WindowSecurity.com - Monthly Article Update
Hi Security World,
New articles added to WindowSecurity.com last month:
Title: Securing Windows Member Servers
Author: Derek Melber
Summary: Every company has member servers at some capacity or another. Some companies have just a few, where others might have thousands. These member servers are the work horses of your network, providing the core production services for the company. From running the intranet, providing print services, SQL databases, e-mail services, file storage, and application support. With member servers providing all of these essential functions, it goes hand-in-hand with the fact that you need to protect these servers. This article will discuss some of key security configurations that can be made to help protect your member servers.
Link: http://www.WindowSecurity.com/articles/Securing-Windows-Member-Servers.html
Title: Installing and Configuring Microsoft’s Data Protection Manager (DPM) Part 1
Author: Deb Shinder
Summary: The beta of Microsoft's new Data Protection Manager (formerly called Data Protection Server) is now available to the public. DPM brings disk-based backup and recovery to enterprise networks as part of Microsoft’s new System Center product umbrella that also includes Microsoft Operations Manager (MOM) and Systems Management Server (SMS). In this two part article, we show you how to install and configure DPM and evaluate how this newest member of Microsoft's System Center product umbrella can be integrated into your overall security strategy.
Link: http://www.WindowSecurity.com/articles/Installing-Configuring-Microsoft-Data-Protection-Manager-Part1.html
Title: Sys Admin: Friend or Foe?
Author: Don Parker
Summary: The network system administrator is the first line, and sometimes last line of defence that a network has. What happens though if that very same defender becomes more of a liability?
Link: http://www.WindowSecurity.com/articles/Sys-Admin-Friend-Foe.html
Title: Ethical Issues for IT Security Professionals
Author: Deb Shinder
Summary: This article takes a look at a neglected area of most computer security professionals' training: how to deal with the ethical issues that can - and invariably do - crop up during the course of doing your job.
Link: http://www.WindowSecurity.com/articles/Ethical-Issues-IT-Security-Professionals.html
Title: The Student, the Teacher, and Optix Pro (Part 3)
Author: Don Parker
Summary: In this last part of the article series we will show John finding, and retrieving the upcoming math exam, as well as his getting caught. Rounding it out will be a quick incident handling roundup.
Link: http://www.WindowSecurity.com/articles/Student-Teacher-Optix-Pro-Part3.html
Title: How Do Compliance Issues Affect your Network?
Author: Deb Shinder
Summary: Government regulations such as HIPAA, SOX and the GLB Act require changes to many network security infrastructures and IT procedures. As if wading through this alphabet soup of statutes and regulations weren’t enough, it's not enough to be compliant; you must also be able to prove your compliance if the feds come knocking. This article looks at how regulations affecting specific industries impact the computer networks of companies in those industries, as well as some of the common myths and misconceptions about various compliance requirements.
Link: http://www.WindowSecurity.com/articles/How-Do-Compliance-Issues-Affect-your-Network.html
Title: The Student, the Teacher, and Optix Pro (Part 2)
Author: Don Parker
Summary: In this part of the article series we see John begin to configure his trojan server on the professor’s computer, and will ultimately see him connect to it from his class room.
Link: http://www.WindowSecurity.com/articles/Student-Teacher-Optix-Pro-Part2.html
Title: Book Reviews: Still More Security Books
Author: Mitch Tulloch
Summary: Security books keep flooding in from publishers, so it looks like the business of information security continues to occupy a forefront in the minds of both business executives and IT professionals. Here’s my latest pick of what’s good.
Link: http://www.WindowSecurity.com/articles/Book-Reviews-More-Security-Books.html
Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com
Copyright © WindowSecurity.com 2005. All rights reserved.
No comments:
Post a Comment