Remove tag microsoft
article thumbnail

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

With several sessions on the topic slated for this year’s InfoCon (likely due to the ongoing adoption of Microsoft SharePoint and Office 365, where this approach is prevalent), we thought it would be easier for our attendees to filter just the sessions related to “in-place records management.”

ROT 65
article thumbnail

Subresource Integrity and Upgrade-Insecure-Requests are Now Supported in Microsoft Edge

Troy Hunt

But like same-site cookies, it only works in browsers that support it which, until today, meant no support in Microsoft Edge. Edge now joins the other major browsers in rejecting any script which doesn't hash down to the value specified in the integrity tag.

IT 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

" I built it in part to help people answer that question and in part because my inner geek wanted to build an interesting project on Microsoft's Azure. This is a little project I started whilst killing time in a hotel room in late 2013 after thinking "I wonder if people actually know where their data has been exposed?"

article thumbnail

This is the old ChiefTech blog.: The Art of Web 2.0 PowerPoint

ChiefTech

It was actually a bit of a joke in the workshop that I told people I was envious of all the fancy looking Web 2.0 This was the best I could do using a curvy font in PowerPoint and photos from Microsofts clipart collection *. Actually, by using Microsoft s clipart there is a bit of a hidden message there about form vs function.

Paper 40
article thumbnail

This is the old ChiefTech blog.: Out on the SharePoint Frontier

ChiefTech

Technorati tags: CMS Watch , Microsoft SharePoint 2007 , MOSS 2007 , Gartner , Intranets at 5:42 PM View blog reactions 3comments: Alex Manchester said. Hi James, I was having a very similar conversation the other day with James Robertson at Step Two (following an intranet workshop session run by James).

CMS 40
article thumbnail

Locking Down Your Website Scripts with CSP, Hashes, Nonces and Report URI

Troy Hunt

I run a workshop titled Hack Yourself First in which people usually responsible for building web apps get to try their hand at breaking them. That's pretty much XSS 101 - just get an alert box to fire - and reflecting a script tag is one of the most fundamental techniques attackers use to run their script on your website. Using Nonces.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Tennisha: if you're advanced, and you have a skill set in a particular area, we would love for you to come give some workshops, just to provide exposure to to the squad, we do a bring a hacker to work days every Sunday, where we get exposure to different areas within cybersecurity. What can you do to help? We need volunteers.