Search This Blog

Wednesday, August 28, 2013

WindowSecurity.com - The Journey to ISO 27001 (Part 2)

WindowSecurity.com - The Journey to ISO 27001 (Part 2)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
The Journey to ISO 27001 (Part 2) (on 28 Aug. 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/journey-iso-27001-part2.html
This article continues with the introduction to ISO 27001.



Recent Articles & Tutorials
-----------------------------------------------------------------
Big Data: The Security Perspective (Part 2) (on 21 Aug. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/big-data-security-perspective-part2.html
In this, Part 2, we will turn to a discussion of expert opinion regarding whether and how big data analytics can be used to detect and predict attacks, thus making it a tool for enhancing the overall security of your network.

Video: Change management for Active Directory - Part 1 (on 14 Aug. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-1.html
This video is the first part of two videos demonstrating change management for Active Directory.

Big Data: The Security Perspective (Part 1) (on 7 Aug. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/big-data-security-perspective-part1.html
One of the hottest buzzwords of the past year was “big data,� but what does it really mean? And what does it mean in terms of security? In this article, we’ll talk about the big data trend from a security perspective.

Pass-The-Hash: Protect Your Windows Computers! (Part 1) (on 31 July 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/viruses_trojans_malware/pass-hash-protect-your-windows-computers-part1.html
This article takes a look at the hottest exploit on Windows, Pass-The-Hash (PTH).





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: