A Good Reputation

I'm a technical writer at Microsoft who writes about SharePoint, Exchange, and Lync, and how you can use them with Office 365.

Browse by Tags

Tagged Content List
  • Blog Post: Windows File Classification Infrastructure

    This morning I've been doing some reading about Windows FCI . I've mentioned it on this blog before. In short, FCI helps you determine the business value of files on your network (typically, you'd be looking for sensitive data that you want to protect or delete). One of my colleagues has written the...
  • Blog Post: Gen Y Hackers

    I thought this BBC piece was interesting about young Russian students who hack protected systems for fun. At just 20 years old, Andrei works for an information security firm. He says he does nothing illegal now, but he used to. "I started when I was 14. I hacked a series of military resources,...
  • Blog Post: Article o' the Month - 150,000 people notified after National Archives and Records Administration hard-drive loss

    I think this article shows the importance of having a good strategy for data-loss prevention: The National Archives and Records Administration last month warned 150,000 more people who interacted with the Clinton administration that their personal information may be at risk after a hard drive was...
  • Blog Post: A High-Level Discussion of AD RMS

    Enrique Saggese, a Microsoft Senior Consultant, recently gave a lecture where he explained, from a high level, how AD RMS functions and how it protects content. We have edited that lecture into a series of videos that we are in the process of releasing on TechNet Edge . So far, we've released the...
  • Blog Post: Why is Information Security So Difficult?

    "...because sensitive information is always moving and transforming." The quotation is from a webcast (a little over twenty minutes long) recently posted on the RSA Website. Several months back, I wrote about a partnership between Microsoft and RSA to provide a data-loss-prevention solution. In...
  • Blog Post: How Do I Share Protected Documents with People Outside my Organization?

    GigaTrust 's (a Microsoft partner) Enterprise Trust solution has a nice feature for doing that: Automated, persistent content protection is a necessary element of complete enterprise security architecture that seamlessly complements existing perimeter security solutions with content protection. GigaTrust...
  • Blog Post: Information Protection Article o' the Week - Microsoft Study Finds Consumers Want Control Over Data

    I ran across this article on the InformationWeek website. Microsoft did a survey to see how people feel about privacy on the Web. Of course they found that most people have an uneasy feeling about sharing information on the Internet. The top areas of concern for consumers in the Microsoft focus groups...
Page 1 of 1 (7 items)