Search This Blog

Wednesday, December 10, 2014

WindowSecurity.com - Secure Sharing: Collaboration without Compromise (Part 3)

WindowSecurity.com - Secure Sharing: Collaboration without Compromise (Part 3)

Hi Security World,


Just Published
-----------------------------------------------------------------
Secure Sharing: Collaboration without Compromise (Part 3) (on 10 Dec. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/secure-sharing-collaboration-without-compromise-part3.html
In this Part 3, we’ll talk about how those with whom you share data can deliberately or inadvertently compromise the information after it leaves your hands, and some solutions for helping to prevent that.



Recent Articles & Tutorials
-----------------------------------------------------------------
Windows 10 - Privacy and Security Features at a Glance (Part 1) (on 3 Dec. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/windows_10_security/windows-10-privacy-and-security-features-glance-part1.html
This first article of our two part article series will look at the expected security features of Windows 10

Cisco ASA 5500-X Series - Voted WindowSecurity.com Readers' Choice Award Winner - VPN Solution (on 27 Nov. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-VPN-Solution-Cisco-ASA-5500-X-Series-Oct14.html
Cisco ASA 5500-X Series was selected the winner in the VPN Solution category of the WindowSecurity.com Readers' Choice Awards. Checkpoint VPN-1 Power and Barracuda SSL VPN were runner-up and second runner-up respectively.

Secure Sharing: Collaboration without Compromise (Part 2) (on 26 Nov. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/secure-sharing-collaboration-without-compromise-part2.html
In this, Part 2 of our series on secure sharing, we'll discuss data classification and some do’s and don’ts for sharing ultra-sensitive data with collaborators both inside and outside the company.

De-provisioning Users in Active Directory (on 19 Nov. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/de-provisioning-users-active-directory.html
This article takes a look at ways to de-provision separated employees in Active Directory.



WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: