Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The Innovative CIO! The Innovative CIO: How IT Leaders Can Drive Business Transformation – the new book from Andi Mann and George Watt Cloud News The contributors to the Forrester Cloud Playbook have put together a list of the top 10 cloud predictions for 2013, according to this Forbes article. The analysts predict that we’ll see some of the following trends next year: Cloud and mobile will become one, we’ll stop equating cloud with AWS, and we’ll finally stop saying – “everything is going cloud.” VMware and EMC announced their plans to create a new business unit, the Pivotal Initiative, according to this InformationWeek article. The business unit will merge VMware and EMC’s cloud computing and big data products. A new report by Nasuni reveals that 1 out of 5 employees use Dropbox to share and store work files even though their organization’s IT department prohibits ... (more)

Show Report: Reality Check at 4th Cloud Expo

Cloud Computing Expo on Ulitzer The talk at the 4th Cloud Expo this week in Santa Clara was all about enterprise cloud adoption. Is it real? Is it already happening? If so, who’s doing it, which applications are they running and which clouds are being tested? To a large extent, cloud computing is a victim of its own somewhat out-of-control hype cycle. Since so much has been written and discussed about the cloud in 2009, there is now a growing impatience for actual results. The fact that 2000 people showed up at the Cloud Expo in Santa Clara this week (double the number from last year’s show) suggests that at the very least, interest in enterprise cloud computing remains very real, and the need for practical solutions and use cases is growing more urgent. There was a growing concensus about a number of issues: 1. The hybrid model of on-prem data centers combined wit... (more)

Training Center – Grand Opening Open House

Hurricane Labs and Information Security Summit are pleased to announce the Grand Opening of their new Corporate Training Center located at 4401 Rockside Road in Independence, Ohio. Featuring state of the art classroom technology, a large classroom for up to 30 students, 2 breakout rooms and a recording studio ideal for podcasting, the training center will be used by several hundred professionals from around the country. We offer a diverse array of training programs for Chief Security Officers, Security Managers, Network and Security Architects and Engineers, and other IT Professionals. We also provide ongoing learning experiences for a full range of employees within your organization to enforce security on all levels of the spectrum. Whether you are looking into firewall management or social media policies, we’ve got you covered. Our Training Center can accommodate ... (more)

Addressing the Root Cause – A Proactive Approach to Securing Desktops

The computers on your network are protected from malware right? If you are operating an environment based largely on Windows based PCs you likely have some kind of anti-virus installed and centrally managed. If you have purchased a more complete desktop protection suite, you probably even have a Host Based IDS/IPS protecting your machine from incoming malicious TCP scans, or possible outbound connections to known malicious sites (like google.com occasionally). Operating system firewall activated? Yep! AV signatures current? Check! Global Threat Intelligence updated? Uh, yeah....sure. Then you should be covered against threats targeting your organization, right? Most likely not, and at times these tools actually mask intrusions as they provide a false sense of security and protection. The Trouble with Reactionary Behavior The problem with these tools, all of them, is ... (more)

The Intersection of SDN and NFV

By Prayson Pate The hot topics of Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) have spurred several articles comparing and contrasting them. This blog provides a brief survey of these articles in chronological order, including a synopsis of each. I also included a rating of each, based on relevance and readability. Uniting SDN and NFV- 4 stars Tom Nolle of CIMI writing at CIMI’s public blog – November 13, 2013 – 927 words This blog is one of the earliest to tackle the intersection of SDN and NFV. It focuses on the announcement of the 6WINDGate product from 6WIND. Tom describes how this type of product and approach could unite the two concepts: This capability is useful in three ways; first, you can use it to improve how servers manage things like virtual networks, and second you can use it to host network-related applications like fir... (more)

Comodo Adds Revolutionary SafeDelete to Comodo System-Cleaner

Purging a pc of old, unwanted files is an essential but nerve-wracking part of computer maintenance. When cleaning a computer system some files are hard to identify. A miscellaneous-looking file that appears superfluous may actually be supporting necessary operations. Comodo's new system cleaner enables computer users to store a back-up copy of their computer system just in case they make a mistake. Comodo System-Cleaner is the world's first file and registry cleaner to harness the power of 100% safe cleaning. It utilizes the revolutionary innovation of SafeDelete™, a feature that allows users to safely recover any files deleted in error. This advancement eliminates risk from the process of PC cleaning. Because the system cleaner is entirely risk-free, it can clean deeper, more thoroughly, and more completely than any other cleaner available. "PC users are afraid ... (more)

Altor VF 2.0 Defense-in-Depth Security Unveiled at VMworld Europe

Altor Networks, creator of the purpose-built virtual firewall, has announced that Altor VF 2.0 virtual firewall will debut VMworld Europe in Cannes this week; it will be showcased in the VMsafe section of the Hands-on Lab. VMworld Europe attendees are invited to preview the Altor VF 2.0 at the Hands-on Lab and participate in one of 16 simultaneous live demos of the virtual firewall. This is an opportunity to "sit in the driver's seat and test drive" Altor VF 2.0 and install, configure and deploy security policies in a virtual network. "We are excited to see VMware's partners bring to market new security solutions built using VMsafe technology," said Shekar Ayyar, Vice President, Infrastructure Alliances, VMware. "Altor VF is an excellent showcase for harnessing the potential of VMsafeTM to deliver a virtual firewall uniquely designed by leveraging the VMware platfor... (more)

Tomorrow’s IBM “Smart Business” Cloud Computing Strategy

The NY Times broke IBM’s embargo this morning by publishing their story on IBM’s new cloud computing initiatives.  I’ve posted the full release here on CloudBzz. The diagram below gives a bit of insight into where IBM is today and where they are heading. IBM is also updating their collateral with a bit more detail.  Here is a fact sheet for their Smart Business initiative: Fact sheet: IBM Smart Business Smart Business is IBM’s commonly branded set of cloud computing offerings for business. This set of offerings gives clients three choices to deliver and consume cloud services to drive efficiency, productivity and control. Smart Business Services – cloud services delivered: 1: Private cloud services, behind your firewall, built by IBM. 2: Standardized services on the IBM cloud Smart Business Systems – purpose-built infrastructure 3. IBM CloudBurst: Pre-integrated har... (more)

The Case For 3rd Party Software

If I had to classify the questions I get on a routine basis, among the first in the list would be “Why should I buy software for reason X when Microsoft has built it in free. X could be anything from firewall software for desktops through availability tools for SQL Server. It’s absolutely true that Microsoft builds a ton of great tools into their products these days, but that doesn’t mean you should rule out the need for 3rd-party solutions, and here’s why. Let’s take the case of anti-virus as an example. Windows 7 – Microsoft’s upcoming desktop OS platform – will not have a built-in anti-virus solution. However, Morro will be released by Microsoft as a no-cost anti-malware (anti-virus, anti-spyware, etc) that will be available free of charge. So, why are other players in the Windows anti-malware area still in business? First things first, not everyone will meet ... (more)

Mobile Devices: Authenticate or Encrypt?

Two conflicting opinions crossed my desk today. Michael Hickins reported on Iranian Phone Spoofing, Fake Twitter Accounts And Trust in his blog at InformationWeek.  People are spoofing cell phone calls to his Iranian friends' phone accounts, to avoid sanctions for calling Iran.  "Cybersecurity expert Melih Abdulhayoglu, CEO of Comodo, tells me that content authentication is "the next big thing," Hickins wrote. I was already thinking about the insecurity of cell phone communications because Molly Dolesalek reported on them in Processor Magazine. "It's fairly easy to tap into a cell phone conversation, but the business world doesn't really understand that," Dunleavy says. For that reason, he believes that there will be more interest in voice encryption, including VoIP encryption," she wrote, quoting Mike Dunleavy, president of Diginonymous. Authenticate or encrypt?   ... (more)

Arrow ECS Expands GSA Schedule to Enterprise Market

IT Strategy Further assisting resellers with increasing sales opportunities in the government space, Arrow Enterprise Computing Solutions, a business segment of Arrow Electronics Inc., is expanding its General Services Administration Schedule 70 across its North American operations and adding enterprise technology to its program. A GSA Schedule 70 includes prenegotiated contracts to public-sector agencies for information technology solutions that are available at a set price and have been approved by the GSA to be compliant with specific laws and regulations. The Arrow ECS GSA schedule (previously managed by Arrow ECS’ Alternative Technology Group) is in the top 4 percent of Schedule 70 contractors. “Expanding the GSA program that the Alternative Technology Group established in 2005 across Arrow ECS’ entire North American operations enables us to make the progra... (more)