Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
New deadline of September 19th to reflect new categories of IoT and FinTech London, UK - August 28th 2014 - The highly successful Tech Trailblazers Awards today announced a new bursary for early stage non VC backed startups, the Firestarter program. This has been created to ensure that...
The application economy promises many opportunities for companies and consumers alike, but the same technologies enabling all this app innovation are also opening the door… The post Managing IT security in an always-connected, app-driven world appe
…all this and more in this week’s compendium of open source news!   Two Steps Forward, One Step Back Sounds like a Strauss Waltz? Almost. After 10 years the city of Munich’s love affair with open source may be coming to an end.  Despite saving $16 million by using the custom ...
By Bob Gourley The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ...
Major industry events are a great venue for companies to make announcements and communicate important market and product information. As the 2014 version of VMWorld fast approaches, what might we hear more about? Here are five predictions. NSX customers will be on display Industry chat...
Brocade Vyatta 5600 vRouter adds new functionality to accelerate Network Functions Virtualisation (NFV) adoption SAN JOSE, Calif., August 19, 2014 - Telefónica (NYSE: TEF) and Brocade (NASDAQ: BRCD) have partnered to establish new benchmarks for the deployment and performance of N...
Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at the risks involved with mobile devices and how to secure them. Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent ...
GFT will also sponsor the Big Data Trailblazers Award LONDON, UK - August 12th 2014 - The highly successful Tech Trailblazers Awards today announced a new category for the awards, the FinTech Trailblazers, which is being created with new sponsor GFT, a leading IT solutions provider in ...
By Bob Gourley Tapping Global Threat Intelligence To Secure Enterprise Networks Cyber Security Symposium August 27, 2014 | 11 AM -1:30 PM EST Ruth’s Chris Steakhouse, Arlington, VA For more and to register see: http://ctolink.us/1nKbQqy On July 9, 2014, the Cybersecurity Informati...
On Monday 11th August 2014 Infosecurity Magazine officially re-launched its website to reflect the latest in user experience, functionality and style. For the last 10 years Infosecurity Magazine has been at the cutting edge of some of the most dramatic and transformative moments of inf...
London, United Kingdom, August 07, 2014 --(PR.com)-- The Storage Made Easy Private Enterprise File Sync and Share Solution is an on-premise solution that is completely private and can be deployed by enterprises as well as being available as a white-label OEM solution for service provi...
Thursday 7 August, 2014 nCrypted Cloud today announced the opening of its European operation. nCrypted Cloud is the secure collaboration application that seamlessly integrates with leading cloud storage services such as Box, Dropbox, Egnyte, GoogleDrive and OneDrive. It all...
Have you ever wished that enterprise integration were as simple as snapping together LEGO Blocks? That’s the vision of San Mateo, California-based SnapLogic. The brainchild of […]
By Bob Gourley Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. – bg From: http://ctolink.us/1v1WiaZ Monday, A...
Thunder and AX WAFs Pass Rigorous Testing Woking, Surrey: 4th August 2014 - Wick Hill is now shipping A10 Network's Thunder and AX Series application delivery controllers (ADCs), with web application firewall (WAF) version 2.1 certification from ICSA Labs, an independent division of Ve...
It’s that time of year again… time for another beautiful late-summer Gartner Catalyst conference in America’s Finest City: San Diego. Aside from being my hometown, the reason San Diego is so great is that it has balance. The warm sun is balanced by the cool ocean breeze, the strong bus...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
Taking inspiration from "Corner Office: conversations about leadership and management" from the New York Times and Inc. Magazine's "The Way I Work", we look forward to featuring Procurement/Supply Chain leaders on this blog series.    I’m excited to introduce Kevin Dowd, Senior Directo...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
Final deadline for all entries is August 29thLONDON, UK - July 28th 2014 - The Tech Trailblazers Awards early bird rates close at midnight Pacific time this Thursday, leaving enterprise tech startups with just a few days to make savings on their awards submissions fee. The discounted r...
By Bob Gourley Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings toget...
24 July 2014 - Pioneering technology services company, telent Technology Services Ltd, has increased its IT security capability by acquiring a 25% stake in CNS Group, the London-based information assurance and cyber security specialists.IT Security is an increasingly critical component...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
LONDON, UK - July 15th 2014 - The highly successful Tech Trailblazers Awards today introduced an additional category to reflect growing industry interest and engagement in the Internet of Things (IoT).In addition to existing enterprise technology categories such as Cloud, Infosecurity ...
Content and Metadata Federation Improves Performance and Security for Multisite Teams Using Git and P4DKey Points:New architecture enables global teams to access and manage revisions of shared content at LAN speed using Perforce, Git or both Organisations can selectively promote conten...
Inhalts- und Metadatenföderierung verbessert Leistung und Sicherheit für verteilte Git- und P4D-TeamsHighlights:Neue Architektur ermöglicht globalen Teams den Zugriff auf und die Verwaltung von Überarbeitungen an gemeinsam genutzten Inhalten mit LAN-Geschwindigkeit ...
More than half of all American businesses use cloud computing for its many benefits: flexibility, scalability, and cost-effectiveness top the list. However, due to its widespread appeal, the cloud also attracts the wrong kind of attention. In the last 12 months, 16 percent of public cl...
Prof. Dr. Norbert Pohlmann PhD, Ilijana Vavan and Ulf Heggenberger support sales and business development of the Hamburg-based start-up secucloud.Hamburg, 11 July 2014 - Security is one of the basic human needs. Therefore, we carefully protect almost everything in our everyday life - h...
With the growing popularity of R, there is an associated increase in the popularity of online forums to ask questions. One of the most popular sites is StackOverflow, where more than 60 thousand questions have been asked and tagged to be related to R. On the same page, you can also fin...
- Half (52%) of UK CIOs view increased security risks as biggest challenge associated with moving IT systems to the cloud- Eight in 10 (82%) say the economic benefits of cloud technology outweigh the potential risks- One-in-five (21%) hire interim professionals to fill the cloud skills...
This Week in Website Performance is a weekly feature of the Monitis.com blog. It summarizes recent articles about website performance. How to make your web site better, how to improve your users experience when they come to your website and how to optimize the overall experience. Why? ...
Tech Trailblazers Awards offers free entry to startups from World Cup contestant countries and the winning nation London, UK - 30th June 2014 - Amidst World Cup fever, the only independent global enterprise tech startup awards, the Tech Trailblazers, kicks off the awards in football st...
#cloud #SDAS #AWS And you can try it out for free...  June 30, 2014 (The Internet) Today F5 Networks, which delivers solutions for an application world, announced it had completed jumping through the hoops necessary to offer an hourly (utility) billing model for its BIG-IP VE (Vi...
Patch management solution helps Severnside Housing gain greater control of IT and allows the organisation more time to help resolve community queriesLondon, UK 27 June 2014: Shavlik, a global leader in simplifying the complexity of IT management and innovative security systems and IT p...
Amazon’s cloud service still needs security improvements says Gartner analyst. By Ellen Messmer The Amazon AWS cloud service is fine for enterprise workloads and applying security controls such as encryption and firewalls is possible, though more security vendors need to step up to sup...
UK CISOs and IT Managers feel isolated and fearful of losing jobs as data breach wave rolls in, suggests new surveyWESTBOROUGH, Mass. and LONDON, UK, June 24th 2014 - Chief Information Security Officers (CISOs) and IT managers may be too confident in their capabilities to ensure their ...
London, United Kingdom, June 24, 2014 --(PR.com)-- Asco Tlc, thanks to the support of BCLOUD, announces the expansion of its cloud offering called “Asco inCloud” with a new service that take the name of “ASCOllabora,” based on the solutions of Storage Made Easy...
Ask two politically opposed people in any given country about the causes of the country’s problems, and guess what? Each will give you an answer filtered through their world-view. Through what they know, and what they believe. That is not to say one is right and one is wrong, both simp...
Ask two politically opposed people in any given country about the causes of the country’s problems, and guess what? Each will give you an answer filtered through their world-view. Through what they know, and what they believe. That is not to say one is right and one is wrong, both simp...