assessment

Vic Health tackles infosec after pathology malware infection

Vic Health tackles infosec after pathology malware infection

Sets up working group to push new controls statewide.
May 24 2017 10:56AM
The DTA has a half-billion dollar watchlist of IT projects

The DTA has a half-billion dollar watchlist of IT projects

And it's expected to grow.
May 23 2017 12:03PM
Big bucks for Immigration to build biometric and risk systems

Big bucks for Immigration to build biometric and risk systems

Budget 2017: To detect risky travellers before they arrive.
May 9 2017 8:16PM
CISOs' mojo lies in the metadata

CISOs' mojo lies in the metadata

[Blog post] Information surfaced has strategic advantage.
Oct 28 2014 9:52AM
Qld Justice to equip workplace inspectors with Windows tablets

Qld Justice to equip workplace inspectors with Windows tablets

Goes public for new app.
Aug 20 2014 3:20PM
NSW Govt execs face ICT management training

NSW Govt execs face ICT management training

Identified as competency weakness.
Nov 14 2012 7:00AM
Councils seek $200m for electronic DA systems

Councils seek $200m for electronic DA systems

Federal budget request.
Jan 28 2011 12:41PM
Facebook, Twitter fail latest security assessment

Facebook, Twitter fail latest security assessment

Lack of SSL authentication a major drawback.
Nov 8 2010 2:52PM
What not to do in the bid for compliance

What not to do in the bid for compliance

Compliance experts have advised organisations not to rely solely on technology in their quest for compliance.
Sep 2 2008 3:43PM
Vulnerability assessment

Vulnerability assessment

The environments in which we all work have become more complicated as the years have passed, and one of the outcomes is that they are far more difficult to test for vulnerabilities.
Aug 15 2008 11:43AM
Application vulnerability assessment 2007

Application vulnerability assessment 2007

For testing products connecting to the web, we needed to scan beyond the depth of a traditional network vulnerability assessment utility, says Justin Peltier.
Sep 26 2007 4:29PM
Review: Typhon

Review: Typhon

NGS Software Typhon is more of a traditional network vulnerability assessment tool with some application intelligence built in. The utility was able to locate FTP-based vulnerabilities on our test system, but had difficulties with web assessment.
Sep 24 2007 12:00AM
Review: Fortify Source Code Analysis

Review: Fortify Source Code Analysis

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the Source Code Analysis (SCA) suite.
Sep 13 2007 4:44PM
Review: AppDetectivePro

Review: AppDetectivePro

AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Sep 13 2007 4:43PM
Review: AppDetective

Review: AppDetective

AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Aug 27 2007 1:57PM
Review: Source Code Analysis Suite

Review: Source Code Analysis Suite

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Aug 20 2007 8:00AM
Review: AppScan 7.5

Review: AppScan 7.5

Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and were configured and run through a web browser.
Aug 1 2007 12:00AM
HP ventures into vulnerability assessment

HP ventures into vulnerability assessment

GLOBAL - SPI Dynamics buy adds security scanning to application life cycle offering.
Jun 21 2007 5:58PM
HP ventures into vulnerability assessment

HP ventures into vulnerability assessment

UK - Spi Dynamics aquisition adds security scanning to application life cycle
offering.
Jun 20 2007 5:30PM
Review: Core Impact 6.0

Review: Core Impact 6.0

Impact 6.0 from Core Security is a pure penetration testing tool. It is optimised for production use and comes with a suite of pre-programmed exploits. The support agreement provides regular updates with new exploits. Users can write their own exploits and can add to existing ones in the library. Impact can perform pre-configured scenarios or individual exploits.
May 15 2007 12:00AM

Log In

Username / Email:
Password:
  |  Forgot your password?