Search This Blog

Thursday, January 30, 2014

WindowSecurity.com - RSA SecurID - Voted WindowSecurity.com Readers' Choice Award Winner - Authentication / Smart Cards

WindowSecurity.com - RSA SecurID - Voted WindowSecurity.com Readers' Choice Award Winner - Authentication / Smart Cards

Hi Security World,





Just Published
-----------------------------------------------------------------
RSA SecurID - Voted WindowSecurity.com Readers' Choice Award Winner - Authentication / Smart Cards (on 30 Jan. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Authentication-Smart-Cards-RSA-SecurID-Dec13.html
RSA SecurID was selected the winner in the Authentication / Smart Cards category of the WindowSecurity.com Readers' Choice Awards. SafeNet eToken PASS and AuthLite Two-Factor Logon Security were runner-up and second runner-up respectively.



Recent Articles & Tutorials
-----------------------------------------------------------------
User and Group Accounts: What is in a Name? (on 29 Jan. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/user-and-group-accounts-what-name.html
This article will help you understand how to decrypt the user and group syntax that shows up in reports and GUIs throughout the enterprise.

Web Browser Security Revisited (Part 1) (on 22 Jan. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part1.html
In this article, we'll take a look at the state of web browser security now, how it's changed over the years, some security-related factors to consider when selecting a browser, and how to configure whichever browser you choose for your own browsing and for your users, to make it as secure as possible.

Developing an Information Security and Risk Management Strategy (Part 1) (on 15 Jan. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/intrusion_detection/developing-information-security-and-risk-management-strategy-part1.html
In this two part article we will look at planning a security strategy suitable for the long-term, focussing on the future of security and risk management practices.

The Evolution of Microsoft’s Rights Management Services (Part 2) (on 8 Jan. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/evolution-microsofts-rights-management-services-part2.html
In this article we’ll talk about the next generation of RMS, Azure RMS, which has been revamped in a big way and was released in public preview form this summer.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: