Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
Stockholm, Sweden, October 07, 2013: Tilgin, a leading provider of solutions for multi-play and next-generation broadband access, and Media5 Corporation, a provider of innovative VoIP communication solutions for Enterprises and Service Providers, are ready to roll-out TR-069 VoIP solut...
An attendee at our IT Camp in Saint Louis a few weeks ago had an problem that is understandable: “Thanks for training session, I have a question.  Tried to RDP one of my VM’s at work and I can’t connect.  Possible firewall port issue?  I am going to try and connect fro...
An attendee at our IT Camp in Saint Louis a few weeks ago had an problem that is understandable: “Thanks for training session, I have a question.  Tried to RDP one of my VM’s at work and I can’t connect.  Possible firewall port issue?  I am going to try and connect fro...
By Ryan KamauffHere are the top cyber news and stories of the day. LinkedIn Shuts Down Four XSS Flaws – “LinkedIn has closed the door on four cross-site scripting (XSS) vulnerabilities, which could have been used to ultimately steal credentials from users.” LinkedIn i...
There are four ways to get data from a host to Icinga. The first is to use an agent, something like NRPE on *nix systems or NSClient++ on Windows based systems. The second way is to pull the data from … Continue reading →The post Icinga and Agentless Monitoring appeared fir...
There are four ways to get data from a host to Icinga. The first is to use an agent, something like NRPE on *nix systems or NSClient++ on Windows based systems. The second way is to pull the data from … Continue reading →
Daresbury, UK - October 1, 2013 - In a move designed to limit impact on teaching time, increase IT security and encourage more collaboration amongst students, Kingsbury School and Warwickshire Education Services have adopted AppSense DataNow technology. DataNow, which was rolled out ea...
Hamburg, 01st October 2013 - The German IT security specialist gateprotect and the distributor Comguard are showcasing several innovations at the GITEX in Dubai. From 20 to 24 October 2013 in hall 1 at booth C1 - 9A at the most important technology trade fair of the Middle East and Asi...
In light of this week's LexisNexis Data Breach report, it's worthwhile to explore the true value and usefulness of this kind of data that might be stolen from you.Sensitive, personal data (PII, or "Personally Identifiable Data") is usually protected, but no protection is guaranteed if...
Introduction to PCI DSS and the Cloud The news is always full of major incidents of consumer credit card information being compromised. To protect against dangerous hacks that can lead to thefts of business data or customer identities, best practices are set forth in the Payment Card I...
C-level data from the 2013 (ISC)² Global Information Security Workforce Study illustrates paradoxes in application vulnerabilities, mobile devices and shortage of qualified staffLondon, UK - September 25, 2013 - (ISC)2® ("ISC-squared"), the world's largest not-for-profit ...
Ian Kilpatrick, chairman of Wick Hill Group specialists in secure IP infrastructure solutions, considers the risks to businesses from the proliferation of wireless access points. He discusses the benefits of deploying secure access points, which are directly linked to gateway security....
By Richard StiennonI have just published a children’s book on SCADA. How crazy is that? Supervisory Control and Data Acquisition(SCADA) refers to the technologies and protocols used in most manufacturing, oil and gas, electrical grid, and transportation for communicating with physical ...
Here are the more notable security articles as part of my responsibilities on the Dice Security Talent Community page: Database Misconfigurations: Windows To Vulnerable Data Half of Consumers Unaware of Medical Identity Theft Risks: Report HP overhauls security with ‘next-genR...
Los Angeles, CA, September 18, 2013 --(PR.com)-- Would you believe a 1960’s sitcom holds the keys to a 21st century IT security best practices? According to cloud security firm CloudAccess, the classic comedy "Get Smart" serves as the learning anchor to showcase how a ...
LZA SOA Training & Certification: Sydney — February 17 – 20, 2014 Monday February 17, 2014-Thursday February 20, 2014 C C & C Solutions L20 Zenith Tower A 821 Pacific Highway Chatswood NSW 2067 Australia Price: A$2,495.00 (including $500 early discount) [converted t...
Sequoia Capital Leads Series D Round, Okta Appoints Philip Turner As New GM For European Operations London, UK - September 16, 2013 — Okta announced today that it closed a $27 million Series D funding round led by returning investor Sequoia Capital. Existing investors Andreessen ...
Electronic Document Management Company Chooses Secure Private CloudMaidenhead, UK: RapidSwitch, the leading European supplier of self-managed dedicated server solutions and part of UK cloud company iomart Group plc, has been selected by Documents Online to host its new affordable elect...
Three European recipients of scholarships that foster next generation of cyber security professionals and research London, UK, September 16, 2013 — The (ISC)² ("ISC-squared") Foundation, a charitable trust that aims to empower students, teachers and the general public to...
Cincinnati, OH, September 12, 2013 --(PR.com)-- MAX Technical Training, a woman-owned and operated IT training company is recommending companies take advantage of the Ohio Incumbent Workforce Training Voucher Program. MAX Technical Training can assist companies in navigating the proce...
Securing your data used to be simpler (if not necessarily easy). You had IT infrastructure in your data center. You adopted security controls at all levels – from physical security, controlling who could enter the facility, up through the network and system, and application layers. IT ...
What are the technical steps you need to take to safeguard or respond to a breach? One of the most difficult and damaging events that can occur for any business’ infrastructure is a breach. However, breaches occur when proper planning hasn’t gone into an infrastructure contingency p...
Channel solution for security risks from an increasingly mobile and data-heavy network environment Woking, Surrey: 12th September 2013 - VAD Wick Hill announced today that it has been appointed distributor for US-based Guidance Software. Guidance Software is a world leader in digital f...
New Survey Shows 85% of Windows Developers are Tasked with Developing Mobile Apps and 95% See Value in Using Common Source Code for Both Desktop and MobileMaidenhead, UK - September 11, 2013 - Embarcadero Technologies, a leading provider of software solutions for application and databa...
As Apple launches iPhone 5S, over half (56%) of CIOs say they now allow employees to use their own smartphones in the workplace Over three quarters (76%) allow mobile devices, including tablets, MP3 players and USB drivesSecurity concerns cited as biggest challenge faced by companies a...
There’s no place to hide. There are no more secrets.
iomart Provides Secure and Scalable UK cloud hosting Glasgow, UK: ad:tech, the organiser of the world's largest digital marketing conferences, has chosen CloudSure from iomart Hosting, a leading UK provider of bespoke cloud and managed hosting, to ensure a scalable and highly available...
The following is an excerpt of the recently released case study on how a major retailer, BCBG, migrated to a cloud security platform and discovered how SIEM and Log Management capabilities enhanced their abilities for enterprise security. For the entire case study, you may download a P...
Armadillo Managed Services and protected-networks are now working together closely to offer 8MAN - a unique solution that helps clients create a safer environment for their business-critical information, accelerate compliance procedure and streamline the access rights management. With ...
DevOps is awesome for somethings, but where does it fall short? DevOps tears down the often artificial barriers between developers and operations in an organization. Being in different departments and being accountable for different, often conflicting goals can lead to strange situa...
Cincinnati, OH, September 04, 2013 --(PR.com)-- MAX Technical Training employees express their thanks to their clients for helping them reach a fantastic achievement: being named – for the second consecutive year – to the Inc. 5000 list of fastest growing private companies...
Running considerably into its 12th year of foundation, Sourcefire has come a long way from a single, open source software, to a corporation listed in NASDAQ, providing robust network security solutions to corporations worldwide. Transforming the way Global 2000 organizations and govern...
By Bob GourleyEditor’s note: MemSQL is a fast, in memory database.  How fast is fast? This could be the world’s fastest in memory database, so this is one worth tracking. I had an opportunity to ask some questions of the MemSQL CEO, Eric Frenkiel, regarding some recent benc...
Imprivata's strong authentication solution helps organizations optimize roaming desktop capabilities in VDI environmentsReading, UK August 28, 2013 - IGEL Technology today announced its thin clients will support Imprivata OneSign ProveID Embedded, a new solution designed to provide hea...
Hamburg, 28 August 2013 - The German IT security specialist gateprotect has once again invested into the equipment of its next generation firewalls and is as of now offering all models with a new, more powerful hardware. The GPO series for comprehensive protection of small offices and ...
Once the initial thrill of SDN abated to a dull roar, the issue of what to do about higher order services (layers 4-7) was raised. Thus far, we've seen some fairly expected responses with notions like service chaining and SDN application service insertion into the controller. What's b...
SDN may be getting more attention than SDDC (Software Defined Data Center), but the reality is that SDN is part of a much larger initiative; one that encompasses the whole of the data center. In the quest to provide self-service IT, formerly known as IT as a Service and now appearing ...
HIPAA cloud regulations place a difficult burden on companies seeking to achieve compliance within the healthcare industry. Those moving to cloud computing in the world of healthcare often live in fear of auditors who will pick apart their cloud-based solution.  Perhaps the auditors...
Security solution providers can now easily create a fully-featured SSL content proxy application with Bloxx's proven technologyBoston, Mass, (August 27, 2013) - With an increasing level of Web traffic rapidly moving to the encrypted Hypertext Transfer Protocol Secure (HTTPS) protocol, ...
Turning Off Stateful Inspection in Your Check Point Firewall Over the past few years of working with Check Point, I have seem some weird and crazy things. One of those crazy (and unsafe) things I have seen is someone turning … Continue reading →