Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Why Google Won’t Beat Microsoft on Cloud Collaboration
Well, it is not me saying that, it is actually Clint Boulton, eWeek. He published an article on 10...
Author: rhalbheer Date: 06/27/2010
Is a Copier Your Biggest Security Risk?
Probably not. However, it indefinitely is a security risk. We are talking about this since a...
Author: rhalbheer Date: 06/26/2010
What Teens Do Online
From time to time I do speeches to parents here in the community with regards to online safety for...
Author: rhalbheer Date: 06/24/2010
Mature your IT and then move to the Cloud
Today, I had the opportunity to talk to a group of partners on Cloud and security. The goal was to...
Author: rhalbheer Date: 06/23/2010
Raid against Piracy
There seem to be policy organizations being serious about fighting piracy! Hungary, actually with...
Author: rhalbheer Date: 06/22/2010
Apple Marketing
Roger
Author: rhalbheer Date: 06/21/2010
10 of the Top Data Breaches of the Decade
You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable)...
Author: rhalbheer Date: 06/17/2010
End of Support for Windows 2000 and Windows XP SP2
I just want to make you aware the Windows 2000 and Windows XP SP2 are going out of support. There...
Author: rhalbheer Date: 06/17/2010
Should the Government be able to enforce security updates?
This is actually an interesting question. A lot of governments enforce rules and regulations on how...
Author: rhalbheer Date: 06/13/2010
Who needs a (vulnerable) iPad if you can get an nPad?
I actually wanted to show nPad to you as I loved it – it is a new hardware factor to what we...
Author: rhalbheer Date: 06/11/2010
Vulnerability Disclosure to Compete?
As you know (I stress that fairly often ), I am Swiss. The reason why I am stressing this today is...
Author: rhalbheer Date: 06/11/2010
Open Source and Hackers
The debate is probably as old as the Open Source software development model: Which one is more...
Author: rhalbheer Date: 06/09/2010
We Need Solid and Strong Transparent Processes for the Cloud
This morning I was reading an article called Google seeks to assure customers on cloud security...
Author: rhalbheer Date: 06/08/2010
Do we Need Special Laws?
Well, yes we need Cybersecurity Legislation without doubt but sometimes the legislator goes too far...
Author: rhalbheer Date: 06/02/2010
Hacking the Human Body
Years ago I was sitting in a healthcare event, when a researcher was talking (very excited) about...
Author: rhalbheer Date: 05/26/2010
Identity in the Cloud
Kim Cameron, one of our key identity architects had an interesting presentation on identity in the...
Author: rhalbheer Date: 05/25/2010
Update on the Khobe “vulnerability”
Just an update on my recent post on The “KHOBE – 8.0 earthquake” – What’s behind it. In the...
Author: rhalbheer Date: 05/13/2010
The “KHOBE – 8.0 earthquake” – What’s behind it
On different social media this article actually gets tremendous coverage: KHOBE – 8.0 earthquake for...
Author: rhalbheer Date: 05/12/2010
Update on our Forefront Strategy
As I was on vacation last week, I could not blog on that but still – if you do not have seen that,...
Author: rhalbheer Date: 05/02/2010
How to Align Work Live and Private Live
It is often talked about the “New World of Work” or sometimes it is about bringing virtual and...
Author: rhalbheer Date: 05/02/2010
Manage your PCs in the Cloud – Sign up for Windows Intune Beta
We just opened the Beta for Windows Intune, your new PC management and security solution in the...
Author: rhalbheer Date: 04/21/2010
What we can learn for the volcanic cloud for information security
I am one of the grounded people. Luckily for me, I would have had to fly out today and am now...
Author: rhalbheer Date: 04/19/2010
Banning Social Media – a good idea?
I am really against banning social media – especially with the reasoning of the work performance. To...
Author: rhalbheer Date: 04/14/2010
Microsoft Security Compliance Manager: Now available!
I recently blogged about the Beta version of our Security Compliance Manger, helping you to manage...
Author: rhalbheer Date: 04/09/2010
Raise Money for Cancer Research
This is a private post – and does not really have a lot to do with my job at Microsoft. Well, a...
Author: rhalbheer Date: 03/31/2010
This cannot be Microsoft Technology :-)
Author: rhalbheer Date: 03/30/2010
Why Today’s End-User Education Fails!
I was reading a paper recently, where I initially thought it is a joke (it looked scientifically,...
Author: rhalbheer Date: 03/27/2010
Council of Europe: We need ONE Cybercrime Convention
As you saw from previous posts, I am at the Octopus Conference on Cooperation against Cybercrime at...
Author: rhalbheer Date: 03/24/2010
Run Windows 7 XP Mode on CPU’s without virtualization
I once wanted to text Windows 7 XP Mode on my notebook or my home PC but unfortunately I failed as...
Author: rhalbheer Date: 03/23/2010
Want to introduce the Security Development Lifecycle? Play a Game
I was recently pinged by a customer asking for the “real” version of this game. It was distributed...
Author: rhalbheer Date: 03/21/2010
Results of Operation b49 (Botnet Takedown)
On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post...
Author: rhalbheer Date: 03/20/2010
Azure Showcase: The Eye on Earth
Well, you know, fairly often when I look at showcases I am a little bit disappointed I have to...
Author: rhalbheer Date: 03/19/2010
Strong Authentication and Privacy – A Contradiction in Terms?
You know that I am not a big fan of the requirement for having all Internet users authenticate...
Author: rhalbheer Date: 03/17/2010
ATM Skims – would you have figured them?
I was reading two BBC articles this morning. Wow, this is scary, isn’t it? Look at the pictures...
Author: rhalbheer Date: 03/17/2010
Hacking Incidents 2009 – Interesting Data
There is a project called the web hacking incident database (WHID), which collects data and...
Author: rhalbheer Date: 03/12/2010
Insider Threat of Cloud Computing
Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real...
Author: rhalbheer Date: 03/11/2010
Data Protection Heat Map
I was looking at some research done by Forrester which could be interesting for you as well. They...
Author: rhalbheer Date: 03/10/2010
Security Development Lifecycle – Website!
I often talk about how we learned to engineer security into the products and the results prove that...
Author: rhalbheer Date: 03/08/2010