auditor

RBA nails cyber posture: ANAO

RBA nails cyber posture: ANAO

Rare accolade from auditor.
Julian Bajkowski Jul 4 2019 11:08PM Financial Services
Australia Post told to improve cyber security practices

Australia Post told to improve cyber security practices

Auditor says risk aren't being managed "effectively".
Justin Hendry Jul 4 2019 10:56PM Security
Victoria's Myki retender at "significant risk" of repeating past mistakes

Victoria's Myki retender at "significant risk" of repeating past mistakes

State auditor urges immediate action.
Allie Coyne Jun 10 2015 12:05PM Software
Canberra Hospital embroiled in data scandal

Canberra Hospital embroiled in data scandal

Several insiders suspected to have manipulated emergency records.
John Hilvert Jul 4 2012 12:14PM Security
SA Health urged to expedite Oracle rollout

SA Health urged to expedite Oracle rollout

Six-month-late financial report highlights ongoing concerns.
John Hilvert , Ry Crozier Apr 11 2012 12:10PM Software
CenITex ratifies change management policy

CenITex ratifies change management policy

Rebuts auditor-general's criticisms.
Ry Crozier Nov 23 2011 11:14AM Financial Services
Melbourne Uni steams over supercomputer critique

Melbourne Uni steams over supercomputer critique

Auditor-General questions project's value for money.
Ry Crozier Jun 15 2011 3:20PM Financial Services
QLD scraps whole-of-Government services approach

QLD scraps whole-of-Government services approach

Audit reveals project management issues.
Liz Tay Jul 1 2010 6:52AM Strategy
Exposed: WA Govt IT security bungles

Exposed: WA Govt IT security bungles

Laundry list of flaws and stuff-ups.
Ry Crozier Mar 26 2010 6:00AM Security
Vic Councils upgrade IT systems for buying power

Vic Councils upgrade IT systems for buying power

Lack of oversight into procurement decisions.
Ry Crozier Feb 25 2010 3:43PM Software
Full blown audit into NBN tender

Full blown audit into NBN tender

The Auditor General has cancelled the Audit Office's preliminary inquiry into the failed NBN tender, opting instead for a full-blown performance audit.
Brett Winterford , Ben Grubb Jun 5 2009 11:41AM Telco/ISP
Review: Secure Auditor 2.0

Review: Secure Auditor 2.0

Secure Bytes Secure Auditor is actually a suite comprised of several different pieces designed to audit vulnerabilities across a broad range of systems.
Peter Stephenson, Sep 1 2008 3:02PM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Former federal auditor cops to hacking charge

Former federal auditor cops to hacking charge

An IT security expert once employed by the federal government now faces a five-year jail term after pleading guilty to monitoring the email and PC use of his superior, the U.S. Department of Justice said in a Wednesday statement.
Frank Washkuch Mar 2 2006 7:14PM Security
Review: Auditor Enterprise

Review: Auditor Enterprise

NetClarity’s Auditor is a fine example of a fully featured appliance that offers not just vulnerability assessment, but also ties results to compliance and ongoing information systems audit programs. Beginning from the superb documentation and ending with the high value for the money, this product shines.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: Ecora Enterprise Auditor

Review: Ecora Enterprise Auditor

Ecora Enterprise Auditor 3.5 is a comprehensive package tailored to fit into most contemporary IT environments.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Lockdown Auditor

Review: Lockdown Auditor

Lockdown Auditor is a 1U rack-mountable device that connects into a network and scans IP addresses for vulnerabilities.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Exchange Security Risk Auditor

Review: Exchange Security Risk Auditor

Administrators often forget that management of emails isn't simply a question of who can send or receive them, or the content. When email arrives it sits in the inbox, but who has permission to access that inbox, or other folders for that matter?

With high turnovers of employees becoming increasingly common, the stressed administrator may well lose track of individual permissions. For example, many companies usually have a set of freelance or contract email ­ accounts that can be assigned to temporary staff. The permissions required by one contractor may be far more extensive than those required by their successor, but they could very well inherit those permissions when they arrive. And human nature being what it is, inquiring minds will almost certainly take advantage of this, whether innocently or maliciously.

Craig Hinton Feb 1 2003 12:00AM Security

Log In

  |  Forgot your password?