Search This Blog

Wednesday, April 01, 2015

WindowSecurity.com - Security: A Shared Responsibility (Part 6)

WindowSecurity.com - Security: A Shared Responsibility (Part 6)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Security: A Shared Responsibility (Part 6) (on 1 April 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-shared-responsibility-part6.html
In this article we'll look at the role of ISPs and cloud services companies to round out the series.



Recent Articles & Tutorials
-----------------------------------------------------------------
Netikus EventSentry - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring (on 26 March 2015 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-Netikus-EventSentry-Feb15.html
Netikus EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. SolarWinds Log & Event Manager and GFI EventsManager were runner-up and second runner-up respectively.

Assessing the Security of Mobile Applications (Part 1) - Planning (on 25 March 2015 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/assessing-security-mobile-applications-part1.html
In this article series we will consider and cover ways in which the organisation can assess mobile applications to improve security when mobile devices are used for corporate function.

Security: A Shared Responsibility (Part 5) (on 18 March 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-shared-responsibility-part5.html
In this, Part 5, we’ll begin to examine the role and responsibilities of software vendors (including Software-as-a-Service providers).

Ways to Grant Elevated Privileges In Windows (on 11 March 2015 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/ways-grant-elevated-privileges-windows.html
In this article we will discuss how to grant elevated privileges over Active Directory and a server.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- InsideAWS.com (http://www.insideaws.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1

WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2015. All rights reserved.

No comments: