Wednesday, February 19, 2014

WindowSecurity.com - Windows Compliance vs Security

WindowSecurity.com - Windows Compliance vs Security

Hi Security World,




Just Published
-----------------------------------------------------------------
Windows Compliance vs Security (on 19 Feb. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/windows-compliance-vs-security.html
This article discusses how to ensure good security by not only including compliance, but also security controls.



Recent Articles & Tutorials
-----------------------------------------------------------------
The Hardening of the Core (Part 2) - Network Access Control (on 12 Feb. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/hardening-core-part2.html
Computing devices have become ubiquitous; people are using multiple devices and connect to networks for access to resources. The most recent strategy is, loosening the perimeter but hardening the core critical services. This article will focus on Network Access Control and the use of this mature technology to enable secure remote working.

Web Browser Security Revisited (Part 2) (on 5 Feb. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part2.html
In this article we'll look at Microsoft’s browser, Internet Explorer.

RSA SecurID - Voted WindowSecurity.com Readers' Choice Award Winner - Authentication / Smart Cards (on 30 Jan. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Authentication-Smart-Cards-RSA-SecurID-Dec13.html
RSA SecurID was selected the winner in the Authentication / Smart Cards category of the WindowSecurity.com Readers' Choice Awards. SafeNet eToken PASS and AuthLite Two-Factor Logon Security were runner-up and second runner-up respectively.

User and Group Accounts: What is in a Name? (on 29 Jan. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/user-and-group-accounts-what-name.html
This article will help you understand how to decrypt the user and group syntax that shows up in reports and GUIs throughout the enterprise.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments:

Post a Comment