Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
The UK government is starting to plan the evolution of their G-Cloud (Government Cloud) initiative. In essence the current implementation is basically an ‘e-commerce store for Government Cloud IT services’. The Cloud Store is just that, the logical first step of a single or...
Monday 24 March, 2014 London UK, Monday 24th March 2014 – Businesses across the globe are becoming dangerously exposed to increasing cyber threats as almost 85% of the world's leading AntiVirus solutions are constantly failing to identify emerging threats. With an increasing le...
Hamburg / Gilbert, Ariz, 20 March 2014 - The German IT security specialist gateprotect is continuing the strategic expansion of its international network of partners with the appointment of value-added distributor Envoy Data Corporation, which specializes in IT security solutions for t...
(ISC)² and ASIS Bring Together Renowned Speakers and Career Development Opportunities in the World's Most Comprehensive Security Event in Atlanta in 2014London, UK, March 19, 2014 - (ISC)²® ("ISC-squared"), the largest not-for-profit membership body of certified ...
Data security is at the top of mind for any company that handles payment card information, and for good reason. The recent hack at Target is a sadly real example of the damage hackers can cause. Dangers are not limited to hacking, they can also include employee theft or human error.  T...
The changing regulatory and compliance environment around data privacy necessitate improved methods of protecting sensitive information sent to the cloud. Encryption is one strategy cloud service providers use to protect enterprise cloud data from cybercriminals and any unauthorized ac...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
With over 20 years of successful management of IT security Check Point is still continuing to innovate and evolve to suit current and future needs.  The company has in its portfolio some of the widely used products and services which are leaders in their own right.  Check Poi...
90% of IT managers plan to adopt SMS-enabled two-factor authentication this year as majority abandon traditional security measuresLondon, UK - 12th March 2014 - New global research by the Ponemon Institute, sponsored by mobile interaction service provider tyntec, has revealed that on a...
In response to growing demand for formal software risk and quality management tools, the nations’ most respected standards bodies and IT communities of practice have joined forces to advance the state of the practice in software quality management.  Hosted by the Consortium for IT...
Hamburg, 10th March 2014 - As of now, it will be even easier for gateprotect partners and any interested party to find product information and communicate with the leading German IT security provider while travelling: The "gateprotect App" is now available in the "iTunes Store" and in ...
Showcases award winning vSpace and N-Series solutions for extending affordable, powerful and flexible computing to widest range of SMEs, public sector and education organisationsHemel Hempstead, UK - 7th March, 2014 NComputing, the leader in accelerating the adoption of desktop virtual...
Organisations save £150,000 over five years as employees fund IT purchasesLondon, UK 6th March 2014: LANDESK, the global leader in delivering User-Oriented IT solutions solving systems, assets, security, mobility and IT service management challenges, today announces research which...
By Bob GourleyYou know the Security Innovation Network (SINET), the virtuous community builder focused on promotion of innovation in cyber security. One of the ways SINET helps move the community forward is by convening a yearly IT Security Entrepreneurs Forum (ITSEF). The 2014 ITSEF w...
Hamburg, 04th March 2014 - Competitively priced complete protection for small companies: gateprotect is enhancing its product family by an innovative security solution with entry-level UTM protection. With the GPO 110, a new, easy-to-use firewall for up to 15 users will be presented. I...
By Bob GourleyHP Enterprise Security Solutions to help 33 U.S. government agencies prevent network and system vulnerabilities PALO ALTO, Calif. — HP today announced the U.S. Department of Homeland Security (DHS) has awarded the company a cybersecurity contract worth up to $32.4 million...
Hamburg, 27 February 2014 - gateprotect AG Germany will present a software version enhanced by some state-of-the-art security features for its Next Generation Firewalls developed in Germany. A significantly faster antivirus scan, extended reporting and the possibility of integrating a ...
International collaboration helps Return Path to reduce email abuse and extend detection to 2.4 billion mailboxes worldwideLONDON, February 26, 2014 - IT Security vendor Kaspersky Lab and email intelligence company Return Path announced today a new, collaborative initiative to combat i...
New, 2.5-inch 600GB Ultrastar® C15K600 HDDs, and the Newly FIPS 140-2 Certified 12Gb/s SAS Ultrastar SSD, Complement HGST's Growing Line of Reliable, Enterprise-Class Storage Solutions for Improving Storage Density and Lowering Power in High-Performance Computing EnvironmentsLONDO...
A hardware firewall is a standalone appliance that is meant to sit in front of your IT infrastructure, or in other words between your servers and the Internet, acting as a guard so to say monitoring all traffic that is entering and leaving your network. Software firewalls are isolated ...
IT security leaders and CISOs need to stay on top of emerging threats, malicious attacks and evolving technologies. They must also keep their teams staffed for security success, according to Javvad Malik, Senior Analyst in the Enterprise Security
RSA Conference 2014 - February 25, 2014 - Thales, leader in information systems and communications security, announces that InfoSecurity Products Guide has recognized Thales keyAuthority® as Best Encryption Product in its 2014 Global Excellence Awards. The prestigious award recogn...
#sdas #infosec #ssl #DDoS #webperf SSL, like all cryptographic-based systems (and much to our chagrin, many security solutions) consumes a lot of resources. The longer the key lengths, the most complicated the key exchange, the more resources must be allocated to accomplishing both th...
By Bob Gourley2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics The Guidance Software Federal Summit is a thought leadership forum designed exclusively for federal managers and leaders to learn how Government and industry leaders are ac...
Tech trends come and go, but IT security is a constant that technology leaders must master and then update with every new threat or type of attack. The security landscape isn’t getting any smoother in 2014 either, as malicious attacks continue to result
By now you know what Dropbox. By now you know what Box.net is. By now you know what Box.net is. By now you know popular Cloud storage providers and how online storage solutions can help you in your day-to-day personal life. Maybe you utilize Google Cloud storage to work on projects wit...
Dr. Davis to become managing director responsible for operations and development in EMEA London, U.K., 18 February 2014 - (ISC)² ("ISC-squared") has invested in its effort to meet the need for skilled professionals in information and software security with the appointment of a...
London, United Kingdom, February 13, 2014 --(PR.com)-- Storage Made Easy (SME), the public and private cloud startup for secure private enterprise file sharing and synchronization (EFSS), previously raised $1 million in its first seed round in December 2011. Total funding to-date now ...
Intermedia's new McAfee Email Defense Suite lets SMBs eliminate spam and viruses, filter outgoing email and provide redundant email accessBasingstoke, UK - February 11, 2014 - Intermedia, the world's largest one-stop shop for cloud IT services and business applications, has chosen McAf...
Plantation, FL - February 11, 2014 - Thales, leader in information systems and communications security, announces the publication of its latest 2013 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals that ...
We get quite caught up in high level architectures at times. It is good to read some posts that focus on design and implementation and the practicality of taking higher level architectures to reality. Two of Ivan’s posts caught my eye this week. In the first, he discusses the differenc...
When it comes to security there is no other than HP that you can trust.  They are the brains behind ArcSight, TippingPoint and now, Fortify which does exactly what the name suggests – fortifies your project.  The Fortify on-demand application can be tested before you decide t...
Listen: as cloud computing consultants, we drink the cloud computing koolaid. We’ve implemented cloud-based software for businesses of all sizes, across just about every industry. We’ve seen it revolutionize how businesses work. We’ve also seen security become a very real and increasin...
By Bob GourleyWe often highlight the importance of applying security controls to your enterprise. Our favorite model for doing that is the 20 Critical Controls coordinated by community leaders and curated at SANS (available here).  When you read of a government agency being penetrated ...
Grand Blanc, MI, February 04, 2014 --(PR.com)-- ModuleMD, LLC is pleased to announce that ModuleMD WISE™ EHR and Practice Management Version 8.0.0 is 2014 Edition compliant and has been certified as an Ambulatory Complete EHR for Meaningful Use Stage 2 on January 23, 2014, by In...
Windows Intune manages PC's and Mobile devices from the cloud and an update is coming soon. The Windows Intune web based admininstration console in the cloud can manage the PC's and mobile devices and includes all of these:Windows, Windows RT, Windows Phone 8, Apple iOS, Mac OS, and An...
TechViews: The Tesla Model S can power your house, Macy’s and Khol’s love Big Data, keyless hotel check-in with your phone; and more! Featured Article Gett...
Specialist IT security VAD will promote and sell Ipswitch File Transfer’s MOVEit System to UK private enterprises and public sector agencies through its network of expert resellers
IT services provider Ocean Intelligent Communications and central London data centre City Lifeline are partnering to provide clients of the two companies with a complete managed IT service. The partnership covers support for both within and beyond the walls of the data centre - giving ...
Business risk consultancy Riskskill (www.riskskill.com) has highlighted what it sees as the main areas of business risk in 2014. Advances in mobile and payment technology predominate globally, along with a retrenchment of government strategy in the UK. Their research suggests that key ...