Share via


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Why Google Won’t Beat Microsoft on Cloud Collaboration

Well, it is not me saying that, it is actually Clint Boulton, eWeek. He published an article on 10...

Author: rhalbheer Date: 06/27/2010

Is a Copier Your Biggest Security Risk?

Probably not. However, it indefinitely is a security risk. We are talking about this since a...

Author: rhalbheer Date: 06/26/2010

What Teens Do Online

From time to time I do speeches to parents here in the community with regards to online safety for...

Author: rhalbheer Date: 06/24/2010

Mature your IT and then move to the Cloud

Today, I had the opportunity to talk to a group of partners on Cloud and security. The goal was to...

Author: rhalbheer Date: 06/23/2010

Raid against Piracy

There seem to be policy organizations being serious about fighting piracy! Hungary, actually with...

Author: rhalbheer Date: 06/22/2010

Apple Marketing

Roger

Author: rhalbheer Date: 06/21/2010

10 of the Top Data Breaches of the Decade

You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable)...

Author: rhalbheer Date: 06/17/2010

End of Support for Windows 2000 and Windows XP SP2

I just want to make you aware the Windows 2000 and Windows XP SP2 are going out of support. There...

Author: rhalbheer Date: 06/17/2010

Should the Government be able to enforce security updates?

This is actually an interesting question. A lot of governments enforce rules and regulations on how...

Author: rhalbheer Date: 06/13/2010

Who needs a (vulnerable) iPad if you can get an nPad?

I actually wanted to show nPad to you as I loved it – it is a new hardware factor to what we...

Author: rhalbheer Date: 06/11/2010

Vulnerability Disclosure to Compete?

As you know (I stress that fairly often ), I am Swiss. The reason why I am stressing this today is...

Author: rhalbheer Date: 06/11/2010

Open Source and Hackers

The debate is probably as old as the Open Source software development model: Which one is more...

Author: rhalbheer Date: 06/09/2010

We Need Solid and Strong Transparent Processes for the Cloud

This morning I was reading an article called Google seeks to assure customers on cloud security...

Author: rhalbheer Date: 06/08/2010

Do we Need Special Laws?

Well, yes we need Cybersecurity Legislation without doubt but sometimes the legislator goes too far...

Author: rhalbheer Date: 06/02/2010

Hacking the Human Body

Years ago I was sitting in a healthcare event, when a researcher was talking (very excited) about...

Author: rhalbheer Date: 05/26/2010

Identity in the Cloud

Kim Cameron, one of our key identity architects had an interesting presentation on identity in the...

Author: rhalbheer Date: 05/25/2010

Update on the Khobe “vulnerability”

Just an update on my recent post  on The “KHOBE – 8.0 earthquake” – What’s behind it. In the...

Author: rhalbheer Date: 05/13/2010

The “KHOBE – 8.0 earthquake” – What’s behind it

On different social media this article actually gets tremendous coverage: KHOBE – 8.0 earthquake for...

Author: rhalbheer Date: 05/12/2010

Update on our Forefront Strategy

As I was on vacation last week, I could not blog on that but still – if you do not have seen that,...

Author: rhalbheer Date: 05/02/2010

How to Align Work Live and Private Live

It is often talked about the “New World of Work” or sometimes it is about bringing virtual and...

Author: rhalbheer Date: 05/02/2010

Manage your PCs in the Cloud – Sign up for Windows Intune Beta

We just opened the Beta for Windows Intune, your new PC management and security solution in the...

Author: rhalbheer Date: 04/21/2010

What we can learn for the volcanic cloud for information security

I am one of the grounded people. Luckily for me, I would have had to fly out today and am now...

Author: rhalbheer Date: 04/19/2010

Banning Social Media – a good idea?

I am really against banning social media – especially with the reasoning of the work performance. To...

Author: rhalbheer Date: 04/14/2010

Microsoft Security Compliance Manager: Now available!

I recently blogged about the Beta version of our Security Compliance Manger, helping you to manage...

Author: rhalbheer Date: 04/09/2010

Raise Money for Cancer Research

This is a private post – and does not really have a lot to do with my job at Microsoft. Well, a...

Author: rhalbheer Date: 03/31/2010

This cannot be Microsoft Technology :-)

Author: rhalbheer Date: 03/30/2010

Why Today’s End-User Education Fails!

I was reading a paper recently, where I initially thought it is a joke (it looked scientifically,...

Author: rhalbheer Date: 03/27/2010

Council of Europe: We need ONE Cybercrime Convention

As you saw from previous posts, I am at the Octopus Conference on Cooperation against Cybercrime at...

Author: rhalbheer Date: 03/24/2010

Run Windows 7 XP Mode on CPU’s without virtualization

I once wanted to text Windows 7 XP Mode on my notebook or my home PC but unfortunately I failed as...

Author: rhalbheer Date: 03/23/2010

Want to introduce the Security Development Lifecycle? Play a Game

I was recently pinged by a customer asking for the “real” version of this game. It was distributed...

Author: rhalbheer Date: 03/21/2010

Results of Operation b49 (Botnet Takedown)

On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post...

Author: rhalbheer Date: 03/20/2010

Azure Showcase: The Eye on Earth

Well, you know, fairly often when I look at showcases I am a little bit disappointed I have to...

Author: rhalbheer Date: 03/19/2010

Strong Authentication and Privacy – A Contradiction in Terms?

You know that I am not a big fan of the requirement for having all Internet users authenticate...

Author: rhalbheer Date: 03/17/2010

ATM Skims – would you have figured them?

I was reading two BBC articles this morning. Wow, this is scary, isn’t it? Look at the pictures...

Author: rhalbheer Date: 03/17/2010

Hacking Incidents 2009 – Interesting Data

There is a project called the web hacking incident database (WHID), which collects data and...

Author: rhalbheer Date: 03/12/2010

Insider Threat of Cloud Computing

Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real...

Author: rhalbheer Date: 03/11/2010

Data Protection Heat Map

I was looking at some research done by Forrester which could be interesting for you as well. They...

Author: rhalbheer Date: 03/10/2010

Security Development Lifecycle – Website!

I often talk about how we learned to engineer security into the products and the results prove that...

Author: rhalbheer Date: 03/08/2010

<Previous Next>