Search This Blog

Thursday, September 26, 2013

WindowSecurity.com - Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall

WindowSecurity.com - Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall

Hi Security World,





Just Published
-----------------------------------------------------------------
Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall (on 26 Sept. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Firewall-Panda-Cloud-Office-Protection-Aug13.html
Panda Cloud Office Protection was selected the winner in the Firewall category of the WindowSecurity.com Readers' Choice Awards. Check Point VPN-1 UTM and Sophos UTM software appliance were runner-up and second runner-up respectively.



Recent Articles & Tutorials
-----------------------------------------------------------------
Video: Change management for Active Directory - Part 2 (on 25 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-2.html
This video is the second part of two part video series demonstrating change management for Active Directory.

Complacency: the 8th Deadly Sin of IT Security (Part 2) (on 18 Sept. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part2.html
In this article we’ll discuss some types of security breach attempts we commonly dismiss as “too obvious� that might merit taking a second look, particularly those of the social engineering variety that target you rather than your users.

Least Privilege Eases Whitelisting Requirements (on 11 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/least-privilege-eases-whitelisting-requirements.html
The author explains how least privilege can ease whitelisting requirements.

Complacency: the 8th Deadly Sin of IT Security (Part 1) (on 4 Sept. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part1.html
In this article, I'm going to talk about how complacency manifests itself in IT security, discuss some examples of threats that IT pros overlook or downplay, and offer some advice on how to walk the fine line between complacency and paranoia.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: