Latest News
HealthEngine to build Australia's vaccine booking platform
Better customer engagement requires a new mindset
ABS rebuilds incident response ahead of 2021 Census
VicRoads to partner with private sector for rego system overhaul
US agency probes Facebook for 'systemic' racial bias in hiring, promotions
LOG IN
SUBSCRIBE
GOVERNMENT
SECURITY
FINANCE
BENCHMARK AWARDS
DIGITAL NATION
Search
GOVERNMENT
SECURITY
FINANCE
BENCHMARK AWARDS
DIGITAL NATION
Log In
Username:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
assessment
Vic Health tackles infosec after pathology malware infection
Sets up working group to push new controls statewide.
May 24 2017 10:56AM
The DTA has a half-billion dollar watchlist of IT projects
And it's expected to grow.
May 23 2017 12:03PM
Big bucks for Immigration to build biometric and risk systems
Budget 2017: To detect risky travellers before they arrive.
May 9 2017 8:16PM
CISOs' mojo lies in the metadata
[Blog post] Information surfaced has strategic advantage.
Oct 28 2014 9:52AM
Qld Justice to equip workplace inspectors with Windows tablets
Goes public for new app.
Aug 20 2014 3:20PM
NSW Govt execs face ICT management training
Identified as competency weakness.
Nov 14 2012 7:00AM
Councils seek $200m for electronic DA systems
Federal budget request.
Jan 28 2011 12:41PM
Facebook, Twitter fail latest security assessment
Lack of SSL authentication a major drawback.
Nov 8 2010 2:52PM
What not to do in the bid for compliance
Compliance experts have advised organisations not to rely solely on technology in their quest for compliance.
Sep 2 2008 3:43PM
Vulnerability assessment
The environments in which we all work have become more complicated as the years have passed, and one of the outcomes is that they are far more difficult to test for vulnerabilities.
Aug 15 2008 11:43AM
Application vulnerability assessment 2007
For testing products connecting to the web, we needed to scan beyond the depth of a traditional network vulnerability assessment utility, says
Justin Peltier
.
Sep 26 2007 4:29PM
Review: Typhon
NGS Software Typhon is more of a traditional network vulnerability assessment tool with some application intelligence built in. The utility was able to locate FTP-based vulnerabilities on our test system, but had difficulties with web assessment.
Sep 24 2007 12:00AM
Review: Fortify Source Code Analysis
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the Source Code Analysis (SCA) suite.
Sep 13 2007 4:44PM
Review: AppDetectivePro
AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Sep 13 2007 4:43PM
Review: AppDetective
AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Aug 27 2007 1:57PM
Review: Source Code Analysis Suite
The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Aug 20 2007 8:00AM
Review: AppScan 7.5
Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and were configured and run through a web browser.
Aug 1 2007 12:00AM
HP ventures into vulnerability assessment
GLOBAL - SPI Dynamics buy adds security scanning to application life cycle offering.
Jun 21 2007 5:58PM
HP ventures into vulnerability assessment
UK - Spi Dynamics aquisition adds security scanning to application life cycle
offering.
Jun 20 2007 5:30PM
Review: Core Impact 6.0
Impact 6.0 from Core Security is a pure penetration testing tool. It is optimised for production use and comes with a suite of pre-programmed exploits. The support agreement provides regular updates with new exploits. Users can write their own exploits and can add to existing ones in the library. Impact can perform pre-configured scenarios or individual exploits.
May 15 2007 12:00AM
Next
Most popular tech stories
CBA becomes first 'Big 4' data recipient under CDR
NSW Police green-lights Mark43 for $1bn COPS overhaul
Urgent patches out for exploited Exchange Server zero-days
NBN Co to start consulting on gigabit speeds for FTTC
CBA loses open banking chief product owner to Atlassian
Who was spotted at CRN Kickstarter 2021?
Microsoft’s 10 Biggest Azure announcements at Ignite 2021
Snowflake names VMware veteran Jon Robertson as APJ boss
Court rejects HPE Australia's appeal of unpaid commissions case
Macquarie leaves Telstra for $34M 5G deal with Optus
How long will a UPS keep your computers on if the lights go out?
Combatting e-waste by paying you $500 for your seven-year-old laptop? How does it work and why isn’t everyone doing it?
How do I make sure my email is properly synced between all my computers?
How to recover deleted emails in Gmail
Customer experience in 2021: The future of CX
IoTAA publishes IoT security, safety and privacy guides
Meet the Australian electronics manufacturer that sidestepped the lockdown
How to approach critical infrastructure cybersecurity
Hand sanitiser dispensers raise IOT security concern
NSW Government launches NSW Spatial Digital Twin
Log In
Don't have an account? Register now!
Username / Email:
Password:
Remember me
|
Forgot your password?