Windows File Classification Infrastructure

This morning I’ve been doing some reading about Windows FCI. I’ve mentioned it on this blog before. In short, FCI helps you determine the business value of files on your network (typically, you’d be looking for sensitive data that you want to protect or delete). One of my colleagues has written the AD RMS Bulk Protection…

0

Gen Y Hackers

I thought this BBC piece was interesting about young Russian students who hack protected systems for fun. At just 20 years old, Andrei works for an information security firm. He says he does nothing illegal now, but he used to. “I started when I was 14. I hacked a series of military resources, the US…

0

Article o' the Month - 150,000 people notified after National Archives and Records Administration hard-drive loss

I think this article shows the importance of having a good strategy for data-loss prevention: The National Archives and Records Administration last month warned 150,000 more people who interacted with the Clinton administration that their personal information may be at risk after a hard drive was lost. The December letters were the second batch sent in connection with the…

0

A High-Level Discussion of AD RMS

Enrique Saggese, a Microsoft Senior Consultant, recently gave a lecture where he explained, from a high level, how AD RMS functions and how it protects content. We have edited that lecture into a series of videos that we are in the process of releasing on TechNet Edge.  So far, we’ve released the following short video…

0

Why is Information Security So Difficult?

“…because sensitive information is always moving and transforming.” The quotation is from a webcast (a little over twenty minutes long) recently posted on the RSA Website. Several months back, I wrote about a partnership between Microsoft and RSA to provide a data-loss-prevention solution. In the the webcast, representatives from Microsoft and RSA discuss the difficulties organizations face when they…

0

How Do I Share Protected Documents with People Outside my Organization?

GigaTrust’s (a Microsoft partner) Enterprise Trust solution has a nice feature for doing that: Automated, persistent content protection is a necessary element of complete enterprise security architecture that seamlessly complements existing perimeter security solutions with content protection. GigaTrust Enterprise Plus provides the tools to automate the protection of your sensitive documents and intellectual property, and allows…

0