Search This Blog

Wednesday, March 12, 2014

WindowSecurity.com - Web Browser Security Revisited (Part 4)

WindowSecurity.com - Web Browser Security Revisited (Part 4)

Hi Security World,





Just Published
-----------------------------------------------------------------
Web Browser Security Revisited (Part 4) (on 12 March 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part4.html
In this article we'll discuss how to adjust Google Chrome’s security and privacy settings for best security practices.



Recent Articles & Tutorials
-----------------------------------------------------------------
Developing an Information Security and Risk Management Strategy (Part 2) (on 5 March 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/intrusion_detection/developing-information-security-and-risk-management-strategy-part2.html
In this article we will focus on elements that will help develop a comprehensive security strategy for your organisation.

Acunetix Web Vulnerability Scanner - Voted WindowSecurity.com Readers' Choice Award Winner - Web Application Security (on 27 Feb. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Web-Application-Security-Acunetix-Web-Vulnerability-Scanner-Jan14.html
Acunetix Web Vulnerability Scanner was selected the winner in the Web Application Security category of the WindowSecurity.com Readers' Choice Awards. Imperva SecureSphere WAF and N-Stalker Web Application Security Scanner were runner-up and second runner-up respectively.

Web Browser Security Revisited (Part 3) (on 26 Feb. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part3.html
In Part 1 of this series, we discussed the importance of web browser security and some security-related issues that are common to all or many of the popular browsers today. In Part 2, we talked about some specific security mechanisms that are built into Internet Explorer and how they’re implemented. This time, we’ll look at how to configure IE for best security.

Windows Compliance vs Security (on 19 Feb. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/windows-compliance-vs-security.html
This article discusses how to ensure good security by not only including compliance, but also security controls.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: