Search

1 to 4 of 4
Sort by

Blog Entry
Security & Identity Management Considerations for Application Development in SharePoint 2013 & Office 365

Security & Identity Management "From the Consulting Trenches" There are a number of security, identity management and authentication considerations when developing custom applications and related features in SharePoint 2013, Office 365, SharePoint Online and Microsoft Azure

Errin O'Connor's profile image

Blog Entry
Social – Mobile – Scared

You can find more detailed highlights of the event on the Chapter website but I want to focus on a few things that cross the line between security and information management and I’d be remiss in one of my duties if I didn’t hype the Chapter network again

Daniel Antion's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

When and if a breach occurs, this team will spring into action to assess the gravity of the breach, gather the financial and logistical resources necessary to respond, and act as a central point of communication and coordination between executive management and boots-on-the-ground responders

Megan Mohrmann's profile image

Blog Entry
Information Security Checklist: Best Practices for SharePoint

There is even frustration being felt when every part of access management seems perfect, but a breach still occurs. Traditional thinking and SharePoint itself focuses very much on the role of identity and access management solutions in securing your SharePoint environment

Matthew Bretzius's profile image