{"id":26063,"date":"2019-03-13T03:38:30","date_gmt":"2019-03-13T03:38:30","guid":{"rendered":"http:\/\/6dd6108f-dc39-4a24-96fe-5260a9e59da7"},"modified":"2019-03-13T03:38:30","modified_gmt":"2019-03-13T03:38:30","slug":"australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/","title":{"rendered":"Australia isn&#8217;t buying local cyber and the rest of the world might soon follow"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/12\/21\/8920823f-4f62-44af-911f-90ecbc0bf8a0\/thumbnail\/770x578\/eccda6541ed074de5142a5d1f774b27e\/istock-1006058058.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Organisations wanting to get off the ground in Australia have long battled with the tyranny of distance when selling on the global stage, but they have closed the gap over recent years, thanks to that little thing called the internet and the ability to transact through a cable.<\/p>\n<p>Lucky for them, especially since Australia isn&#8217;t overly interested in buying Australian when it comes to cybersecurity, Alex van Someren, Early Stage technology investor and partner at Amadeus Capital, told the AustCyber AllStars program at the Sydney Joint Cyber Security Centre on Monday.<\/p>\n<p>&#8220;Australian buyers are unwilling to buy Australian technology &#8230; that&#8217;s a crying shame, that&#8217;s a real missed opportunity in terms of supporting local creativity, and it&#8217;s particularly ironic because the impression that I get in the rest of the world is the respect that people have for Australian engineering and the quality of what&#8217;s actually produced is very high indeed,&#8221; he said.<\/p>\n<p>&#8220;It&#8217;s actually the opposite of the way that people are behaving locally.<\/p>\n<p>&#8220;It just seems crazy that [people are] not really exploiting the potential in Australia and the message I get from outside Australia is completely different.&#8221;<\/p>\n<p>However, Australian cyber organisations are now dealing with yet another roadblock to having their product consumed overseas and as van Someren highlighted, it&#8217;s Canberra that is having a global influence over how Australian cyber is portrayed.<\/p>\n<p>In July 2017, former Prime Minister Malcolm Turnbull <a href=\"https:\/\/www.zdnet.com\/article\/the-laws-of-australia-will-trump-the-laws-of-mathematics-turnbull\/\">announced his plan<\/a> to develop legislation that allows access to encrypted communications for law enforcement.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>That plan has <a href=\"https:\/\/www.zdnet.com\/article\/australian-anti-corruption-bodies-should-get-encryption-busting-powers-pjcis\/\">since emerged as<\/a> the <em>Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018<\/em>.<\/p>\n<p><strong>Read more: <a href=\"https:\/\/www.zdnet.com\/article\/whats-actually-in-australias-encryption-laws-everything-you-need-to-know\/\">What&#8217;s actually in Australia&#8217;s encryption laws? Everything you need to know<\/a><\/strong><\/p>\n<p>&#8220;If you set yourselves up as the place least welcoming to cybersecurity practitioners in the world, it&#8217;s definitely going to make it harder to build great cybersecurity businesses &#8212; sorry,&#8221; van Someren said of the <a href=\"https:\/\/www.zdnet.com\/article\/australia-now-has-encryption-busting-laws-as-labor-capitulates\/\">rushed legislation<\/a>.<\/p>\n<p>The Bill, coupled with the recent government email breach, certainly hasn&#8217;t helped Australia sell itself to the rest of the world, either.<\/p>\n<p>The&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/\">nation&#8217;s political parties were hit<\/a>&nbsp;in an&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/australian-government-computing-network-reset-following-security-incident\/\">online attack<\/a>&nbsp;last month that forced a password reset of all Australian Parliament House network users, including politicians and all of their staffers.<\/p>\n<p>&#8220;It has become clear that the local infrastructure of politicians email was not up to the mark and that is a genuine embarrassment because it is being used as an example that sophistication isn&#8217;t available [to Australian operations] &#8212; everybody in the world has breaches,&#8221; he said of the breach.<\/p>\n<p>According to van Someren, both of these cyber-related incidents have made it harder for the lives of those trying to be in business in cybersecurity.<\/p>\n<p>&#8220;It&#8217;s kind of unhelpful that your politicians decide you should have an unusually challenging legislative background to cybersecurity,&#8221; he added. &#8220;I don&#8217;t think it means investors will run away screaming &#8230; but many other places don&#8217;t have similar challenges.&#8221;<\/p>\n<p>Having more cyber companies locally could help an industry thrive, but one of the problems facing the emergence of more technology firms,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/data61-says-australia-is-still-missing-out-on-innovation-opportunity\/\">echoed by CSIRO<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/innovation-and-science-australia-calls-for-a-more-urgent-innovation-strategy\/\">government bodies<\/a>&nbsp;<em>ad nauseam,<\/em>&nbsp;is that Australia isn&#8217;t that good at converting inventions and research into a product or an industry.<\/p>\n<p>&#8220;Here&#8217;s the challenge: Building businesses isn&#8217;t the same as building science projects,&#8221; van Someren added.<\/p>\n<p>RELATED COVERAGE<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Early Stage technology investor and partner at Amadeus Capital, Alex van Someren, has warned the encryption-busting legislation hasn&#8217;t made Australia an attractive place to buy cyber from.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26064,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Australia isn&#039;t buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Australia isn&#039;t buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T03:38:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Australia isn&#8217;t buying local cyber and the rest of the world might soon follow\",\"datePublished\":\"2019-03-13T03:38:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/\",\"name\":\"Australia isn't buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg\",\"datePublished\":\"2019-03-13T03:38:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Australia isn&#8217;t buying local cyber and the rest of the world might soon follow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Australia isn't buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/","og_locale":"en_US","og_type":"article","og_title":"Australia isn't buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-13T03:38:30+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Australia isn&#8217;t buying local cyber and the rest of the world might soon follow","datePublished":"2019-03-13T03:38:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/"},"wordCount":589,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/","url":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/","name":"Australia isn't buying local cyber and the rest of the world might soon follow 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg","datePublished":"2019-03-13T03:38:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/australia-isnt-buying-local-cyber-and-the-rest-of-the-world-might-soon-follow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Australia isn&#8217;t buying local cyber and the rest of the world might soon follow"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26063"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26063\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26064"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}