Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
Password Central reduces service desk costs, empowers the end user with multi-access self-service password managementLondon - Nov 21, 2013 - LANDesk Software, the global leader in delivering User-Oriented IT to organizations that solves systems, security, mobility and ITSM management c...
By Dawid CzaganThe goal of risk management is to deliver optimal security at a reasonable cost. This article introduces quantitative risk analysis, cost/benefit analysis, risk handling, and types of countermeasures. The CIA Triad Risk is related with vulnerabilities, which threaten the...
Are there any dangers of using “free” Linux? Linux is used by many and a simple search turns up many different versions, most of which are free with a few paid exceptions.  The advantage of Linux is that the core or kernel is free for distribution.  This enables various compa...
End-to-end mPOS solution allows businesses to process payments for any card typeCARTES, Paris - 19 November 2013 - Thales, leader in information systems and communications security, announces that ROYALGATE, a leader in payment solutions, has deployed Thales payShield 9000 hardware sec...
By Bob GourleyIt is with great excitement that I share news I just saw regarding Bob Flores, a friend and associate and highly respected technology professional, will be addressing the CSA Congress. Press release from http://ctolink.us/1cUWW1e is below. BOB FLORES, FORMER CTO OF THE CI...
Klagenfurt, Austria, November 13, 2013 --(PR.com)-- Video is forecasted to grow with a 75% CAGR to become over 66% of worldwide mobile IP traffic by 2017 - already today it is responsible for over 70% of fixed internet traffic(1). The explosion of media traffic and huge variety in dif...
Support for PIN based payment card transactions at mPOS lowers risk and transaction fees for mobile merchants moving away from cashCambridge, UK - 12 November 2013 - Thales, leader in information systems and communications security, and MagTek, a leading provider of secure transaction ...
Support for PIN based payment card transactions at mobile point of sale (mPOS) lowers risk and transaction fees for mobile merchants moving away from cashCambridge, UK - 12 November 2013 - Thales, leader in information systems and communications security, and Spire Payments announce a ...
Thales showcases mPOS multi-partner ecosystem at Cartes 2013Cambridge - 12 November 2013 - Thales, leader in information systems and communications security, will be showcasing and demonstrating a range of solutions from leading mPOS device manufacturers and newly announced members of ...
New version of the OnApp platform introduces a new type of dedicated Smart Server; bare metal servers with automatic provisioning; and new workflow automation tools for servers and application stacksLONDON - November 12, 2013 - OnApp has announced General Availability of the latest ver...
This InformationWeek article suggests that mobile security should be integrated into an organization’s overall IT security strategy, rather than managed as an independent initiative. This article provides a “top five” checklist to ensure healthy mobile
Innovative bring your own key (BYOK) capability allows businesses to retain control of critical assets in the cloudPlantation, FL - November 7, 2013 - Thales, leader in information systems and communications security announces that its nShield hardware security modules (HSMs) have been...
TechViews: Neurocam scans your brains and records your interests, DevOps myth busters, Top 5 practices to ensure mobile security and more! Gartner: How CIOs Can Show Support for Customer Experience Initiativ...
- Only one in five searches is right first time - The search for corporate information, either in the office itself or out on the road, is eating into workplace productivity, according to the latest research from Simplexo.The research, conducted in both the UK and the USA, found that o...
Wednesday 6 November, 2013 STEALTHbits to showcase unstructured data integration into 3rd party IAM platforms for Access Governance over File System and SharePoint data November 6, 2013, Hawthorne, NJ – STEALTHbits Technologies today announced they will be exhibiting at Whiteha...
London event updates on increasing number of regulatory requirements and how organisations can remain compliant, plus demonstrations of cutting edge IAM technologyLONDON, UK, 05 November 2013 - Courion® Corporation, the leader in risk-driven identity and access management (IAM), h...
The recent attack on Adobe, which saw approximately 38 million customer accounts breached, demonstrates that despite the growing threat of cyber attacks, a lacklustre approach to IT security is still exhibited by many organisations regardless of their size or reputation, states Simon B...
(ISC)² establishes global standard of competency for healthcare information security and privacy practitionersLondon, UK, November 4, 2013 — (ISC)²® ("ISC-squared"), the world's largest not-for-profit information security professional body and administrator...
Traditional networks make work complex and have several limitations on its architecture, which calls for a new innovations that will make reforms in the industry.  Brocade has come out with just the thing with its on-demand data centers that are more intelligent, highly automated ...
For IT security professionals, mobility is the new reality. No longer can IT feel safe in simply securing their on-premise assets; IT security must evolve to encompass mobile devices, mobile applications and enterprise environments to truly mitigate the
The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the moving parts (like users and applications) are themselves evolving and changing. This creates unique challenges in operational efficiencies, core competency ...
A significant source of chatter around SDN began with a focus on the northbound interface (apparently now dubbed NBI, FWIW) at Layer 123 SDN & OpenWorld Congress 2013. A quick overview of the latest focus in SDN can be read in this SDN Central article, "ONF Will Tackle SDN’s Northbound...
In this release (pretty big) you can remotely debug your Azure applications (Cloud services, Azure sites, and so on) with Visual Studio. A preview of Windows Azure Management Libraries for .NET is also included. Of course integrated sign-in is supported which means as far as resources...
By Bob GourleyDARPA has just posted a very interesting announcement all cyber security professionals should be tracking: a Cyber Grand Challenge. DARPA’s Cyber Grand Challenge (CGC) aims to create the first-ever tournament for fully automatic network defense systems. Teams would create...
IT security professionals need to stay ahead of disruptive trends such as mobility and cloud to mitigate risk and ensure assets – including critical and confidential customer data – remains protected. And while vendors work to provide the technologies
#DataCenterWorld #SDN #NFV One size does not fit all. Shannon Poulin, VP Data Center and Connected Systems Group and General Manager, Data Center Marketing Group for Intel gave the keynote address at Data Center World Fall on transforming the data center for a services-oriented world....
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced, many IT security experts are still stuck with the original firewalls that handle ports and protocols. … Continue reading →
By Bob GourleyFederal Computer Weekly, Government Computing News and SoftwareAG have crafted an event I believe every enterprise technologist in government should be tracking. It is the 21 November 2013 Efficient IT Modernization Strategies Summit, which will be held at the Grand Hyatt...
The first quarter in which half of all connections to Akamai occurred at 4 Mbps or higherMore than 752 million unique IP addresses connected to the Akamai Intelligent PlatformEuropean countries achieve some of the largest increases in average connection speeds observed this quarterZuri...
LZA SOA Training & Certification: Dallas — January 27 – 30, 2014 Monday January 27, 2014-Thursday January 30, 2014 Dallas Texas Venue TBD Price: $2,495.00 (including $500 early discount) [converted to 2495.00 USD] We offer additional discounts for groups of three or mor...
Hamburg, 15 October 2013 - The German IT security specialist gateprotect and Computerlinks, Value Added Distributor for leading international technology providers, have agreed to extend their cooperation. As of now, Computerlinks will distribute gateprotect security solutions also in P...
Simplexo, a British pioneer of security search technology has been shortlisted in two categories of the SVC awards - Cloud Company of the Year and SaaS Solution of the Year, demonstrating its commitment to driving secure search technology to the forefront of the cloud, virtualisation a...
Hamburg, 09 October 2013 - German IT security specialist gateprotect, has partnered with the Westcon Group in South Africa and Africa in a bid to strategically enhance its presence in the region. Thanks to the integration into the Westcon-Comztek data security portfolio, the company no...
Tesla founder Elon Musk has posted a detailed explanation about the Model S accident that set the vehicle on fire last week. Tesla’s stock experienced high volatility after a video of the incident was uploaded to YouTube. In August, Tesla had trumpeted its car as having the highest saf...
By Ryan KamauffHere are the top cyber news and stories of the day. Hackers go phishing with Obamacare – It is possible that using the new HealthCare.gov site will open up users to more vulnerabilities and more. Because users are likely to be confused by the new system, they are m...
Whether you move from an on-premise platform to a mobile device or a virtual cloud environment, security has always been the biggest concern. It’s no more shocking to hear about big banks, financial institutes, and large organizations shutting down their business or coming to a standst...
At our IT Camp in Saint Louis a few weeks ago, Todd had a great question on protecting his cloud-based SQL Server: Kevin, Not sure this question was asked at the Azure IT boot camp but is there any future plans to segregate or ACL off the subnets in Azure?  Most of our web ...
At our IT Camp in Saint Louis a few weeks ago, Todd had a great question on protecting his cloud-based SQL Server: Kevin, Not sure this question was asked at the Azure IT boot camp but is there any future plans to segregate or ACL off the subnets in Azure?  Most of our web ...