Access "Securing SharePoint: SharePoint security best practices"
This article is part of the July/August 2012 issue of Establishing an effective internal security pen testing methodology
With a Google search and one minute of running one of his SharePoint hacking tools, it doesn’t take long for security researcher Fran Brown to find exposed SharePoint administrative interfaces for a state health and human services department. The exposure – which could allow an attacker to add users and change information -- is far from unusual. Brown, managing partner at security consulting firm Stach & Liu, finds this sort of stuff all the time. “I’m surprised at just how much SharePoint is out there and how much is vulnerable,” he says. Editor's note Microsoft’s SharePoint application has become a ubiquitous collaboration tool in the enterprise but securing it can be a tricky process. And all too often, companies fail to properly secure their SharePoint deployments, security experts say. In fact, a survey of SharePoint users released earlier this year by European security vendor Cryptzone showed that lax security practices were rampant among those polled. In this special report, we examine some of the issues surrounding SharePoint security and provide ... Access >>>
Premium Content for Free.
How to pen test: Why you need an internal security pen testing program
by Dave Shackleford
Learn pen testing best practices and how to build an internal pen testing team.
Securing SharePoint: SharePoint security best practices
by Marcia Savage, Editor
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
Talk of cyberwarfare threats heats up with Flame malware
by Robert Westervelt, News Director
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
- How to pen test: Why you need an internal security pen testing program by Dave Shackleford
Big data security analytics: Harnessing new tools for better security
by Scott Crawford, Contributor
New techniques are emerging to help organizations analyze security data and improve security defenses.
Three steps for securing SharePoint
by Brien Posey
Restricting user permissions, server hardening and dedicated service accounts are critical.
- Big data security analytics: Harnessing new tools for better security by Scott Crawford, Contributor
Gary McGraw on mobile security: It’s all about mobile software security
by Gary McGraw, Contributor
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
Cyberspace protection requires government collaboration with industry
by Riley Repko, Contributor
Government and private sector collaboration is critical to surviving in cybespace.
LinkedIn password leak: Lessons to be learned from LinkedIn breach
by Marcia Savage
Breach at the professional networking site highlights password practices, storage procedures.
- Gary McGraw on mobile security: It’s all about mobile software security by Gary McGraw, Contributor
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...