Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
By Richard Stiennon When I predicted a surge in growth in the IT security industry last year (24% CAGR for ten years leading to a $640 billion industry by 2023) I pointed out that encryption would lead the way and that that was not possible without good key management. Perhaps because ...
Call for presentations open for (ISC)² Security Congress EMEA 2014, a unique international platform for information security professionals London, UK, 12 June 2014: International information security professionals have a unique opportunity to meet, learn, and get ahead of indu...
Despite recent reports of high profile software security vulnerabilities, many organizations still do not have a clear understanding of what open source and third party components are in their codebase, let alone the security vulnerabilities associated with them. Join Parasoft and Pro...
Healthcare businesses around the world have always had a responsibility to protect the privacy of their patients. Today that means securing patient data from prying eyes. Ever since patient health information became digital, many countries have introduced more stringent regulations to ...
By George Romas I previously wrote about the various “functional areas” of continuous monitoring. According to the federal model, there are 15 functional areas comprising a comprehensive continuous monitoring solution, as shown in the graphic below: These functional areas are grouped i...
New Fireware® OS allows users to deploy, configure and manage wireless access points from a WatchGuard UTM or NGFW without additional hardware 30 May 2014 - WatchGuard® Technologies, has announced that its Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) a...
By Bob Gourley An Essential Starter Kit for Any CIO Considering the Internet of Things or Software Companies Needing a Jumpstart Reston, VA, May 27, 2014 – Software AG (Frankfurt TecDAX: SOW) today unveiled its Internet of Things (IoT) Solution Accelerator, a tightly-bundled set of sma...
New technologies signal industry shift from mobile device-centered security to a user-oriented mobile approachUNITED KINGDOM, 27 MAY 2014 - At Interchange 2014, LANDESK announced its acquisition of LetMobile and the introduction of application wrapping technology. With this acquisition...
#DDoS  #infosec #cloud #F5 acquires Defense.Net Everyone, no doubt, can easily find one of the myriad articles and reports indicating that the volume of DDoS attacks is on the rise. Not just the frequency of but the sheer size of these attacks are growing year over year at a frig...
#DDoS  #infosec #cloud #F5 acquires Defense.Net Everyone, no doubt, can easily find one of the myriad articles and reports indicating that the volume of DDoS attacks is on the rise. Not just the frequency of but the sheer size of these attacks are growing year over year at a frig...
By Albert Fruz Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. ...
Study highlights significant risks of outmoded cyber security strategiesBoard directors suffering from fear, uncertainty and doubt (FUD) fatigue Investment in cyber security technology often seen as an overhead rather than risk mitigationLONDON, 22 May, 2014 - Traditional approaches to...
So, you think your five year old private cloud security is stronger than a public Infrastructure as a Service cloud (like AWS, HP, and Microsoft Azure)? Think again. The reality is that a public cloud provider is likely investing more in infrastructure security and P3 (People, Process,...
TechViews: Big Data’s Sinister Future, The Mobile Tide Swells, Top Challenges in the Cloud and More! Featured Article The Internet of Things: Be Afraid, Be...
The Internet of Things offers myriad opportunities for enterprise and consumer devices and applications, but IoT also opens up a whole new world of malicious activity for hackers and criminals. IT security leaders must weigh the risks when seeking to
Appeon WebHow Does It Work?
Eight EMEA Speakers Join Global Line-up Covering More Than 80 Educational Sessions across Nine Tracks for Over 20,000 Attendees London, UK - May 9, 2014 — (ISC)2® ("ISC-squared"), the largest not-for-profit membership body of certified information and software security profe...
WatchGuard APT solution provides real-time, advanced-threat visibility for WatchGuard Unified Threat Management and Next-Gen Firewall appliances. Woking, Surrey: 9th May, 2014 - Wick Hill is now shipping WatchGuard's new Advanced Persistent Threat (APT) solution, WatchGuard APT Blocker...
It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost of Data Breach Study: United States and...
Il y a quelques semaines, j’ai eu l’honneur de déjeuner avec le jeune DSI d’un grand groupe français, membre du CAC 40. Nous parlions des révolutions informatiques en cours et, bien entendu, du Cloud Computing. Pendant nos échanges, il a...
Wick Hill showing wide range of vendor solutions including new products and version updates. Earls Court, London 29th April to 1st May 2014Stand No: F5029/4/14 - The diversity of the Conference Program at this year's Infosecurity Show mirrors the sheer breadth of challenges facing IT s...
