Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Making Sense from Snowden: What’s Significant in the NSA Surveillance Revelations
I do not want to comment this but it is a fairly interesting article on Snowden's Revelations, the...
Date: 08/24/2013
Careful, when Microsoft Support is calling
I guess you are aware of the phone scams, when Microsoft support is calling you to tell you that you...
Date: 08/22/2013
Windows XP: The world after April 8, 2014
To be clear upfront: After support for Windows XP will end, the world will still exist – at least I...
Date: 08/19/2013
Unique in the Crowd – False sense of Privacy
This morning, I was reading a very interesting article called Unique in the Crowd: The privacy...
Date: 06/27/2013
Targeted Attacks – a Video Series
Trustworthy Computing in partnership with Microsoft IT, Microsoft Consulting and the product groups...
Date: 06/17/2013
The Moscow Rules in the Cyberspace
Doing your basics is a natural given, when you defend your assets. Basics like updating your...
Date: 06/03/2013
Is there a future for Product Certifications?
Often, when I talk to customers, product certification is one of the key themes they want to...
Date: 05/17/2013
Microsoft Account: Enable Two-Step Verification
We could even talk about two-factor authentication in my opinion. The idea is, that whenever you...
Date: 04/19/2013
Internet Accessible SCADA Systems
This is a fairly scary view of the world…. Freie Universität Freiburg mapped the Internet accessible...
Date: 03/25/2013
Cyber Espionage and Targeted Attacks
This morning I read an article on Infoworld: Why you should care about cyber espionage which – to me...
Date: 02/08/2013
The Challenge of Patch Management
Depending on where I travel and with which customers I talk, patch management is still the number 1...
Date: 02/01/2013
Try Office 365 Home Premium
Today is the day we launched Office 2013 officially to the broad market. This is a real cool step...
Date: 01/29/2013
An Attack via VPN – Really?
I was just made aware of a case study, which is a really interesting "attack" on a US company via...
Date: 01/17/2013
New book on Direct Access
A lot of customers are asking us about Direct Access and how you can implement it. Erez Ben Ari (a...
Date: 01/09/2013
Mitigating Pass the Hash Attacks
In the recent months, we have seen more and more targeted attacks towards our customers. A lot of...
Date: 12/13/2012
Kaspersky Lab: Microsoft software products pretty darn secure
What a statement! The last time I was on a panel with Eugene Kaspersky, he told us that the world...
Date: 11/03/2012
Two Papers on Current Issues
Trustworthy Computing just released two papers on current issues: Determined Adversaries and...
Date: 10/26/2012
The Future of Crime
You should spend 15 minutes on this TED talk – really worth it!! https://youtu.be/7_OcyWcNi_Y Roger
Date: 10/21/2012
Security Lessons from Star Wars
Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from...
Date: 10/20/2012
New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual machine on personal computer"
Out friends in France are currently working intensively on Test Lab Guides for Consumerization of...
Date: 10/01/2012
Paper: Information Protection and Control (IPC) in Office 365 Preview with Windows Azure AD Rights Management
As you know, protecting your information in the cloud is key. We just published a paper called...
Date: 09/27/2012
Security Implications of Pirated Software
A while ago, when I was travelling a journalist told me that he never pays for our software as he...
Date: 09/17/2012
How to secure your Facebook account
I think that this is actually a fairly good overview of the privacy settings on Facebook and how you...
Date: 09/10/2012
Hacking on the plane: who has jurisdiction?
Wow, that's an interesting question: Let's say a Canadian flies from New York to Tokyo on Korean Air...
Date: 09/03/2012
Direct Access and Virtual Smartcard
I am a huge fan of DirectAccess – especially as a user. This means mainly, that I love it as a user...
Date: 08/26/2012
Microsoft Security Response Center: Progress Report
End of July we issued the fourth MSRC progress report showing not only the work we did on the...
Date: 08/20/2012
UPDATE: Security Advisory – Update For Minimum Certificate Key Length
Yesterday I blogged about the Security Advisory – Update For Minimum Certificate Key Length. I would...
Date: 08/16/2012
Security Advisory - Update For Minimum Certificate Key Length
As you know, I rarely blog about Security Advisories or updates but this time, I want to make sure...
Date: 08/14/2012
DNSChanger explained
A very good video from Sophos on DNSChanger: Roger
Date: 07/10/2012
Banking Trojan hits banks globally
When I was talking to governments about Flame a few weeks ago, they typically told me that they do...
Date: 06/29/2012
Consumerization of IT
In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device...
Date: 06/22/2012
Tackling Cybersecurity Together
Yesterday we all had a very long day: We hosted the EU Cybersecurity and Digital Crimes Forum in...
Date: 06/01/2012
Laptop lost with data for more than 2,000 patients, Boston Children’s reports
What about using Bitlocker???? Laptop lost with data for more than 2,000 patients, Boston Children’s...
Date: 05/25/2012
What Microsoft can teach Apple about security response
I guess, I do not have to comment this – right? What Microsoft can teach Apple about security...
Date: 05/09/2012
Windows Defender Offline
A few days ago, Windows Defender Offline was released. This is basically the tool to use, if you are...
Date: 04/27/2012
Consumerization of IT–How to address this
Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer...
Date: 04/26/2012
Build your own sniffing kit
When people look at attackers, they always think that they are extremely smart people. There are...
Date: 04/24/2012
5 Common Types of Security Professionals
I am following Shoaib’s blog since quite a while – actually due to the beauty of the Internet, we...
Date: 04/23/2012
Q1 Software Vulnerabilities
This was an interesting article on cio.com: Apple, Oracle, Google Lead Major Vendors with Software...
Date: 04/20/2012
Run your company like a burrito?
This has nothing to do with security nor with technology – but it is worth (in my opinion) 20...
Date: 04/19/2012
Keep all your software updated and current
I know that I keep going and going on that. When I talk to customers and mainly to providers of the...
Date: 04/12/2012
Selecting the right Cloud partner
One of the challenges customers always have is, how to select the right cloud partner and fairly...
Date: 04/09/2012
Cybersecurity–Do we need to change the approach?
Years ago information security or cybersecurity was in the hands of specialists, which set the rules...
Date: 04/06/2012
Security Updates and Exploit Code
In our last update cycle we published the security bulletin MS12-020 Vulnerabilities in Remote...
Date: 03/19/2012