Friday, June 01, 2012

WindowSecurity.com - Monthly Article Update

WindowSecurity.com - Monthly Article Update

Hi Security World,

New articles added to WindowSecurity.com last month:



Title: With the convergence of mobile devices, mobile security is a clear focus
Author: Ricky M. Magalhaes
Link: http://www.WindowSecurity.com/articles/With-convergence-mobile-devices-mobile-security-clear-focus.html
Summary: This article will look at emerging technologies in mobile security, the security risks surrounding mobile platforms and steps to secure your mobile devices and their contents.

Title: Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security
Author: The Editor
Link: http://www.WindowSecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-Panda-Cloud-Office-Protection-Apr12.html
Summary: Panda Cloud Office Protection was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. AccessPatrol and Netwrix USB Blocker were runner-up and second runner-up respectively.

Title: Bring Your Own Device To Work: Security Nightmare?
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Bring-Own-Device-Work-Security-Nightmare.html
Summary: In this article the author discusses the pros and cons of allowing users the ability to use their own device for work activities.

Title: First Look at Dynamic Access Control in Windows Server 2012
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/First-Look-Dynamic-Access-Control-Windows-Server-2012.html
Summary: The author takes a look at Dynamic Access Control in Windows Server 2012.

Title: To Whitelist or To Not Whitelist
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/To-Whitelist-or-To-Not-Whitelist.html
Summary: In this article the author investigates whitelisting methods as a way to control which applications users can use, as opposed to privilege management solutions which can dramatically reduce the attack surface within an organization.

Title: Security Considerations for Cloud Computing (Part 4) - Resource Pooling
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Security-Considerations-Cloud-Computing-Part4.html
Summary: In this article, we will continue with the theme and pick up on the third essential characteristic of cloud computing: pooled resources.





Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright © WindowSecurity.com 2012. All rights reserved.

No comments:

Post a Comment