Latest News
Viva Energy completes greenfield HR setup in time for Coles cutover
Powercor to tap into agentic AI across the organisation
Microsoft to 'co-invest' in Defence's Azure adoption
Telstra to axe 550 roles including in enterprise business
Microsoft racks up over US$500 million in AI savings
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
vulnerability
vulnerability
Review: AZScan
AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: BindView Control Compliance Suite
The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Core Impact
Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it finds. There are real benefits to this approach.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: GFI LANGuard Network Security Scanner
This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Nessus/NeWT
Nessus has been a mainstay of vulnerability scanning since the Nessus Project was started by Renaud Deraison in 1998. The Nessus website claims that over 75,000 organizations worldwide use the program.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: NeXpose
As an appliance, NeXpose fits into our category of fully featured products, but it is also available as software only. Uniquely, Rapid 7 also offers a managed service for organizations with limited resources.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: SAINT Scanner
Saint is a venerable product with its roots in the earliest days of automated vulnerability assessment. It has been dressed up in a new suit of clothes since becoming a commercial product, but retains its strong Unix roots.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Sophos report fingers top spam relaying nations
The US continues to be the leading nation when it comes to relaying spam around the world, according to a security firm.
Staff Writers
Jan 25 2006 10:15AM
Security
Vulnerability is our business
It might seem like a cosy, family-run business, but as
David Quainton
discovers, Next Generation Software has earned a global reputation
David Quainton
Oct 21 2005 3:27PM
Security
Developing a patch and vulnerability management strategy
In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley
Oct 20 2005 11:03AM
Security
Australia drops off 'Dirty Dozen' spammers list
Australia did not rank in the top 12 spam relaying countries in the past six months, according to the latest report from security firm Sophos.
Vivienne Fisher
Oct 13 2005 4:13PM
Security
Financial spam tops list in August
Financial spam topped the list of most prevalent spam during August, according to a report from Trend Micro.
Vivienne Fisher
Sep 14 2005 9:41AM
Security
How not to get hacked: Microsoft
Microsoft pushed security to the front of its Tech.Ed agenda on the Gold Coast this week, holding a developer and technical support session aimed explaining the easiest routes to hack attack on any IT network.
Fleur Doidge
Sep 1 2005 3:18PM
Security
Windows vulnerability sparks viral warfare
The Zotob worm and its Windows hitting counterpart, Ircbot, are waged in viral warfare. Ircbots and a similar virus group known as Bozori are actively deleting Zotob viruses, the first to
attack a newly announced Windows vulnerability
.
David Quainton
Aug 18 2005 10:38AM
Security
NIST unveils new vulnerability database
The National Institute of Standards and Technology (NIST) has launched a new vulnerability database that integrates all publicly available federal vulnerability resources and provides links to industry resources.
Marcia Savage
Aug 15 2005 5:55PM
Security
Netsky remains on the radar
Netsky-P took out the number one spot for viruses causing problems for businesses during July, according to a security firm.
Vivienne Fisher
Aug 3 2005 10:03AM
Telco/ISP
Viruses on the increase: report
The time it takes for a PC to get infected by an internet worm is dropping, according to a security firm.
Staff Writers
Jul 5 2005 11:02AM
Security
Alluring images hoodwink users
People are being lured into opening worm-carrying emails by subject lines referring to alluring pictures.
Vivienne Fisher
May 30 2005 4:19PM
Security
RSA patches major vulnerability
RSA has issued an unexpected patch to plug a hole in its web application tool.
David Quainton
May 12 2005 11:39AM
Security
Bots increase in April
Bots accounted for 35 percent of all malicious code detected in April, an increase of 14 percent from March figures according to security vendor Fortinet
Staff Writers
May 9 2005 2:30PM
Security
Previous
Next
Most popular tech stories
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
El Jannah backs Salesforce martech stack to support store expansion
Optus' first AI chief Samantha Lawson exits
NSW gov employers 'should not' use AI for hiring decisions
L'Oréal links consumer spend uplift to CDP rollout
Ingram Micro hit by ransomware
PHOTOS: The M&A Session - Sydney
Dell’s new platform wants to end HCI vendor lock-in
Announcing the 2025 Impact Awards Partner Leadership finalists
Macquarie Cloud Services to move CareSuper from VMware on AWS to Azure
Blackberry celebrates "giant step forward"
Photos: The 2024 IoT Awards winners
NSW Government building business case for state-wide digital twin
Laing O'Rourke brings IoT to hard hats
Co-founder of IoT telco Thinxtra Loïc Barancourt departs
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?