Tuesday, July 01, 2014

WindowSecurity.com - Monthly Article Update - June 2014

WindowSecurity.com - Monthly Article Update - June 2014

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


New articles added to WindowSecurity.com last month
-----------------------------------------------------------------
Kaspersky Security for Mail Server - Voted WindowSecurity.com Readers' Choice Award Winner - Email Anti Virus (on 26 June 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Email-Anti-Virus-Kaspersky-Security-for-Mail-Server-May14.html
Kaspersky Security for Mail Server was selected the winner in the Email Anti Virus category of the WindowSecurity.com Readers' Choice Awards. Trend Micro InterScan Messaging Security Suite and MailScan were runner-up and second runner-up respectively.

Termination of Windows XP support â€" How does this affect your security? (on 25 June 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/termination-windows-xp-support-how-does-affect-your-security.html
This article reflects how the termination of Windows XP support is likely to affect companies or individuals still using the operating system in the interim and any considerations that should be made short term to secure your systems while planning a move to a current and supported version.

Managing AppLocker in Windows Server 2012 and Windows 8/8.1 (Part 1) (on 18 June 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/managing-applocker-windows-server-2012-and-windows-8-81-part1.html
In this, part 1 of a multi-part series, we'll introduce you to AppLocker in Windows Server 2012/2012 R2 and Windows 8/8.1

Improving security through least-privilege practices (on 11 June 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/improving-security-through-least-privilege-practices.html
In this article we will consider the successful implementation and management of the least-privilege principle and contemplate the challenges and benefits faced by organisations when addressing security through least-privilege.

Securing Your Lync Server (Part 3) (on 4 June 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-your-lync-server-part3.html
This article looks at some security tips specific to using Lync across the Internet and with users outside the organization.






WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=9
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments:

Post a Comment