Latest News
CBA to move more SAP workloads onto AWS
Legacy CAD system hampers Victoria's triple zero agency
WhatsApp to launch cloud-based tools, premium features
Canada to ban Huawei and ZTE 5G equipment, joining Five Eyes allies
China spied on Russian defence research institutes
Australia Edition
Asia Edition
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
RESOURCES
PODCAST
STATE OF IT
DIGITAL NATION
BENCHMARK AWARDS
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCE
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
EVENTS
Insights
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
PROMOTED CONTENT
REPORTS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCE
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
RESOURCES
EVENTS
Insights
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
PROMOTED CONTENT
REPORTS
PODCAST
STATE OF IT
DIGITAL NATION
BENCHMARK AWARDS
Australia Edition
Asia Edition
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
assessment
Vic Health tackles infosec after pathology malware infection
Sets up working group to push new controls statewide.
May 24 2017 10:56AM
The DTA has a half-billion dollar watchlist of IT projects
And it's expected to grow.
May 23 2017 12:03PM
Big bucks for Immigration to build biometric and risk systems
Budget 2017: To detect risky travellers before they arrive.
May 9 2017 8:16PM
CISOs' mojo lies in the metadata
[Blog post] Information surfaced has strategic advantage.
Oct 28 2014 9:52AM
Qld Justice to equip workplace inspectors with Windows tablets
Goes public for new app.
Aug 20 2014 3:20PM
NSW Govt execs face ICT management training
Identified as competency weakness.
Nov 14 2012 7:00AM
Councils seek $200m for electronic DA systems
Federal budget request.
Jan 28 2011 12:41PM
Facebook, Twitter fail latest security assessment
Lack of SSL authentication a major drawback.
Nov 8 2010 2:52PM
What not to do in the bid for compliance
Compliance experts have advised organisations not to rely solely on technology in their quest for compliance.
Sep 2 2008 3:43PM
Vulnerability assessment
The environments in which we all work have become more complicated as the years have passed, and one of the outcomes is that they are far more difficult to test for vulnerabilities.
Aug 15 2008 11:43AM
Application vulnerability assessment 2007
For testing products connecting to the web, we needed to scan beyond the depth of a traditional network vulnerability assessment utility, says
Justin Peltier
.
Sep 26 2007 4:29PM
Review: Typhon
NGS Software Typhon is more of a traditional network vulnerability assessment tool with some application intelligence built in. The utility was able to locate FTP-based vulnerabilities on our test system, but had difficulties with web assessment.
Sep 24 2007 12:00AM
Review: Fortify Source Code Analysis
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the Source Code Analysis (SCA) suite.
Sep 13 2007 4:44PM
Review: AppDetectivePro
AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Sep 13 2007 4:43PM
Review: AppDetective
AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Aug 27 2007 1:57PM
Review: Source Code Analysis Suite
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Aug 20 2007 8:00AM
Review: AppScan 7.5
Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and were configured and run through a web browser.
Aug 1 2007 12:00AM
HP ventures into vulnerability assessment
GLOBAL - SPI Dynamics buy adds security scanning to application life cycle offering.
Jun 21 2007 5:58PM
HP ventures into vulnerability assessment
UK - Spi Dynamics aquisition adds security scanning to application life cycle
offering.
Jun 20 2007 5:30PM
Review: Core Impact 6.0
Impact 6.0 from Core Security is a pure penetration testing tool. It is optimised for production use and comes with a suite of pre-programmed exploits. The support agreement provides regular updates with new exploits. Users can write their own exploits and can add to existing ones in the library. Impact can perform pre-configured scenarios or individual exploits.
May 15 2007 12:00AM
Next
Most popular tech stories
COVER STORY: Technology alone can't beat cybercrime. Attack the economic triggers say CISOs
Can DahsNFT solve a big problem with metaverses? — Moving between them
Cyber crime is a team sport, say CISOs
Analysis: Personalisation was a myth says Adobe APAC president, but not anymore
Boardroom Impact: Critical infrastructure
Gallery: See who was at Channel Meets: UC in Sydney
See our gallery of who was in Melbourne for Channel Meets: UC?
Enter CRN's 2022 Impact Awards now!
Protection needed for small sellers on online platforms, Ombud says
Defence to look to the channel for data and analytics
5 essential digital transformation ideas
Venom BlackBook Zero 15 Phantom
Top 5 Benefits of Managed IT Services
Facebook, LinkedIn or Instagram? Social media success isn’t one size fits all
Digital dystopia: your reputation is on the line
IoT Impact Conference
IoT Insights conference, Orange NSW: Digital Food & Agribusiness
IoT Impact moving to June 9
2021 IoT Awards winners announced
How IoT is helping transport and logistics industries
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?