Wednesday, October 29, 2014

WindowSecurity.com - Planning Considerations for BYOD and Consumerization of IT (Part 6)

WindowSecurity.com - Planning Considerations for BYOD and Consumerization of IT (Part 6)

Hi Security World,



Just Published
-----------------------------------------------------------------
Planning Considerations for BYOD and Consumerization of IT (Part 6) (on 29 Oct. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part6.html
In this, Part 6, we’re going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to demonstrate compliance.



Recent Articles & Tutorials
-----------------------------------------------------------------
Planning Considerations for BYOD and Consumerization of IT (Part 5) (on 22 Oct. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part5.html
In this, Part 5, we’ll move on to the discussion of BYOD compliance with government and industry security and privacy standards.

Third-Party Software is a Security Threat (Part 2) (on 15 Oct. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/third-party-software-security-threat-part2.html
In this article we will look at the arguments of why it’s important to be aware of more of the threats of using third-party software.

Shellshock the bashbug vulnerability (on 8 Oct. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/shellshock-bashbug-vulnerability.html
In this article we will look at what the shellshock bashbug is all about. We also cover mitigation strategies to help you thwart against such a vulnerability, so that when the next one occurs you are ready.

Back to Basics: Groups vs. Organizational Units in Active Directory (on 1 Oct. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/back-basics-groups-vs-organizational-units-active-directory.html
This article takes a look at the differences between an Active Directory group and organizationl unit.



WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments:

Post a Comment