Latest News
ASX-listed Symal digs deeper into AI and DevOps with Microsoft Azure
Windows Server Update Services bug exploited in the wild
AWS outage caused by "unlikely interaction" between automated systems
ACMA rejects draft consumer code as calls to end self-regulation grow louder
Telstra finds firmware locked Samsung handsets to Vodafone for Triple-0 calls
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
vulnerability
vulnerability
Best Vulnerability Assessment
Overall Category Winner and Winner for Best Patch Management: Shavlik HFNetChkPro 5.1, Shavlik Technologies, LLC
Staff Writers
Mar 13 2006 7:09PM
Security
Matt Watchinski, Vulnerability researcher, Sourcefire
I’ve been penetration testing since I was about 15 years-old. I got interested in these things in the days of bulletin boards and the 1,200 baud modem when you had to figure out things for yourself or talk to others on the boards.
Staff Writers
Mar 8 2006 4:20PM
Security
The Common Vulnerability Scoring System: Get your threat priorities right
Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.
Gunter Ollmann
Mar 6 2006 7:04PM
Security
Google takes care of minor Gmail vulnerability
Google has patched a minor flaw that allowed JavaScript code to run when viewing a Gmail message, the search engine giant said today.
Dan Kaplan
Mar 3 2006 9:58PM
Security
Review: Auditor Enterprise
NetClarity’s Auditor is a fine example of a fully featured appliance that offers not just vulnerability assessment, but also ties results to compliance and ongoing information systems audit programs. Beginning from the superb documentation and ending with the high value for the money, this product shines.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: AZScan
AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: BindView Control Compliance Suite
The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Core Impact
Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it finds. There are real benefits to this approach.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: GFI LANGuard Network Security Scanner
This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Nessus/NeWT
Nessus has been a mainstay of vulnerability scanning since the Nessus Project was started by Renaud Deraison in 1998. The Nessus website claims that over 75,000 organizations worldwide use the program.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: NeXpose
As an appliance, NeXpose fits into our category of fully featured products, but it is also available as software only. Uniquely, Rapid 7 also offers a managed service for organizations with limited resources.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: SAINT Scanner
Saint is a venerable product with its roots in the earliest days of automated vulnerability assessment. It has been dressed up in a new suit of clothes since becoming a commercial product, but retains its strong Unix roots.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Sophos report fingers top spam relaying nations
The US continues to be the leading nation when it comes to relaying spam around the world, according to a security firm.
Staff Writers
Jan 25 2006 10:15AM
Security
Vulnerability is our business
It might seem like a cosy, family-run business, but as
David Quainton
discovers, Next Generation Software has earned a global reputation
David Quainton
Oct 21 2005 3:27PM
Security
Developing a patch and vulnerability management strategy
In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley
Oct 20 2005 11:03AM
Security
Australia drops off 'Dirty Dozen' spammers list
Australia did not rank in the top 12 spam relaying countries in the past six months, according to the latest report from security firm Sophos.
Vivienne Fisher
Oct 13 2005 4:13PM
Security
Financial spam tops list in August
Financial spam topped the list of most prevalent spam during August, according to a report from Trend Micro.
Vivienne Fisher
Sep 14 2005 9:41AM
Security
How not to get hacked: Microsoft
Microsoft pushed security to the front of its Tech.Ed agenda on the Gold Coast this week, holding a developer and technical support session aimed explaining the easiest routes to hack attack on any IT network.
Fleur Doidge
Sep 1 2005 3:18PM
Security
Windows vulnerability sparks viral warfare
The Zotob worm and its Windows hitting counterpart, Ircbot, are waged in viral warfare. Ircbots and a similar virus group known as Bozori are actively deleting Zotob viruses, the first to
attack a newly announced Windows vulnerability
.
David Quainton
Aug 18 2005 10:38AM
Security
NIST unveils new vulnerability database
The National Institute of Standards and Technology (NIST) has launched a new vulnerability database that integrates all publicly available federal vulnerability resources and provides links to industry resources.
Marcia Savage
Aug 15 2005 5:55PM
Security
Previous
Next
Most popular tech stories
ASIC's payroll revamp helps it repatriate staff from ATO
Macquarie Bank's digital chief to join Westpac
IAG bolsters martech stack to drive customer engagement
Jemena builds out finance automation for its month-end processes
McPherson's creates AI agent for key account teams
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Photos: Australian industry explores data for net zero
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Melbourne reveals its smart city ambitions
2018 Australian IoT Awards: meet the finalists
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?