Search This Blog

Wednesday, June 19, 2013

WindowSecurity.com - Securing Windows Service Accounts (Part 2)

WindowSecurity.com - Securing Windows Service Accounts (Part 2)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Securing Windows Service Accounts (Part 2) (on 19 June 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/securing-windows-service-accounts-part2.html
In this installment, we will continue to go through configuration checks and reasons why these service accounts need to be secured.



Recent Articles & Tutorials
-----------------------------------------------------------------
Security Awareness Training: Your First Line of Defense (Part 1) (on 12 June 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-awareness-training-your-first-line-defense-part1.html
In this article, we'll look at why security awareness training is so important, advantages and disadvantages of developing your own program or contracting with specialists, and what a good security awareness training program should include.

Has the end of Antivirus arrived? (on 5 June 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/has-end-antivirus-arrived.html
With the advance of computing into the world of mobility, has the requirement for antivirus deprecated or is this a case of complacency. Some vendors are claiming that they can get rid of pattern files and others are saying no antivirus altogether. In this article we explore the options and the reality.

DeviceLock - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security (on 30 May 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-DeviceLock-Apr13.html
DeviceLock was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. GFI EndPointSecurity and CopyNotify! Data Security Software were runner-up and second runner-up respectively.

The Android Invasion: BYOD Security Implications and Solutions (on 29 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/android-invasion-byod-security-implications-solutions.html
This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: