Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from PC Security Journal
The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 ...
Distrix (formerly Spark Integration Technologies) has announced the latest version of its flagship network-virtualization software. Distrix 4.1, available now, extends the manageability of remote networks while also improving the programmability of software-defined networking (SDN) env...
For many SDN and DevOps enthusiasts, the natural outcome of this wave of technological change is a highly-automated network that is well-orchestrated with surrounding systems and applications. One of the prevailing thoughts is that this level of automation is a well-formed abstraction ...
NaviSite, Inc., a Time Warner Cable Company, announced on Wednesday a key addition to its suite of cloud storage and data replication solutions with the launch of its NaviCloud® Vault: Data Domain® solution. Enabling a secure, reliable, highly available, off-site replication service th...
SOASTA on Tuesday announced the company has expanded its award-winning mobile functional test automation solution, TouchTest, to include local test labs of Apple iOS and Google Android smart phones and tablets. The TouchTest Private Device Cloud is a simple to manage, affordable intern...
VASCO Data Security International, Inc., offers a native authentication integration solution for MYDIGIPASS.COM that allows application developers to protect their end users' online identity. In November 2013, VASCO launched DIGIPASS for Application Perimeter Protection SDK (DIGIPASS ...
Until recently, when I would talk about "APIs", I would qualify it by saying "Web APIs", in order to distinguish from the older meaning of APIs as more the tightly-coupled APIs used in Java, C/C++, or even Visual Basic. If you just said "APIs", until recently, some people may think you...
Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly sophisticated we as security professionals must ensure that they ...
Vormetric has announced the Vormetric Cloud Partner program. Created specifically to address the needs of service providers, the program enables partners to easily incorporate Vormetric Data Security into their offerings enabling strong differentiation for existing services and the cr...
VASCO Data Security International, Inc., announced on Thursday that it is collaborating with Kanoo Information Technology, a division of the E.K. Kanoo group of companies, to bring the VASCO authentication services to the Bahrain market. Kanoo Information Technology (Kanoo IT) combine...
Enterprises are building an API First strategy to keep up with their customer needs, and provide resources and services that go beyond the confines of enterprise. With this shift to using APIs as an extension of their enterprise IT, the key challenge still remains choosing the right de...
As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of con...
I remember the days when the network was open. Your PC, workstation or whatever you had on your desk could access whatever it needed (or not needed). Networking was an enabler of communication, it allowed you to put stuff onto the network, take other stuff off the network. Rather quick...
Once upon a time, there was a movement in IT called "agile". Developers adopted it in response to complaints from the business that they needed applications, that applications were everything, that without new applications the business would surely dry up. Dev then began tossing code o...
Halo Enterprise extends CloudPassage's patented Halo cloud security platform to large enterprises with complex security and compliance requirements. Halo currently protects more than 400 production cloud deployments and automates security for more than 10,000 new cloud instances monthl...
It was at my very first job as a developer that I learned about code reviews (and that I intuitively hated them, a characteristic I share with many developers I've then since learned). We wrote and maintained software that automated tax preparation (yes, you may in fact be using servic...
IBM shared a security related infographic via Twitter recently and in looking through the statistics (most of which are attributed to 2011 research, by the way) I happened to catch a statement claiming "The average company is attacked 60,000 times a day." IBM notes that "average" is a...
But what is malware and what makes it so particularly bad for your PC? Malware - short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Below is a list of the top ten things you may not, but should, k...
#SDN #API #devops What is it that applications want, and more importantly, what of those desires can the network fulfill? That's one of the questions SDN has to answer in order to make SDN relevant in the big picture that is the software-defined data center. What is it, other th...
"Only HP is positioned to deliver the industry's most complete software-defined data center network fabric with innovations that enable our customers to create a network foundation that will meet their needs today and well into the future," said Bethany Mayer, Sr. VP & GM of Networking...
Tony Dyson, the creator of R2-D2 moves all his hosting to Supreme Servers11 April 2013 - Tony Dyson, the creator of R2-D2 from the Star Wars franchise, and now launching a new range of eBooks for Children, has moved all of his hosting requirements to CWCS Managed Hosting's sister compa...
"It's exciting to start my first day as CEO of Alcatel-Lucen," said Michel Combes, new CEO of Alcatel-Lucent, as Nuage Networks last week announced an open software-based solution to address the key datacenter network constraints that limit cloud services adoption. The announcemen...
“Our common interest in open source solutions has enabled OSSI to put together an all-star team of Government, commercial and community partners,” said John Farrell of HP/Fortify, OSSI's volunteer chairman and Chief Information Security Officer, as OSSI named several new members to its...
GPU maker Nvidia Tuesday diversified away from its traditional PC market to sell its first server product – complete with software. The new widgetry moves ultra-fast graphics-intensive tasks from pricey workstations to low-end PCs. Nvidia calls the 4U server-like widgetry the Grid ...
HP’s cloud solutions continue to expand, and more and more organizations are taking advantage of these opportunities. In the cloud storage arena, HP Cloud Object Storage provides highly durable, readily available access to your data. It’s secure, too; each object is stored in three zon...
Are businesses truly prepared to adopt the most productive practices of high-performance ICT enabled work environments? In search of answers, Cisco commissioned independent research among IT decision makers in enterprise and SME organizations across the UK and Ireland -- to better ...
Generally speaking when the topic of devops comes up security isn't something we mention. If we do it's in hushed tones, eyes darting back and forth, the fear that someone might hear us overriding the certain truth that security can benefit as much from devops as any other operational ...
"Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks," said Nawaf Bitar, senior vice president and general manager, Security Business Unit, Juniper Networks, as Juniper today unve...
It's that time in the SDN hype cycle where people are beginning to lay out a more solid vision of what it means to them. Themes are beginning to emerge on the foundations laid by ONF that include the necessary separation of control and data (forwarding) planes, but some are still missi...
Imagine it as if it’s actually happened – your network has crashed and all your organization’s critical applications and associated data have vanished. This worst-case scenario is one every business owner fears. Whether it’s due to a storm, a break-in or the crash of your hard drive, t...
I wrap up Oracle OpenWorld from San Francisco. Special thanks to you, the viewers, along with F5ers Ron Carovano, Chris Akker, Dennis Zhou, Dawn Parzych, Jonathan George, Robert Rexford and the entire booth staff including Sphero. And a very special Mahalo to The Mahea, F5′s youngest T...
Peter Silva interviews F5 Product Manager, Dawn Parzych, to learn more about F5′s Optimization Solutions for Oracle GoldenGate replication software and how BIG-IP WOM can greatly reduce bandwidth and significantly improve throughput performance by 30-50%.
Please, God, let this work – even if it’s not completely impenetrable, it sounds better than what we’ve got as we know from the Chinese. “It” is widgetry called vSentry from a UK start-up called Bromium that promises to put an end to malware – at least in the enterprise. Bromium is t...
Good Technology, a provider of secure enterprise mobility solutions, has announced it has signed an agreement to acquire Copiun Inc., a privately-held innovator in secure mobile collaboration. Copiun solutions allow mobile users to directly and securely access file shares, Microsoft Sh...
#fsi problems are very public, but provide warning messages for all enterprises. The recent troubles in High Frequency Trading (HFT) involving problems on the NASDAQ over the debut of Facebook, the Knight Trading $400 Million USD loss among others are a clear warning bell to High Freq...
I meet with Infoblox’s Senior Product Manager, Andy Voltmer about the F5/Infoblox partnership, the importance of DNS and the security around DNSSEC. Reporting from the F5 Agility Conference in Times Square.
Dell KACE and Bomgar announced today an offer for Dell KACE K1000 Management Appliance customers that will give new Bomgar customers two free Bomgar remote support licenses worth several thousand dollars through either a hosted solution or via a purchase of Bomgar’s on-premise applianc...
Thousands of dollars worth of prizes plus exclusive VC and vendor CTO mentoring await the winners at www.techtrailblazers.com LONDON, UK - July 19th 2012 - Calling all innovative enterprise IT startups: The Tech Trailblazers Awards have officially opened for entries at www.techtrailbla...
Among small and mid-size businesses, the refrain is increasingly familiar: “We're responsible for sensitive financial data, and our customers trust us to protect it at all times. We want to move to the cloud but have concerns about the risks in handing this data off to another company....