WindowSecurity.com - Monthly Article Update
Hi Security World,
New articles added to WindowSecurity.com last month:
Title: With the convergence of mobile devices, mobile security is a clear focus
Author: Ricky M. Magalhaes
Link: http://www.WindowSecurity.com/articles/With-convergence-mobile-devices-mobile-security-clear-focus.html
Summary: This article will look at emerging technologies in mobile security, the security risks surrounding mobile platforms and steps to secure your mobile devices and their contents.
Title: Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security
Author: The Editor
Link: http://www.WindowSecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-Panda-Cloud-Office-Protection-Apr12.html
Summary: Panda Cloud Office Protection was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. AccessPatrol and Netwrix USB Blocker were runner-up and second runner-up respectively.
Title: Bring Your Own Device To Work: Security Nightmare?
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Bring-Own-Device-Work-Security-Nightmare.html
Summary: In this article the author discusses the pros and cons of allowing users the ability to use their own device for work activities.
Title: First Look at Dynamic Access Control in Windows Server 2012
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/First-Look-Dynamic-Access-Control-Windows-Server-2012.html
Summary: The author takes a look at Dynamic Access Control in Windows Server 2012.
Title: To Whitelist or To Not Whitelist
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/To-Whitelist-or-To-Not-Whitelist.html
Summary: In this article the author investigates whitelisting methods as a way to control which applications users can use, as opposed to privilege management solutions which can dramatically reduce the attack surface within an organization.
Title: Security Considerations for Cloud Computing (Part 4) - Resource Pooling
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Security-Considerations-Cloud-Computing-Part4.html
Summary: In this article, we will continue with the theme and pick up on the third essential characteristic of cloud computing: pooled resources.
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com
Copyright © WindowSecurity.com 2012. All rights reserved.
No comments:
Post a Comment