePublished\":\"2018-08-26T11:18:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/\"},\"wordCount\":880,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/\",\"name\":\"Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png\",\"datePublished\":\"2018-08-26T11:18:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber defence goes missing in Australian Cabinet reshuffle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/","og_locale":"en_US","og_type":"article","og_title":"Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-26T11:18:40+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber defence goes missing in Australian Cabinet reshuffle","datePublished":"2018-08-26T11:18:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/"},"wordCount":880,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/","name":"Cyber defence goes missing in Australian Cabinet reshuffle 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png","datePublished":"2018-08-26T11:18:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-defence-goes-missing-in-australian-cabinet-reshuffle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber defence goes missing in Australian Cabinet reshuffle"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10777"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10778"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}