Applications have forced a change in the way we approach national security. Specifically, application security has become one of the primary concerns when it comes to protecting our critical infrastructure.
The reality is that software underpinning essential systems is one of the weakest links in ensuring operational resilience and public safety. To keep our critical infrastructure running smoothly and safely, we need to regard application security the same way we regard the importance of securing physical assets like airports, energy grids, or water treatment facilities.
While ‘critical infrastructure’ historically meant assets we could touch – bridges, roads, hospitals, with digital transformation now in full swing, all eyes are on the applications keeping those systems running.
Digitising operations brings huge benefits, like efficiency and innovation, but it also introduces risks. A single software vulnerability could open the door for hackers to wreak havoc, disrupt services, and even threaten public safety.
Cyberattacks targeting these systems through their applications are not a ‘what if’ scenario. They’re happening now, and the consequences are very real.
The notorious data breach against one of Australia’s largest telecommunications providers, which saw the personal information of up to 10 million people compromised, was linked to a vulnerability in the company’s application programming interface (API) that allowed unauthorised access to customer data.
These attacks make one thing very clear: Attackers are quick to exploit weaknesses, and the damage can ripple far and wide.
The problem is getting worse – cybercriminals are upping their game with advanced tools like AI and machine learning to sniff out vulnerabilities. Supply chain attacks are also becoming more common. Many applications rely on open-source libraries or third-party APIs, and if just one of those has a vulnerability, it can create a domino effect across multiple systems. Even a small flaw can lead to big problems.
Security by design
Organisations need to change how they think about security. It’s not just something to tack on at the end; it must be baked into every stage of application development. Security must be built into the DNA of software. This means conducting regular code reviews, running penetration tests, and using strong authentication protocols.
It also means breaking down silos between developers and security teams. DevSecOps – integrating development, security, and operations practices – is the most effective way to ensure security isn’t merely an afterthought, but part of the process from day one.
Assuming the issue is strictly a technological one is a mistake – people play a large role in this too. More than just developers and IT teams requiring ongoing training to stay ahead of new threats and maintain evolving best practices, we can’t forget about the full workforce. Everyone needs to be aware of risks such as phishing scams and other tricks attackers use to get inside systems. Unfortunately, human error is still a major factor in many successful attacks. Some research suggests the number is as high as 88%.
Collaboration is key
Governments are starting to take notice and roll out new guidelines to help tackle these challenges. In 2024, the Australian Government introduced the Security of Critical Infrastructure and Other Legislation Amendment to implement measures proposed by the 2023–2030 Australian Cyber Security Strategy, noting specifically the need to “expand the government assistance framework to facilitate the management of consequences of impacts of incidents on critical infrastructure assets,” among other things.
While these steps mark progress, they’re not enough on their own. Addressing these challenges demands ongoing collaboration between the public and private sectors to share intelligence and coordinate responses to both threats and service outages.
Information-sharing platforms and joint task forces can go a long way to closing knowledge gaps and improving security. As so much critical infrastructure is owned by private companies, their involvement is crucial. They’re on the front lines and need to be part of the solution.
Education is another cornerstone of effective IT and cybersecurity. A dual focus is needed: arming government and industry leaders with a deeper understanding of the threat landscape while also ensuring organisations across all sectors have the tools and resources needed to strengthen their defences.
Looking ahead
We need to lean into innovation to keep up with evolving threats. The possibilities for business advancement and efficiency are driving us into a bold new chapter powered by automation and intelligence, with tools being developed daily that are revolutionising our ability to fight back against cyberthreats. But we need to use these tools wisely, understanding their strengths and limitations.
The bottom line is this: digital transformation has completely changed the game for critical infrastructure. While it’s opened the door to amazing possibilities, it’s also made us more vulnerable. Application security isn’t just a technical issue – it’s a matter of national security.
By prioritising security from the start, working together, and staying at the forefront of innovation and new technology, we can protect the systems that keep your world running.














