security

Confidential Information Needs to be Locked by , for

Social Business

Discussion

The recent Wikileaks event exposing thousands of White House state department confidential documents has highlighted not only the human side of diplomacy but the urgent need to lock individual f... read more

Action required: Serious ASP.NET security weakness impacts SharePoint also by , for

Blog Entry

Microsoft reported a security vulnerability last week in ASP.NET, which is the platform that SharePoint runs on. If you have SharePoint 2007, WSS 3.0, or SharePoint 2010 server running on the In... read more

Open By Design, Closed By Exception - Best Practices in Information Security by , for

Blog Entry

It's a debate that is as old as the information management industry itself (which isn't really that old, but bear with me).  Users want to collaborate freely and access the internal... read more

Governance by , for

SharePoint

Wiki Page

A governance program is designed to control and direct how information is created and managed in the enterprise. The program will include policies, goals, authorities, decisions, and a program defi... read more

Architecture by , for

SharePoint

Wiki Page

SharePoint implementation involves a variety of complex tasks – from architecture design, infrastructure layout, planning, strategy, UI design, migration, and upgrades, to development. Among all th... read more

What Do You Do with Audit and Event Logs? by , for

Blog Entry

**Views expressed in this blog are my personal views and not those of my employer. Any reference to any living person or organisation, past or present, is entirely co-incidental** As any blo... read more

Social software and bad information security practices by , for

Blog Entry

During the last couple of years I have carried out ECM and Collaboration assessments for companies where I have observed a resistance towards social software - which to a large extent can be see... read more