Security Scanning a SharePoint Framework Solution
The SharePoint Framework has been around for a while now and is being adopted by many of you, whether using on-premises SharePoint 2016 or SharePoint […]
The SharePoint Framework has been around for a while now and is being adopted by many of you, whether using on-premises SharePoint 2016 or SharePoint […]
Over the past few years, a topic that comes up more and more is whether these customization and development approaches within SharePoint are safe. I, […]
In the last couple of posts, we looked at executing two simulated attacks using the “Attack Simulator” tool within Office 365. First, we used “Spear […]
In the last post, we looked at executing your first simulated attack by using the “Spear Fishing” attach that harvests credentials from a custom Office […]
As some of you may know by now, July 1st is the official MVP renewal day for ALL MVPs. I remember all those years ago when […]
So, for July, I decided to go with some Dance inspired by being in Germany this past week. This playlist is a mix of German-inspired […]
The typical consultant answer is correct “It Depends.” I am also expecting that there are multiple views on this and there are many I am […]
As you know, I enjoy working with SharePoint, Office 365 and of course the Security for that. I have spent a lot of my working […]
As you know, starting in June of this month I left my job at Protiviti and started working for myself, creating a company called SharePlicity. […]
On Wednesday, 27th of June 2018, Rencore will host a Full-day Tutorial on Building modern solutions for SharePoint and Office 365. This will be run by […]
At age 21, I started working as a contract Trainer traveling around the UK, teaching people courses such as “How to use the Internet“, “Office […]
So, for June, I decided to go with some Techno this time. Slower than the last playlists I have posted, but good deep techno sounds…love […]
I am sure you all know by now about the new Attack Simulation tool, that is now available in Office 365. Attack Simulator was released […]
So, for May, I decided to go with some unusual but fantastic Japanese Hardcore Dance. Don’t knock it till you have tried it. Loveless – […]
In the webinar I gave last week based on “How attackers break in“, there were several questions at the end that focused on password management […]
Earlier this year, I had to chance to be a part of a Cyber Research Project in conjunction with Christian Buckley (http://www.buckleyplanet.com) from CollabTalk (https://collabtalk.com) […]
So, for April, I decided to go back to “old skool” and went with some classic 90’s Rave and Jungle What was/is Rave: https://en.wikipedia.org/wiki/Rave What […]
Microsoft’s Office 365 and Azure platforms are among the fastest growing cloud environments on the market, and yet even with record-setting growth, cyber-security remains the […]
Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once […]
It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We […]
While testing PowerShell commands with Windows Defender Advanced Threat Protection (WDATP) and preparing for some webinars I am doing in April and May, I spent […]
While testing Windows Defender Advanced Threat Protection (WDATP), I ran various PowerShell scripts to invoke certain downloads or specific tasks. As I was doing it, […]
So, I recently spent some time playing with the Windows Defender Security Center, for looking at security incidents which I generate on a Windows 10 […]
I am sure like most of you that you have found that pair of headphones, that you love, the ones you wore until they literally […]
So, this is my second playlist, this time it is focused on Drum and Bass. These are the types of songs I listen to while […]