{"id":36717,"date":"2020-08-21T00:52:50","date_gmt":"2020-08-21T00:52:50","guid":{"rendered":"http:\/\/11322690-a21c-4594-825d-770017ec3b74"},"modified":"2020-08-21T00:52:50","modified_gmt":"2020-08-21T00:52:50","slug":"modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/","title":{"rendered":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2019\/10\/23\/828684bd-7d1a-4445-8e4b-3754324716b3\/thumbnail\/770x578\/b6ff8257b04b673e4b5896718dc0faf6\/digital-transformation.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Geoscience Australia has gone to market as part of its plans to further modernise its IT environment by shifting off legacy platforms and making continued improvements toward more modern platforms through 2021. <\/p>\n<p>In a request for tender, Geoscience Australia said it is seeking a service provider to act as the single point of contact for any IT-related incidents and requests; provide end user computing; and provision business and corporate applications. <\/p>\n<p>Additionally, Geoscience Australia also plans to upgrade from Skype for Business to Microsoft Teams for enterprise voice, video conferencing, and collaboration tools; make networking enhancements around remote access\/VPN and end of life elements; improve its record management system capabilities; and implement a customer relationship management system. <\/p>\n<p>Geoscience added there are plans to make further IT security enhancements so that it is in line with the <a href=\"https:\/\/www.zdnet.com\/article\/asd-essential-eight-cybersecurity-controls-not-essential-canberra\/\" target=\"_blank\" rel=\"noopener noreferrer\">Essential Eight controls<\/a> for mitigating cyber attacks, which entails reviewing all existing identity-related processes and automating&nbsp;&#8220;unnecessary manual steps&#8221; through single multifactor login. <\/p>\n<p>&#8220;As we deal with more and more networks and endpoints, identity has become important as one of many factors that act as the new network boundary. Identity gives us a powerful common layer that we can control across many different networks and endpoints,&#8221; Geoscience Australia said. <\/p>\n<p>&#8220;Identity is a critical component of the new chain of trust that binds and protects our resources across various endpoints in a way that facilitates our mobile workforce.&#8221; <\/p>\n<p>In a&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/anao-calls-out-low-self-assessments-of-commonwealth-cyber-compliance\/\">previous ANAO audit<\/a>&nbsp;on cyber resilience, Geoscience Australia was labelled as lacking where the Top Four mitigation strategies were concerned.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Following the ANAO probe, Geoscience Australia agreed to up its security posture, telling the Joint Committee of Public Accounts and Audit in March last year that it would be&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/geoscience-australia-to-be-top-4-compliant-after-unknown-executable-found\/\">compliant with the Top Four by 30 June 2019<\/a>. <\/p>\n<p>The Top Four are mandatory and the Essential Eight are recommended as best practice. &nbsp;<\/p>\n<p><strong>See also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/industry-report-calls-for-acsc-to-get-offensive-and-smaller-agencies-to-get-cyber-help\/\">Industry report calls for ACSC to get offensive and smaller agencies to get cyber help<\/a><\/strong> <\/p>\n<p>In its tender documents, Geoscience Australia also revealed how it is hoping to retire a &#8220;small number&#8221; of Window 7 devices, as well as upgrade the infrastructure of its existing Citrix-based remote desktop environment which is nearing the end of its life cycle. <\/p>\n<p>Geoscience Australia&#8217;s plans to carry out additional IT work follows work the agency has been undertaking over the last two years across its IT environment, specifically in end user computing, enterprise voice and collaboration, in-cloud compute, identity, database, and IT security. <\/p>\n<p>The IT service provider will be charged with providing support for Geoscience Australia&#8217;s headquarters based in the Australia Capital Territory and its remotes sites, such as its Alice Springs ground station and potentially Yarragadee in Western Australia, the tender documents said. <\/p>\n<p>The initial contract will be for three years, with the option to extend it to a maximum term of five years.<\/p>\n<p>Tender submissions close September 30, with an anticipated start date of April 2021. <\/p>\n<p>Geoscience Australia had previously said it would fix its culture by immersing its staff in the world of government-owned enterprise by&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/geoscience-australia-embedding-staff-within-australia-post-to-learn-its-culture\/\">learning from others<\/a>, such as Australia Post, that are &#8220;leading&#8221; the way. <\/p>\n<p>&#8220;We ended up sending four staff down to Melbourne to go work for Australia Post for 100 days to learn their culture internally and flew another 30 or 40 people down on day trips to see how they worked with continuous delivery and cloud engineering,&#8221; Geoscience Australia director of scientific computing Ole Nielson said at the time.<\/p>\n<h3>Related Coverage&nbsp;<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The government agency plans to make security upgrades that are in line with the Essential Eight and keep digital transformation a priority.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36718,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-21T00:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Modernisation and upping cyber compliance on the agenda for Geoscience Australia\",\"datePublished\":\"2020-08-21T00:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/\",\"name\":\"Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg\",\"datePublished\":\"2020-08-21T00:52:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modernisation and upping cyber compliance on the agenda for Geoscience Australia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/","og_locale":"en_US","og_type":"article","og_title":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-21T00:52:50+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia","datePublished":"2020-08-21T00:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/","url":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/","name":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg","datePublished":"2020-08-21T00:52:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/modernisation-and-upping-cyber-compliance-on-the-agenda-for-geoscience-australia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Modernisation and upping cyber compliance on the agenda for Geoscience Australia"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36717"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36718"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}