Category: Attack Surface

0

Classic versus SharePoint Framework Customization

Over the past few years, a topic that comes up more and more is whether these customization and development approaches within SharePoint are safe. I, myself have built Managed Code and Sandbox solutions, as...

1

Is JavaScript Safe for SharePoint?

The typical consultant answer is correct “It Depends.” I am also expecting that there are multiple views on this and there are many I am sure who might say “Yes” and “No” and even...

1

Is it a problem to customize SharePoint?

As you know, I enjoy working with SharePoint, Office 365 and of course the Security for that. I have spent a lot of my working career always drawn back to customizing the core platforms...

0

Quick Update!!

As you know, starting in June of this month I left my job at Protiviti and started working for myself, creating a company called SharePlicity. So far so good, it has been more relaxing...

0

Munich in June

On Wednesday, 27th of June 2018, Rencore will host a Full-day Tutorial on Building modern solutions for SharePoint and Office 365. This will be run by none other than Erwin van Hunen, Hugh Wood, and...

0

Webinar Series Update: Evading Anti-Virus

In the webinar I gave last week based on “How attackers break in“, there were several questions at the end that focused on password management and then also evading anti-virus. During the webinar, I...

0

Research Report and Webinars

Earlier this year, I had to chance to be a part of a Cyber Research Project in conjunction with Christian Buckley (http://www.buckleyplanet.com) from CollabTalk (https://collabtalk.com) and the Marriott School of Management at Brigham Young...

0

Panel discussion: Cyber-security in SharePoint and Office 365

Microsoft’s Office 365 and Azure platforms are among the fastest growing cloud environments on the market, and yet even with record-setting growth, cyber-security remains the top concern of organizations considering moving all or part...

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...