WindowSecurity.com - Monthly Article Update - March 2015
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
New articles added to WindowSecurity.com last month
-----------------------------------------------------------------
Netikus EventSentry - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring (on 26 March 2015 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-Netikus-EventSentry-Feb15.html
Netikus EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. SolarWinds Log & Event Manager and GFI EventsManager were runner-up and second runner-up respectively.
Assessing the Security of Mobile Applications (Part 1) - Planning (on 25 March 2015 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/assessing-security-mobile-applications-part1.html
In this article series we will consider and cover ways in which the organisation can assess mobile applications to improve security when mobile devices are used for corporate function.
Security: A Shared Responsibility (Part 5) (on 18 March 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-shared-responsibility-part5.html
In this, Part 5, we’ll begin to examine the role and responsibilities of software vendors (including Software-as-a-Service providers).
Ways to Grant Elevated Privileges In Windows (on 11 March 2015 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/ways-grant-elevated-privileges-windows.html
In this article we will discuss how to grant elevated privileges over Active Directory and a server.
Security: A Shared Responsibility (Part 4) (on 4 March 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-shared-responsibility-part4.html
In Part 4, we will continue from Part 3, discussing in more detail exactly what the user’s responsibilities are, and then we’ll move on to the responsibilities of software vendors.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- InsideAWS.com (http://www.insideaws.com/)
- WServerNews.com (http://www.wservernews.com/)
--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=9
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2015. All rights reserved.
No comments:
Post a Comment