WindowSecurity.com - Complacency: the 8th Deadly Sin of IT Security (Part 3)
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Complacency: the 8th Deadly Sin of IT Security (Part 3) (on 2 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part3.html
In Part 3, we’ll discuss some tips for maintaining vigilance without going overboard.
Recent Articles & Tutorials
-----------------------------------------------------------------
Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall (on 26 Sept. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Firewall-Panda-Cloud-Office-Protection-Aug13.html
Panda Cloud Office Protection was selected the winner in the Firewall category of the WindowSecurity.com Readers' Choice Awards. Check Point VPN-1 UTM and Sophos UTM software appliance were runner-up and second runner-up respectively.
Video: Change management for Active Directory - Part 2 (on 25 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-2.html
This video is the second part of two part video series demonstrating change management for Active Directory.
Complacency: the 8th Deadly Sin of IT Security (Part 2) (on 18 Sept. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part2.html
In this article we’ll discuss some types of security breach attempts we commonly dismiss as “too obvious� that might merit taking a second look, particularly those of the social engineering variety that target you rather than your users.
Least Privilege Eases Whitelisting Requirements (on 11 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/least-privilege-eases-whitelisting-requirements.html
The author explains how least privilege can ease whitelisting requirements.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.
No comments:
Post a Comment