Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from PC Security Journal
Enterprises often frustrate developers. Why do Enterprises always seem so behind when it comes to the very latest technology? In particular, a trend we are seeing is the continued struggle to marry Enterprise authentication with the burgeoning world of REST … Continue reading ...
As always, there are takes that don’t make the cut and Interop 2012 was no different. Here are the flubs, outtakes and bloopers from our video voyage including the complete destruction of our booth.
I wrap up the Interop 2012 from Las Vegas. Special thanks to F5′ers Ken Bocchino, Lori MacVittie, Ken Salchow, Jeff Stathatos, Danny Luedke and Sam Richman along with Brian Monkman from ICSA Labs and especially you, our viewers.
I meet with F5′s Professional Services Consultant Sam Richman to review some of the stats from the World’s Largest Portable Network. Highlights included: BIG-IP Data Center Firewall pushed a Terabyte of data; BIG-IP Web Accelerator delivered 100 gigabytes of content from cache; almo...
I interview Brian Monkman, ICSA Labs’ Technology Programs Manager, about ICSA certification, the importance of 3rd party tests, how ICSA conducts their certification testing along with Breaking News that the BIG-IP Family is now ICSA Certified for IPSec!!
Peter Silva talks with F5 Product Marketing Manager Danny Luedke about the BIG-IP Data Center Firewall and showcases the new Splunk reports for BIG-IP Data Center Firewall Solution.
First, let’s make it clear what an endpoint is. In Microsoft’s world this term represents any client computer, server, or laptop in an organization. Forefront Endpoint Protection is a line-of-business application developed by Microsoft to provide defense against viruses, worms, and oth...
Intel recently announced that by combining the strength of Intel® accelerated processing and McAfee® enterprise-level security we are taking our solutions to the next level and help our customers to extend their applications far beyond the traditional perimeters in a very secure manner...
In this article we will list some steps you can take to make sure your Exchange Server is running as securely as possible. 1. Harden the OS We can’t stress enough how important it is to harden the OS that is hosting the Exchange Server.
For today's enterprises, the question isn't about choosing a public or private cloud. The decision lies in how to enable both in the form of a hybrid cloud. Public and private clouds are quickly dovetailing to enable blended scenarios based on dynamic optimizations for price, policy an...
Porticor, the leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud by ensuring customer keys are never exposed, today formally launched to make available the industry’s first solution combining data encryption wi...
Gartner claimed Thursday that worldwide PC shipment will rise 4.4% this year to a relatively weak 368 million units waiting for Windows 8, an economic revival and a return of drowned-out disk drive volumes followed by another lurch to more than 400 million in 2013. Gartner expects ul...
Hewlett-Packard is on the mend. CEO Meg Whitman has set the expectation that 2012 is going to be a year devoted to getting the company back on track and, among other things, rebuilding its balance sheet after a year and change of painful twists and turns that have shaken the confidence...
ForeScout Technologies has introduced ForeScout Mobile, a set of plug-in modules to enable Android and iOS security management, as well as a plug-in module for mobile device management (MDM) integration. By combining ForeScout Mobile as an add-on to ForeScout CounterACT, the company’s...
What happens when technology converges? When old meets new? A fine example of what might happen is what has happened in the carrier space as voice and data services increasingly meet on the same network, each carrying unique characteristics forward from the older technology from which...
The trade off between security and performance has long been a known issue across IT organizations. One of the first things to go when performance is unacceptable is a security solution. This isn’t just an IT phenomenon either; consider how many of us have disabled endpoint security so...
Porticor, a cloud data security company delivering a cloud-based data encryption solution that infuses trust into the cloud by ensuring customer keys are never exposed, on Wednesday formally launched to make available a solution combining data encryption with patented key management to...
Barracuda Networks Inc., a provider of security, networking and data protection solutions, on Wednesday announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This integrated offering marks the first solution to combine powerful cloud-based Web filterin...
Over the last year I have been working on the CloudStack Open Source Cloud Computing project. This month we are getting ready to launch CloudStack 3.0 which really raises the bar for cloud computing platforms.  So what is CloudStack? It is an infrastructure-as-a-service(IaaS) platform ...
“2011 was a groundbreaking year for us, marked by three-fold revenue growth and tremendous traction in the market.," said David Canellos, CEO of PerspecSys, the creator of cloud data control solutions for the enterprise, as the company announced the expansion of its operations by openi...
Automating the deployment and runtime management of large application deployments running on multiple cloud resources across various cloud providers is a challenging problem.  Managing remote resources is not a new problem the big difference is that in cloud the resources are adde...
F5 Networks on Tuesday announced that the latest release of the F5 BIG-IP product family has been certified by ICSA Labs as a network firewall, helping customers protect their public-facing websites from today’s massive cyber attacks. The newly certified solution handles eight times mo...
Mindjet, the company that improves how people work together, today announced new Mindjet Connect collaborative work management software to help groups working toward common goals get more done. Mindjet Connect is a cloud-based service that helps groups visualize their best ideas and pl...
Research and Markets has announced the addition of Frost & Sullivan's new report "Asia Pacific (including Japan) Web Application Firewall Market CY2010" to their offering. This research service analyzes the Web application firewall (WAF) as a security technology, either hardware or so...
Ousted Acer CEO Gianfranco Lanci bared his soul to All Things Digital and claimed the reason he was fired was the company’s fear that he would “de-Taiwan” the joint in a search for talent outside the country that Lanci claims the island nation doesn’t have. Between smartphones and ta...
Sybase, Inc., an SAP company, has been positioned by Gartner, Inc. in the Leaders quadrant in its Magic Quadrant for Mobile Device Management (MDM) Software report, authored by Phillip Redman, John Girard and Leif-Olof Wallin (April 2011) The Gartner report points out that,”by 3Q10, t...
With the trend of targeted cyber attacks along with the exploitation of common vulnerabilities such as SQL Injection, it is clear that the core software infrastructure of several critical industries remains extremely vulnerable. Released today, the Veracode “State of Software Security ...
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on th...
Secure Sockets Layer (SSL) is the de facto standard for e-commerce security. It confronts the potential problems of unauthorized viewing of confidential information, data manipulation, data hijacking, phishing, and other insidious web site scams by encrypting sensitive data so that onl...
Malware is crawling onto web sites everywhere. This white paper from VeriSign will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web server...
Security experts generally recommend applying security updates to software as soon as possible, as the overwhelming majority of attacks against vulnerabilities are against those that have already been addressed with patches from the software developer. But, published scenarios enable a...
AT&T on Monday announced enhancements to its cloud-based offers, a new cloud-based mobile application, and increased third-party development and industry activity to deliver cloud capabilities that can help businesses reduce IT costs. The company also said it continues to work with IB...
Opening NetEvents 2011 EMEA Press Summit serial entrepreneur and founder of Palo Alto Networks Nir Zuk spoke to an audience of top technology press and analysts from the EMEA region on the theme: Thinking Secure or Just Feeling Secure? The need to accele...
Lenovo and NEC are doing a joint venture that they say will create the “largest PC group in Japan,” the third-largest PC market in the world. NEC is kicking in its PC business for $175 million worth of newly issued Lenovo stock and Lenovo will throw in its Japanese sales and research ...
Lenovo is talking to NEC about a PC alliance of some type the Wall Street Journal said after it talked to a “person familiar with the matter” last Friday. Reuters heard the same thing but like the Journal says the form of the partnership isn’t cast in stone. The Nikkei think it’s a j...
It’s also interesting to see the importance of the hybrid model taking hold among industry insiders with many different perspectives. We saw this at VMworld 2010, where there was tremendous interest in hybrid clouds, from Paul Maritz’s keynote predicting a hybrid cloud future through m...
In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile apps, cloud service providers and SCADA systems that reinforce concerns about unknown weaknesses lurking in everyd...
Stonesoft, an innovative provider of integrated network security and business continuity solutions, today announced the extended availability of the StoneGate MobileID authentication software token for five additional platforms: Apple Mac OS, iPod, iPhone, iPad and Google Android. Incl...
Mimecast, a supplier of cloud-based email security, continuity, policy control and archiving, on Thursday announced the results of the second annual Mimecast Cloud Adoption Survey, an annual research report examining attitudes to cloud computing services amongst IT decision-makers in U...
With recent surveys showing that the vast majority of smartphones are used for both business and personal tasks,[1,2] Blancco, the global leader in data erasure and end-of-lifecycle solutions, has today introduced Blancco Mobile Edition. The software is designed to eliminate the ris...