Latest News
AI summarisers open to 'ClickFix' social engineering attacks
Qantas makes architectural changes to its API management platform
Attackers weaponise Linux file names as malware vectors
xAI sues Apple and OpenAI
Verint bought by Thoma Bravo in US$2 billion deal
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
penetration
penetration
Pen testing firm pulls DEF CON talk over Fed exclusion
Says DEF CON should 'encourage openness'.
Darren Pauli
Jul 12 2013 2:02PM
Security
Blue chips eye Australian pen test assessments
Online service to test staff skills.
Darren Pauli
Aug 31 2012 1:39PM
Security
Review: Core Security Technologies Core Impact Professional
Not a cheap penetration testing tool, but given its performance it can be excellent value.
Peter Stephenson
Mar 2 2011 4:17PM
Security
Purported malicious CD-ROMs actually part of pen test
A package sent to a US credit union last week containing supposedly malicious CD-ROMs prompted a fraud alert from the US National Credit Union Administration, but it was actually part of a penetration test.
Angela Moscaritolo
Sep 1 2009 11:39AM
Security
Emerging markets drive mobile growth
Worldwide mobile penetration rates are expected to reach as high as 95 per cent by 2013 from the current level of 46 per cent, according to a recent report by Tariff Consultancy.
Ian Williams
Oct 11 2008 2:09PM
Financial Services
Review: Core Impact
Core Impact enables an organization to conduct penetration testing as a specialist would.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: Lockdown Auditor
Lockdown Auditor is a 1U rack-mountable device that connects into a network and scans IP addresses for vulnerabilities.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: nCircle IP360
If you are looking for flexibility, scalability and ease of use for vulnerability scanning and assessments, the IP360 offered by nCircle may be what you want.<
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: Sniffer Portable 4.7.5
Sniffer Portable is more than a product.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: Sunbelt Network Security Inspector
This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: Typhon 3
Many consultancies offer services to conduct vulnerability tests against networks, but NGS is renowned for doing so.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Review: WebInspect
T he depth in which websites and web services are assessed by WebInspect and its clarity of vulnerability descriptions and suggested fixes is impressive.
Julian Ashbourn
Jun 1 2004 12:00AM
Security
Standardizing Penetration Testing
While some people consider hacking a 'black art,' it surely has some scientific component to it due to the required knowledge of computers, operating systems and application software.
Anton Chuvakin
Jan 16 2004 2:51PM
Security
The Changing Face of Security Penetration Testing
The growing importance of adequately protecting computer resources is constantly highlighted by an ever-increasing number of high profile IT security incidents appearing in the media.
Simon Waring
Jan 16 2004 10:32AM
Security
Penetration Testing: Thinking outside the Black Box
Perimeter security technology such as firewalls, content filtering and anti-virus protection, is paramount to a business's defense against attack but can by no means be assumed to be impenetrable.
Diane Seddon
Jan 16 2004 10:20AM
Security
Most popular tech stories
CBA keeps pushing limits of its Workday environment
Chemist Warehouse runs AI on HR shared inbox
CBA to keep roles it had reviewed after installing AI bot
Serco connects dispersed workforce through ServiceNow-backed platform
CBA's leaders are keeping a close watch on AI metrics
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Rail operator Aurizon uses IoT to help save $380m
Govt launches consumer tech label program for smart devices
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Honeywell touts role in Sydney Opera House achieving 6 Star Green Star rating
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?