Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
Companies are increasingly moving their data security to the cloud. By the 2015, 10% of overall IT security enterprise product capabilities will be delivered in the cloud, according to a study conducted by Gartner. In fact, the cloud data security market is expected to reach $4.2 billi...
Securing your information assets and data, what about your storage? By Greg Schulz Securing your information assets and data, what about your storage? Recently I did a piece over at the site Information Security Buzz title How Secure Is Your Data Storage? that takes a c...
Basically the Target attack, as I understand it anyway, was to get malware on point-of-sale systems – exfiltrate data. Does that sound familiar? It should, it’s basically how every breach has ever occurred. Sure you can replace malware with SQL … Continue reading →The...
I have been in IT a really long time with an interest in technology that far predates my career, think Commodore and Atari, and every expert I’ve ever met had exactly one thing in common. They are all narrow minded. … Continue reading →The post Beware The Expert IT Security...
MongoDB provides a number of constructs to improve the security of your data. The security of your data in MongoDB is paramount – so it is important to leverage these constructs to reduce your surface area. Here are 10 tips you can use to improve the security of your MongoDB serv...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
In a previous article, I briefly talked about the Open Web Application Security Project (OWASP) and based on some recent projects, I wanted to shed some light on this incredible organization. Established in 2001, OWASP’s mission is simply to make software security visible, so tha...
Many of the mid to high-end Check Point appliances feature a built in LCD display and control panel. When an appliance is booted up, the display will show the appliance model and the Check Point logo, as pictured. The LCD and control panel … Continue reading →The post Check...
Denver, CO, January 15, 2014 --(PR.com)-- CipherPoint™, the leader in data security solutions for Microsoft® SharePoint® Server, Microsoft Office 365, and Microsoft SharePoint Online today announced that it has established a reseller partnership with DocPoint Solutions...
Grant opportunities available to women, undergraduate, graduate and post-graduate students and faculty worldwide; candidates must apply by April 1st London, UK, January 14, 2014 — The (ISC)2® ("ISC-squared") Foundation, the non-profit charitable trust for (ISC)² tha...
40% of IT professionals view Operations teams as the biggest risk to security, above malware and external threats10 January 2014, Maidstone, Kent: SecureData, the complete security service provider, today revealed that 60% of IT professionals view employee carelessness as the biggest r...
Hamburg, January 8th 2014 - The German IT security specialist gateprotect is now offering an upgrade for its endpoint solution. "Complete Security - Mobile Protection" provides even better protection against evolving threats, malware and malicious applications on mobile devices. New fe...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
Roles in big data analytics, ecommerce and IT security will attract annual salary rises of 4% or moreLooking at senior leadership roles, Chief Information Security Officer (CISO) experienced the highest salary percent increase at 3.5% Top CIOs in London will earn as much as £297,...
By Bob GourleyThe AFCEA Bethesda chapter is known in the DC community for pulling together some of the most virtuous/mission focused events in the community. If you are unfamiliar with them I’ll just say that the attitude of this group of volunteers is always focused on doing the...
Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run ac...
Unified threat management devices have traditionally been suited for small and medium-sized business networks. UTMs combine a number of essential technologies, including firewall, perimeter antimalware and antispam, VPN, Web content filtering and more, but historically have not been ca...
40 million card numbers stolen. Will your firm be the next target? News broke last week that a major retailer was the victim of a massive theft of customer credit card data, in what is becoming an all too common cadence of data breaches.  Thieves made off with not just the credit card ...
December 19th, 2013 marked 10 years of successful business for Hurricane Labs. In honor of the occasion, the company will celebrate January 8th at their “10th Anniversary Celebration Lunch” with selected employees and clients. Hurricane Labs, founded in 2003 by … Continue reading...
The end of the year always initiates reflections on the year’s major trends and industry events, as well as predictions for the year ahead. SDN has certainly been a disruptive force this past year and will continue to transform networking in 2014. Michelle McNickle (@m_mcnickle) at Tec...
Leading fraud and risk management consultancy UKFraud (www.ukfraud.co.uk) has drawn up a list of predictions for the coming year.Their fraud predictions for 2014 are:1. The Cabinet Office - The Cabinet Office's Fraud Error Debt Department will evolve quickly in 2014. With the recent de...
LZA SOA Training & Certification: Washington DC – June 10 – 13, 2014 Tuesday June 10, 2014-Friday June 13, 2014 Dovel Technologies 7901 Jones Branch Drive McLean VA 22102 Price: $2,495.00 (including $500 early discount)   We offer additional discounts for groups of...
On December 16, 2013, our friends over at Compare the Cloud wrote a blog called “The Day Computing Changed Forever – and We All Missed it.” The blog centered on what the future of the Cloud could hold for society. Ironically enough, the post was published on the same day that Google (p...
Kroll Ontrack reveals latest trends in data recoveryLONDON, Dec 17, 2013 - The continuing proliferation of new drive types and the ever-growing problem of malware were among the biggest trends impacting the data recovery industry in 2013, according to year-end information from data rec...
Reykjavik, Iceland, December 16, 2013 --(PR.com)-- TM Software, a leading enterprise application software developer, today unveiled the latest version of its award winning Tempo Timesheets add-on for Atlassian’s popular JIRA platform, an industry-leading project and issue manage...
It’s been a busy year in the information security industry. We saw several breaches this year and heard much talk around “cyber warfare”.  Some three-letter agencies have been in the news with spying, wiretapping, and hacks.  In the beginning of … Continue reading →The post...
By Bob GourleyDC seems to have a cyber security related event every week. No kidding. You have to pick and chose and only go to the best or you will never get any work done.  How do you pick the right events? My recommendation is to look for events that have a good mix of thought leade...
It's often the case that upon hearing the word "consolidation" in conjunction with the network people conjure up visions of what's commonly known as a "god box." This mythical manifestation of data center legend allegedly enables every network-related services to be deployed on a sing...
- WorkSpace Office365 iQ and CloudReady® Insight provide comprehensive assessments for Office 365 migration projects- Centrix Software and Exoprise's collaboration enables joint-partner Champion Solutions Group to deliver Microsoft Office 365 NEWBURY, UK and WALTHAM, MA - December...
Thales hardware security modules and Time Stamp Servers help counter black market in degree certificatesPlantation, FL - 9 December 2013 - Thales, leader in information systems and communications security, announces that its nShield hardware security modules (HSMs) and Time Stamp Serve...
When it comes to security, one cannot go by a one-size-fits-all product.  There are many products in numerous markets, all claiming to be the best and most suited to your needs. However, security, like everything else in the IT industry, has to be customized and adapted to suit sp...
In my three previous posts I showed you how to use the Windows Azure cross platform command line tools to: Create a firewall rule for a SQL database server(http://thinkfirstcodelater.com/blog/?p=3479) List the firewall rules for a SQL database server(http://thinkfirstcodelater.com/blog...
HAPPY THANKSGIVING! In my previous post (http://thinkfirstcodelater.com/blog/?p=3490) I showed you how to use the Windows Azure cross platform command line tools to list the firewall rules for a SQL database server. In this post I’ll show you how to use the tools to display the details...
London, United Kingdom, November 28, 2013 --(PR.com)-- Storage Made Easy today announced the general availability of the SME Cloud Control Appliance, their on-site enterprise file share and sync (EFSS) application. Unlike other Enterprise File Sync and Share products the SME product ...
In my previous post (http://thinkfirstcodelater.com/blog/?p=3479) I showed you how to create a firewall rule for a SQL database server using the Windows Azure cross platform command line tools. In this post I’ll show you how to use the tools to list the firewall rules for SQL database ...
Cincinnati, OH, November 27, 2013 --(PR.com)-- MAX Technical Training employees will be joining with many of Cincinnati’s finest women-owned businesses at this year’s WE Celebrate Awards ceremony presented by the Cincinnati USA Regional Chamber. MAX is one of five finalist...
Building Coalitions through CYBERTechNet Asia-Pacific 2013 Conference in Honolulu Hawaii co-sponsored byAFCEA International and AFCEA Hawaii will take place in Honolulu December 3-5 at the Hilton Hawaiian Village Waikiki Beach resort.More details here:http://www.afcea.org/events/asiapa...
In my previous post (http://thinkfirstcodelater.com/blog/?p=3471) I showed you how to use the Windows Azure cross platform command line tools to view the details of a specific SQL database server. In this post I’ll show you how to use the tools to add a firewall rule to a SQL database ...
In my previous post (http://thinkfirstcodelater.com/blog/?p=3463) I showed you how to use the Windows Azure cross platform command line tools to list your SQL database servers. In this post I’ll show you how to use the tools to get the details for a specific SQL database server. Once a...
Zurich, Switzerland - November 21, 2013 - CloudSigma, a public cloud IaaS provider with advanced hybrid hosting solutions, today announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage ...