Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from PC Security Journal
We specialize in helping implement Splunk for Security. This could mean getting your firewalls and IDS devices talking to Splunk and making the logs have some meaning or taking in your vulnerability management data and breaking out alerts that tell … Continue reading →The p...
Hamburg, 30 April 2013 - The German IT security specialist gateprotect continues pursuing its strategy of internationalization in a consequent manner and has agreed on a comprehensive partnership with the Value Added Distributor CompuDirecto S.A. DE C.V. The agreement, which has been e...
Infosecurity Europe, London, UK - 24th April 2013: (ISC)²® ("ISC-squared"), the world's largest not-for-profit information security professional body and administrators of the CISSP®; and the Cloud Security Alliance (CSA), a not-for-profit organisation with a mission...
Empower your mobile workforce and prevent data leakage with TeamDrive Secure Office. Register to be notified when a free 30-day trial becomes available at http://www.teamdrive.com/ Hamburg, Germany - 23 April 2013 - Enterprise cloud provider TeamDrive Systems, a 2012 IT Security Award ...
Active hybrid protection closes holes and makes surfing, online banking and online shopping safeLondon, April 23rd, 2013 Today G Data launches its new security solutions for home users. With the 2014 security generation, G Data once again sets the standard when it comes to security. G...
This post is authored by ExtraHop CEO Jesse Rothstein. When we talk to IT teams who are considering ExtraHop, there’s often a discussion about scalability. People are skeptical, and rightfully so. Many monitoring vendors sell the dream of real-time, off-the-wire transaction analysis. I...
Computacenter speaks at RSA's First Data Security Summit on 22nd AprilUK, London 19 April 2013: Computacenter, Europe's leading independent IT supplier, urges organisations to embrace the 'new normal' as a result of a shifting cyber landscape. Threats such as Distributed Denial of Serv...
By Bob GourleyHere are the top cyber news and stories of the day. hōrd iPhone app aims to revolutionize contract visibility – “ hōrd gives users access to real-time contract activity, including the ability to follow new listings by agency, specific contracting officers and ...
Showcasing Web Content Filtering and Security Solutions to keep Networks Safe and Employees ProductiveBloxx, the innovator in Web and email security, will be returning to exhibit at this year's Infosecurity Europe event (Earl's Court, London, Tuesday 23rd to Thursday 25th April 2013), ...
I’ve been watching the incredible team of mission-focused technologists as form Cumulogic since my friend Bill Vass alerted me to their virtuous computing approaches in early 2011.  Since then they have provided many updates on their website of their approach, partners, intent an...
Here are the top cyber news and stories of the day. Report: US Smart Grid Cybersecurity Spending to Reach $7.25B by 2020 – a recent study by research firm Zpryme forecasts annual spending to reach $7.25B in 2020. The focus of this money will be on ICS and SCADA solutions. Via Gre...
Leading IT service and support company Doherty Associates (www.doherty.co.uk) has appointed Richard Ruddlesden as Sales Director. He joins from core Microsoft infrastructure company Teksys. Prior to this, Ruddlesden has held a number of senior sales management positions with Veritas, S...
Editor’s note: Timothy W. Coleman is a prolific writer and analyst who publishes frequently on topics of interest to operational technologists as well as strategic technology thinkers. Olivia Wilson is an award winning literary theorist. We will be bringing you more of their writ...
DNS, like any public service, is vulnerable. Not in the sense that it has vulnerabilities but vulnerable in the sense that it must, by its nature and purpose, be publicly available. It can't hide behind access control lists or other traditional security mechanisms because the whole poi...
#infosec #dns #ddos Smurfs aren't just for ICMP anymore...     DNS, like any public service, is vulnerable. Not in the sense that it has vulnerabilities but vulnerable in the sense that it must, by its nature and purpose, be publicly available. It can't hide behind...
Static analysis is a Development Testing activity that can drive a software development team's productivity and minimize fiscal, legal, and ethical risks associated with potentially faulty code. The reason many organizations fail to fully realize the benefits of static analysis, howeve...
The FairSearch coalition, whose members include Microsoft, Nokia and Oracle, has filed a complaint with the European Commission against Google and Android, saying that the company is using the OS as a Trojan horse to deceive partners and monopolize the mobile marketplace. Android has b...
Together the two partners team-up on securityMunich, April 9, 2013 - At Infosecurity Europe 2013, the German security specialist itWatch and Microsoft will present the secure Windows 8 tablet. itWatch has partnered with Microsoft, to deliver enhanced security with fine grained, central...
Jason Macy, CTO   Forum Systems, IncIntroduction
A few weeks ago I blogged about different Mobile Middleware usage models for enterprise.  Continuing that thread, this post will drill down into API security considerations for enterprise mobile apps. Mobile applications are typically intended for use outside of the … Read m...
Application Vulnerabilities Still the Number One Security Concern of Infosec Pros, According to (ISC)² StudyLondon, UK - 4th April 2013 - To address the growing number of threats arising from widening security gaps in the software supply chain, (ISC)2® ("ISC-squared"), th...
Security on demand with Interoute's pan European Network and Virtual Data Centres built inLondon, 4 April, 2013 Endian, a leading provider of network security solutions, has announced the launch of its Unified Threat Management (UTM) security solution on the Interoute CloudStore. With ...
MTI is the latest new partnership in Signify's drive to expand its channel3 April 2013: Independent provider of fully hosted two-factor authentication (2FA), Signify, has announced that it is partnering with MTI, a leading provider of data centre storage, virtualisation and IT security...
Four in 10 (40%) CIOs have increased their company's security budget compared to three years agoOn average, CIOs spend almost a quarter (23%) of their time managing IT securityLondon, 02 April, 2013 - More than three quarters (78%) of CIOs find managing IT security a challenge for thei...
Usually most people go straight for connecting vCAC to vCenter, but I have decided to connect to Amazon EC2 first. I’m doing this for a few reasons, but mainly because anyone reading this has access to EC2. All you really need is any computer with a Desktop Virtualization tool li...
RSA Conference Interviews! Watch interviews from the RSA Conference featuring thought leaders from the Cloud Security Alliance, NIST, the CISO Executive Network, the International Association for Privacy Professionals and more on Smart E...
By Bob Gourley I’m on the board of Centripetal Networks, a firm with dramatically virtuous technology that I believe will change the world. With this post I’ll tell you more about this firm, with a focus on the differentiators of their capability. The core capability of Cen...
“I have three mailboxes in my office : IN, OUT, and TOO HARD. I was joking with the MIT students that I should have a TOO HARD bin” – Warren Buffett Even for a great investor like Warren Buffett, most … Read more >The post Remember Your Helmet appe...
It sure seems like 0-Days are now an every day occurrence. Headlines containing, ‘breach,’ ‘attack,’ ‘hack,’ ‘vulnerability,’ ‘passwords,’ ‘compromised,’ and ‘you’ are commonplace in the media these days. Typically a 0-day is described as a threat or an attack on a (previously) unkn...
Over the past several weeks I’ve been working on some content I’m excited to finally share with you through a series of blog posts. This series will introduce you to Windows 8 development from an Android developer’s perspective. Through the course of the series you...
Hamburg, 18 March 2013 - In its latest product review, the renowned American SC Magazine has rated the GPZ 5000 appliance from gateprotect with five of five possible stars. The gateprotect firewall achieved the top rating in the categories scope of functions, usability, performance, do...
Hamburg, 12 March 2013 - The German IT security specialist gateprotect is drawing a positive balance of the CeBIT. At the gateprotect booth in hall 12, business transactions were successfully concluded and pleasant conversations were held. Likewise, opinion leaders from politics, the m...
New product delivers blazing time to safety­ up to 80 TB/hour and adds encryption of data at rest without performance penaltySepaton, the maker of the world's fastest backup and recovery solution, has announced the immediate availability of the S2100-ES3 series 2925 purpose-bui...
Denver, CO, March 11, 2013 --(PR.com)-- CipherPoint™ a leading provider of transparent content security for SharePoint, cloud collaboration, and other web-based applications, announced that it was named “most likely to succeed” by a panel of VC’s and investors ...
By Ryan Kamauff Here are the top cyber news and stories of the day. EPA completes cloud email migration – The Environmental Protection Agency and Lockheed Martin have completed the migration to Microsoft Office 365. This four-year contract migrated over 22,000 EPA employees to th...
A compelling user experience is essential in today’s crowded mobile app marketplace, where choices are plentiful and switching costs are practically non-existent. That's why it’s so critical to develop and test your app vs. a simulated test environment that accurately represents the co...
Tyco Integrated Fire and Security, a Tyco company which designs, installs and services fire and electronic security systems for commercial, industrial, residential and government customers, has drawn on its experience and reach in the market to identify the key security trends that wil...
A few months back, Gartner placed big data at the peak of its hype cycle for cloud computing, meaning most big data products are solutions looking for a problem. I always find this bad entrepreneurial habit to be one of the most frustrating of our industry. Having recently joined Meltw...
Ultra-strength, modular and flexible: CWCS ArcusWall can be customised to individual needs6 March 2013 - CWCS Managed Hosting has launched a new, ultra-strength cloud firewall called CWCS ArcusWall, bringing corporate-level protection with an entry-level price tag. The solution has bee...