Eligible UK charities can purchase Bitdefender software for up to 90% off the retail price through Technology Trust's software donation programme London, 22nd April 2014 - Technology Trust today announced that Bitdefender® antivirus software is now available to eligible UK chariti...
News and insight from GoAnywhere Managed File Transfer Blog - Secure Managed File Transfer The success of a company now relies on its ability to secure critical data.  When escalated to this level of importance, it’s time for the CEO and board to become directly engaged in the process....
There are a variety of opinions on the seriousness of Heartbleed being put forth ranging from "it's not the end of the world" to "the sky is falling, duck and cover." Usually the former cites the relatively low percentage of sites impacted by Heartbleed, pegged at about 17% or 500,000 ...
Hamburg, 15 April 2014 - gateprotect AG Germany, Germany's leading independent IT security specialist, has been admitted as a participant in the Alliance for Cyber-Security. The Alliance for Cyber-Security has been founded in 2012 upon the initiative of the Federal Office for Informati...
Exam registration now open for CCFP-EU; first exam available 30 April 2014London, UK, 15 April, 2014 - (ISC)²® ("ISC-squared"), the largest not-for-profit membership body of certified information and software security professionals with nearly 100,000 members worldwide, t...
London, UK, 15 April, 2014 - Courion, a leading provider of intelligent identity and access management solutions, today announced two new hires in the UK and the Middle East to help boost its strategic growth in EMEA. Nick Kennelly has been appointed to the role of UK Account Manager a...
SG Series Utilizes New Intel™ Core Processors to Accelerate Sophos UTM and Next-Gen Firewall Solutions Oxford - April 14, 2014 - Sophos today announced a major refresh of its network Security Gateway hardware with the availability of the new Sophos SG Series appliances. These hig...
Global universities now have access to the largest, most current compendium of information and software security topics London, UK, April 10, 2014: Accredited academic institutions now have access to new resources and support from the world's largest not-for-profit membership body of c...
Here we go again, another huge vulnerability exploit detected in open source security software:
In several past articles published here, the ever opinionated mobile expert Peter Roger's shared his belief that the age of traditional mobile platforms had passed.  In this article however, guest blogger and mobile expert David Akka shares a different opinion.***Over the last six...
New APT solution provides real-time, advanced-threat visibility for UTM and Next-Gen Firewall appliancesAdvanced, cloud-based, full-system-emulation sandbox protects in minutes, not hours 3 April 2014 - WatchGuard® Technologies has announced its new Advanced Persistent Threat (APT...
London, United Kingdom, April 03, 2014 --(PR.com)-- Storage Made Easy today announced an add-on connector to its unified file sharing and file Discovery platform that enables the indexing and deep searching of documents whether they are stored behind the corporate firewall or on a pub...
New FlexNet Producer Suite release simplifies subscription, cloud- and usage-based licensing while eliminating the risk of revenue leakage from non-compliant use in virtualised environmentsMaidenhead, UK - April 2, 2014 - Flexera Software, the leading provider of Application Usage Mana...
New technology captures brain activity via Bluetooth and predicts actions of system administrators before they happen www.netwrix.com/predict1 April 2014 - Netwrix, the leading provider of change and configuration auditing software, today unveiled its new 'mind-reading' technology, whi...
This is an exhilarating time for DocuSign. We recently hosted our annual DocuSign MOMENTUM conference in San Francisco where we were joined by over 1,200 kindred spirits working to fundamentally transform their businesses and “keep business digital.” One of the most exciting things at ...
This is an exhilarating time for DocuSign. We recently hosted our annual DocuSign MOMENTUM conference in San Francisco where we were joined by over 1,200 kindred spirits working to fundamentally transform their businesses and “keep business digital.” One of the most exciting things at ...
In summary Steria has just concluded a contract with the General Secretariat of the European Union to modernise and secure the communications networks used to share information internally and with Member States. The four-year framework contract, worth €6 million, is renewable for...
The title of this article is quite a mouthful, and three very complex and broadly-scoped disciplines mashed together. But that's what's happening all over, isn't it, driven by consumer demand on their iPhones - mashing and manipulating information that's managed to leak through the ris...
Tuesday 25 March, 2014 Flexible, scalable, Open Source Infrastructure as a Service (IaaS) used by organizations such as Zynga, Datapipe, and ISWest, among others, for creating, managing, and deploying public, private, and hybrid Cloud Computing environments Forest Hill, MD --25...