WindowSecurity.com - Why Bring Your Own Device (BYOD) needs your attention
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Why Bring Your Own Device (BYOD) needs your attention (on 8 May 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/why-bring-your-own-device-byod-needs-your-attention.html
We are in the middle of the biggest computer revolution since the PC; the explosive number of devices is descending on corporates. In some cases the personal devices can outnumber the corporate devices. This article will cover strategies that should be considered when securing your company.
Recent Articles & Tutorials
-----------------------------------------------------------------
Group Policy Changes: Windows Server 2012, Windows 8 and Window RT (Part 2) (on 1 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part2.html
In this Part 2 of our article series, we’ll look at some of the Group Policy additions and changes that pertain to the Internet Explorer web browser.
Group Policy Changes: Windows Server 2012, Windows 8 and Window RT (Part 1) (on 24 April 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part1.html
In this series of articles, we’ll be taking a look at changes in Group Policy and how you can best use them to your benefit in keeping your Windows network as secure as possible.
Securing and Auditing High Risk Files on Windows Servers (on 17 April 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_server_2008_security/securing-auditing-high-risk-files-windows-servers.html
In this article we will discuss how to properly secure files that are high risk to the organization and track when someone accesses the file successfully and also unsuccessfully.
The Windows Server 2012 Simplified DirectAccess Wizard Overview (Part 1) (on 10 April 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/windows-server-2012-simplified-directaccess-wizard-overview-Part1.html
In this article, we'll discuss some of the changes in the DirectAccess wizard that have been included in Windows Server 2012.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.
No comments:
Post a Comment