Search This Blog

Wednesday, May 29, 2013

WindowSecurity.com - The Android Invasion: BYOD Security Implications and Solutions

WindowSecurity.com - The Android Invasion: BYOD Security Implications and Solutions

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
The Android Invasion: BYOD Security Implications and Solutions (on 29 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/android-invasion-byod-security-implications-solutions.html
This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming.



Recent Articles & Tutorials
-----------------------------------------------------------------
Video: Windows Server 2008 R2 Dcpromo "Operating System Compatibility" Message (on 22 May 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_server_2008_security/video-windows-server-2008-r2-dcpromo-operating-system-compatibility-message.html
This video explains the meaning behind Windows Server 2008 R2 Dcpromo "Operating System Compatibility" message.

Group Policy Changes: Windows Server 2012, Windows 8 and Window RT (Part 3) (on 15 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part3.html
In this, Part 3, we’ll wrap up this article series with all the other “little� changes to Group Policy and how they improve the Windows admin experience.

Why Bring Your Own Device (BYOD) needs your attention (on 8 May 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/why-bring-your-own-device-byod-needs-your-attention.html
We are in the middle of the biggest computer revolution since the PC; the explosive number of devices is descending on corporates. In some cases the personal devices can outnumber the corporate devices. This article will cover strategies that should be considered when securing your company.

Group Policy Changes: Windows Server 2012, Windows 8 and Window RT (Part 2) (on 1 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part2.html
In this Part 2 of our article series, we’ll look at some of the Group Policy additions and changes that pertain to the Internet Explorer web browser.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: