Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
#virtualization Making #VDI fast, secure and available. Improving performance and scale is - or should be - a primary motivator for those deploying VDI as well as trying to manage the continued growth of BYOD. Forrester's David Johnson notes a convergence of trends that, on the s...
#virtualization Making #VDI fast, secure and available. Improving performance and scale is - or should be - a primary motivator for those deploying VDI as well as trying to manage the continued growth of BYOD. Forrester's David Johnson notes a convergence of trends that, on the s...
Collaborative Strategies, a leading consultancy which closely follows the collaboration software market, just released its annual report on the “state of collaboration” in 2013. Companies looking to implement collaboration software, or already using it, will take a lot away from this s...
Manchester (UK) and Boston (US) - June 19 - Avecto, the market leader in privilege management software, announced today they have signed a partnership agreement with one of McAfee's leading Elite Partners, Caveo Systems, a specialist in IT security systems and network infrastructure.Fo...
When I set out to test a collection of new small business firewalls for Network World, I wanted to find a place that could illustrate their need. I was fortunate to find Mercury Labs, which despite their name is a … Continue reading →
Crewe, Cheshire, U.K. - 17 June 2013 - Armadillo Ltd., one of the UK's leading security solutions integrators, today announced that it has entered into partnership with global data security experts Boldon James in order to offer their customers world-class data classification products....
Consultez le programme de toutes les conférences consacrées au Cloud Computing ; les sessions qui parlent de la sécurité du « nuage » (sous-entendu, de sa non-sécurité) sont parmi les plus nombreuses ! En 2010, j’avais abordé le sujet de...
ipoque adds application awareness to network solutions, reducing development costs & accelerating time to market for infrastructure vendorsThe explosion of smartphone and mobile application usage is having a dramatic impact on network infrastructure requirements, as more users acce...
Thales hardware security modules provide on-demand digital certificates to government agencies on UK G-CloudLondon, UK - 11 June 2013 - Thales, leader in information systems and communications security, announces that its nShield hardware security modules (HSMs) are being used by Trust...
63 per cent of employees say that IT does not secure all personal devicesLondon, 11th June 2013 - Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the business, acco...
US and South Korea to Host First Examinations in Global Effort from (ISC)² to Establish Professional Standards for Advanced Cyber Forensics CompetencyLondon, UK, June 10, 2013 — (ISC)²® ("ISC-squared"), the world's largest not-for-profit information securi...
Manchester event updates on current hacking and insider threat landscape, access risk management, plus demonstrations of cutting edge real-time access intelligence technologyLONDON, UK, 10 June 2013 — Courion® Corporation, the leader in risk-driven identity and access manage...
Enterprise Cloud Computing: London – December 5 – 6, 2013 Thursday December 5, 2013-Friday December 6, 2013 Price: A$1,295.00 [converted to 1239.96 USD] We offer additional discounts for groups of three or more people, government or non-profit employees, people who’ve...
Hamburg, 05 06 2013 - For the cycling team of the German IT security specialist gateprotect, the countdown is running towards the hardest bicycle race of the world, the "Race Across America". RAAM's 5,000-km tour leads across the USA, from the Pacific Ocean in the West to the Atlantic ...
Appeon Web How Does It Work?
In the cloud, security and availability are tied at the hip. Security and availability – they’re both incredibly important to your business. Sometimes they seem to conflict, but in reality they’re tied together and you need to think about both in your planning. A basic security co...
Epsom - June 4, 2013 - Kroll Ontrack, the leading provider of data recovery, e-disclosure and information management products and services, today announced five of the most common mistakes made by IT administrators that can lead to data loss. Given the complexity and capacity of advanc...
Centrify for SaaS Now Supports Office 365; Offers Easy-to-Deploy and Enhanced Active Directory-based Federated Identity for Reduced Complexity and Improved Security NEW ORLEANS (TechEd 2013 Booth 2418) — June 3, 2013 — Centrify Corporation, the leader in Unified Identity Se...
Global enterprise technology awards open to entries on July 4th. All entrants automatically submitted to the five new regional categories: Africa and Middle East; Asia-Pacific; Europe; Latin America and North America London, UK - May 29 2013 - The global Tech Trailblazers Awards for en...
FedRAMP (Federal Risk and Authorization Management Program), the government’s cloud security assessment plan, announced late last week that Amazon Web Services (AWS) is the first agency-approved cloud service provider.  The accreditation covers all AWS data centers in the United S...
Hamburg, 28th May 2013 - Industry expertise is crucial in the area of IT security for providing customers with optimal advice and tailored, effective protection. In order to be able to address vertical markets in a targeted manner, gateprotect has now published three case studies for t...
So that you have an internet site. You done it for a long time and it seems real nice. So you are willing to do business on the Internet! Only one thing is missing… Traffic! An Internet Site is close to worthless without traffic. Without the traffic for the site, your message wil...
LZA SOA Training & Certification: Estonia — September 24 – 27, 2013 Tuesday September 24, 2013-Friday September 27, 2013 devtraining Toompuiestee 30 10149 Tallinn Estonia Price: €2,245.00 (including $250 early discount) [converted to 2901.21 USD] ZapThink SOA Trai...
Warby Parker: Different than other e-commerce experiences. Recently we had the pleasure of sitting down for an extended conversation with Lon Binder, VP of Technology at Warby Parker. We discussed a range of issues central to how Warby Parker approaches IT, including going beyond th...
Flexiant enables ALVEA Services to rapidly deploy, brandable cloud-based computing solutions to the channelLondon, UK - 22 May 2013 - Flexiant, a leading international provider of cloud management software, today announced that ALVEA Services has selected Flexiant Cloud Orchestrator fo...
Appery.io has always made it quite simple to integrated with backend systems via REST APIs — but what if those systems are behind the firewall and don’t support REST?? Many enterprise apps required access to data that is sitting on a SQL Database or on some business application like SA...
LZA SOA Training & Certification: Sydney — September 10 – 13, 2013 Tuesday September 10, 2013-Friday September 13, 2013 Navitas Building (over Wynyrd Station) 11 York St Sydney Australia Price: A$2,495.00 (including $500 early discount) [converted to 2441.67 USD] ZapThi...
CohesiveFT nominated for International Datacentres Award in Public Cloud Category, Featuring Customer Use Cases in Webinar SeriesLONDON, UK - 16 May, 2013 - CohesiveFT has been shortlisted for the 6th Annual International Datacentres Award. CohesiveFT is nominated in the award category...
#SDN #API #devops What is it that applications want, and more importantly, what of those desires can the network fulfill? That's one of the questions SDN has to answer in order to make SDN relevant in the big picture that is the software-defined data center. What is it, other than...
#SDN #API #devops What is it that applications want, and more importantly, what of those desires can the network fulfill? That's one of the questions SDN has to answer in order to make SDN relevant in the big picture that is the software-defined data center. What is it, other than...
If you can extend your datacenter into the cloud using a secured network path and Windows Azure, it sure should follow that you can take advantage of cloud-based virtual machines to perform some of your more common infrastructure tasks.  For example: File Servers. “Yeah, I get it...
“Hey Kevin… I would like to use Windows Azure as a location where I set up a SQL Server database mirror.  Is this something I can do?” Absolutely, yes!  In fact, it doesn’t even require anything fancy as far as setting up special connectors or site-to-site VPN in order to tr...
Record number of speakers and case study presentations from leading global companiesSINGAPORE, 13 MAY 2013 - BroadcastAsia2013 International Conference, Asia's most established conference for the film and TV industries, returns this June with 120 speakers from 31 countries/regions, its...
Hamburg, 13 May 2013 - From now on, the German IT security specialist gateprotect and the Spanish White Oak Software S.A. (WOSSA) are cooperating in providing customers on the Iberian Peninsula with innovative security solutions such as next generation firewalls. With this partnership,...
I catch up with F5 Certification Manager Ken Salchow to talk about how the Certification Program has grown over the last year since the announcement at Interop 2012. Ken discusses the new exams, his certification philosophy and how this all fits within the tech industry. F5′s New Techn...
By Ryan KamauffHere are the top cyber news and stories of the day. GSA pilot program revolutionizes the personal office – The GSA is using hoteling to allow employees to reserve office space when they need it. Users can reserve conference rooms, cubicles or group work spaces. GSA...
Hamburg, 7 May 2013 - The German IT security specialist gateprotect is from now on cooperating with one of the largest value added distributors in the Netherlands. Effective as of 1 May 2013, a comprehensive distribution agreement has been concluded with Valadis Netherlands BV. Thus, g...
New functionality gives producers control over application update experience, enables valuable analytics by collecting anonymised system and application data, and simplifies update for enterprise customersMaidenhead, UK - May 2, 2013 - Flexera Software, the leading provider of Applicat...
We specialize in implementing “Splunk for Security.” This could mean getting your firewalls and IDS devices talking to Splunk and making the logs have some meaning or taking in your vulnerability management data and breaking out alerts that tell you … Continue reading →The ...
I have been spending time this week at a small media company called Mercury Labs. Despite their name, they don’t normally test anything, but ironically that is what I have been doing there. I was testing a bunch of integrated … Continue reading →