Search This Blog

Friday, March 08, 2013

In Configuration We [Still] Trust

Evaluate what you need, and discard the rest.
CSOonline
Learn More
In Configuration We [Still] Trust
"In Configuration We Trust" offers simple, practical steps to dramatically improve security posture without investing in new technology. This report from the BeyondTrust Research Team offers configuration best practices related to VLANs and IPSec, proxies, disabling WebDAV, as well as insights on why organizations should upgrade their Microsoft software, how to best utilize penetration testing, and more.
Learn More
Forward to a Friend >>
CSOonline
Additional Resources
A Guide for a Successful ERP Strategy in the Midmarket
5 Best Practices to Ensure Application Security
SUBSCRIPTION SERVICES
You are currently subscribed as security.world@gmail.com
If you do not wish to receive future mailings from CSO Online Resources, unsubscribe.
View CSO's online privacy policy.
Copyright 2013 | CSO | 492 Old Connecticut Path | Framingham MA 01701 | www.csoonline.com.
 

No comments: