Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
- combines multi-layer data centre security with market-leading performance. - introduces 1300 Appliance Family for High-Performance Data Centre Cyber Security Woking, Surrey: 22nd August 2013 - Now shipping from Wick Hill is the recently launched Check Point® 13500 Appliance, th...
LONDON, UK, 22 August, 2013 — Courion® Corporation, the leader in risk-driven identity and access management (IAM), has announced that it will be hosting a seminar on the lessons from the collapse of Barings bank with Nick Leeson as a guest speaker. The event will explore wh...
AEG Leverages GlobalSign SaaS Certificate Authority to Strengthen Security Through Certificate Based Two Factor Authentication and Advanced SSLLondon, UK - August 21, 2013 - GlobalSign, the enterprise SaaS Certificate Authority (CA), today announced availability of the GlobalSign Auto ...
By Ian PalmerGreg Thompson has his work cut out for him as Scotiabank’s highest level security professional. Thompson, vice president of enterprise security services at the Toronto, Ontario-based entity, oversees a team responsible for ensuring that hackers, cyber terrorists and hackti...
New entry-level Thunder 3030S, 1030S and 930 add 30% increased capacity, 500% higher SSL performance and 10 Gb ports for Next Generation Application DeliveryWoking, Surrey: 15th August 2013 - Wick Hill is now shipping A10 Networks' new entry-level A10 Thunder™ Series, which exten...
Architecture metaphors can be useful to understand some of the challenges related to identity management. Everyone knows what a bridge or a gateway it.So let's look at one of the problems
Agreement Enables Innovative German Security Specialist to Deliver Real-Time Threat and Data Protection from Every Endpoint to any Network BoundaryHamburg and Broomfield, Colo, USA, 13 August 2013 - German IT security specialist gateprotect and Webroot, a leader in cloud-based security...
What do you have to know to successfully implement and negotiate a BAA and achieve HIPAA compliance? With the mounting momentum for cloud adoption within the healthcare space, the topic of business associates agreements (BAA) isincreasingly fraught with competing perspectives on wha...
Final deadline for all entries is September 12th, but early birds save and get a chance to win free tickets to Structure:EuropeLONDON, UK - August 6th 2013 - The Tech Trailblazers Awards early bird rates closes just shy of midnight Pacific time next Monday, leaving enterprise tech star...
By Bob GourleyI’ve previously mentioned the very virtuous Security Innovation Network (SINET). With this note I want to enlist your help in finding innovative technology firms with potentially very virtuous security capabilities to apply to a SINET run activity which can help acc...
Earlier this month, we discussed the effect of NSA Leaker, Edward Snowden and the Prism Scandal on the future of cloud security. We asked (and answered) the question: What level of paranoia is justified in the wake of PRISM? But it seems the scandal just grows and grows. We now hear ...
As a result of our conversations with our customers, we can tell that the biggest issues in enterprise mobility are: Time to market Backend integration Security of mobile applications Time to market is perhaps the number 1 issue.  Demand for new or updated mobile apps is outstripping t...
By Kimberly KellyNorth Carolina State just conducted a study that showed only  7.5% ( yes, that is less than 10%) of the participants were able to identify fake emails. The study also showed that more than 50% of the group missed half of the fake emails and still deleted at least one a...
Castleton-on-Hudson, NY, July 31, 2013 --(PR.com)-- Today Bret Smith, Managing Principal of HiP (High-Impact-Prospecting, LLC), announced the agency has just released its four new professional resource libraries for inbound lead generation. "While HiP continues to lead with its ...
Top Ten Mistakes We See Clients Make with their Check Point Firewall This list was compiled from our ticketing system and anecdotal evidence taken from our engineering team. This list is by no means exhaustive and not in any order … Continue reading →
Top Ten Mistakes We See Clients Make with their Check Point Firewall This list was compiled from our ticketing system and anecdotal evidence taken from our engineering team. This list is by no means exhaustive and not in any order … Continue reading →The post Top Ten Mistak...
Bitdefender Total Security (2014) isn’t a mere security suite. It’s a security mega-suite, with a huge number of useful and functional components. Its antivirus earned good scores in our hands-on tests and excellent scores from the independent antivirus labs. Spam filtering...
At Hurricane Labs, we are constantly looking for clearer and better ways to effectively convey security concepts and best practices to our customers and the general Internet community as a whole. As part of this security education focused blog, we … Continue reading →
We have written before about SANS and the virtuous collaborative work they encourage in the community. They work so well with others and have for so long that a community of trust has arose around them. The collegial project that produced the “20 security controls” referenced here incl...
At Hurricane Labs, we are constantly looking for clearer and better ways to effectively convey security concepts and best practices to our customers and the general Internet community as a whole. As part of this security education focused blog, we … Continue reading →The po...
If anyone has been reading the news lately you have probably noticed that some information security focused organizations are pretty bad at actual information security. From the NSA allowing a low level administrator to walk out with sensitive data (and … Continue reading →...
If anyone has been reading the news lately you have probably noticed that some information security focused organizations are pretty bad at actual information security. From the NSA allowing a low level administrator to walk out with sensitive data (and … Continue reading →...
This Week in Cloud Update Starting in August, we will be changing the name of This Week in Cloud to TechViews in order to cover other trends in addition to cloud computing, such as mobility, big data, and DevOps. Along with the name chan...
Corporate Cloud Adoption A couple of weeks back, Solar VPS President and COO Ross Brouse (@RossBrouse), gave a technical keynote presentation at New York City’s Cloud Expo. The presentation covered corporate Cloud adoption – how Cloud adoption begins on the couch and makes it all the w...
National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third party public service users to over 5,000 later this year, delivering secure data transfers and ensuring compliance across the healthcare industryLondon, UK and Milton Keynes, UK - 24 July...
Cincinnati, OH, July 23, 2013 --(PR.com)-- MAX Technical Training is proud to announce they have been selected as a Finalist for 2013 Family and Private Business Award! This award recognizes companies who have made a long-term community impact, through their commitment to philanthrop...
Cloud Security Leader, Porticor, Closes Round of Venture Financing Led by Lazarus Israel Opportunities Fund and Glilot Capital Partners. TEL-AVIV, Israel. – July 17, 2013 – Porticor®, a leading cloud data security company, announced today it has closed a new round of venture funding le...
With the Cloud becoming more and more popular for the public, a debate has popped up between Cloud providers and Cloud users. That debate centers around the use of Local Data Backups vs. Cloud Data Backups. For the vast majority of companies and personal tech consumers, the idea of sto...
Hamburg, 09 July 2013 - The German IT security specialist gateprotect and the Fraunhofer Institute for Open Communication Systems (FOKUS) are happy to announce the start of a landmark cooperation focusing on the improvement of IT network security of companies and public institutions by...
Second edition of the global tech startup competition offers more chances to win, more mentoring and another massive prize pot for the enterprise tech startup community at www.techtrailblazers.com LONDON, UK - Calling all innovative enterprise tech startups: The second-annual Tech Trai...
By Ryan KamauffHere are the top cyber news and stories of the day. Medical devices vulnerable to hackers warns FDA – “In a recent safety alert, the FDA has officially outlined these potential vulnerabilities and incidents that could directly impact medical devices or hospit...
With 2013 cruising along and half the year in the rear view, I thought a rest stop with all the off-ramps thus far would catch you up on this road trip.  67 stops, 44 watchable. BYOD Behavior – Size Does Matter In 5 Minutes or Less – PCoIP Proxy for VMware Horizon View...
The hot topics of Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) have spurred several articles comparing and contrasting them. This blog provides a brief survey of these articles in chronological order, including a synopsis of each. I also included a ratin...
I finally got an MTNL broadband connection at home (Mumbai). Since I decided to get my own TP-LINK modem+wi-fi router (a good value for money model that I plan to review after a couple of months of use), I had to do the modem settings on my own. The settings for some models are availab...
Hamburg, Frankfurt, Annapolis 27th June 2013 - The German cycling team "4Athletes powered by gateprotect", headed by Dr. Peter Smeets, CEO of gateprotect AG Germany, scored a surprise win in the world's toughest cycle race - the Race Across America. In a total time of 5 days, 21 hours ...
Global enterprise technology awards strengthens ties with leading cloud security industry association London, UK - June 27 2013 - The global Tech Trailblazers Awards (Twitter: @techtrailblaze) for enterprise information technology startups today revealed a new mentoring program for awa...
Safe transition to the cloud made easy with proactive testing on demandLondon, 26 June 2013: Security Aware, an innovative IT Security Consultancy, has announced the launch of its Penetration Testing Services on the Interoute CloudStore. Security Aware's Penetration Testing Services co...
By Bob GourleyI’ve mentioned before how proud I am to be associated with Invincea as a member of their advisory board. They are a firm with a fantastic team of engineers and executives led by a mission-focused CEO. Together the Invincea team has built a capability that can mitiga...
Improving performance and scale is - or should be - a primary motivator for those deploying VDI as well as trying to manage the continued growth of BYOD. Forrester's David Johnson notes a convergence of trends that, on the surface, appear only tangentially related but as he points out ...
Partnership with TRUSTZONE Provides Industry-Leading Security Solutions and Has Already Resulted in Over 100 Percent Market Growth in Scandinavia LONDON - June 25, 2013 - GlobalSign (www.globalsign.co.uk), the enterprise SaaS-based Certificate Authority (CA), today announced that it ha...