次の方法で共有


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

IE9 certified as "trusted software" by TÜV

Internet Explorer was certified early May with a seal of “trusted software”, which is great news in...

Author: rhalbheer Date: 05/10/2011

NSA - Best Practices for Keeping Your Home Network Secure

A good paper: NSA - Best Practices for Keeping Your Home Network Secure Roger

Author: rhalbheer Date: 05/09/2011

Cloud computing providers: Clueless about security?

To me, one of the benefits of moving to the Cloud is security – obviously besides availability and...

Author: rhalbheer Date: 05/04/2011

Rediscover Microsoft Security Guides

Fairly often I am asked whether the Security Guides for our products still exist. The good news is:...

Author: rhalbheer Date: 05/02/2011

BPOS-Federal got FISMA Certification

Great progress on our Cloud: Our BPOF-Federal solution has received FISMA certification and...

Author: rhalbheer Date: 04/21/2011

iPhone saves you the trouble of reporting your working time

You might know the problem if you are working in consulting: You have to fill out the report, form...

Author: rhalbheer Date: 04/20/2011

A Security Comparison: Microsoft Office vs. Oracle Openoffice

Actually, there is not much to say about this. It is a blog post by CanegieMellon called A Security...

Author: rhalbheer Date: 04/19/2011

Six predictions for CIOs

An interesting article by ISACA: Six predictions for CIOs. Here they are: Prediction 1: Cloud...

Author: rhalbheer Date: 04/08/2011

Chris de Burgh: People of the World Stand Up for Freedom

This is one of the rare more private posts on this blog and this time has nothing to do with...

Author: rhalbheer Date: 04/05/2011

Windows 7 and Windows Server 2008 R2 CC EAL4+ Certified

On March 24th, we got the certificate for the Common Criteria certification for Windows 7 and...

Author: rhalbheer Date: 04/01/2011

Kinect Sensor For Autonomous Flight

That’s really interesting: Impressive! Roger

Author: rhalbheer Date: 03/31/2011

Microsoft Security Update Guide, Second Edition

A while ago we released the Microsoft Security Update Guide to explain how we release security...

Author: rhalbheer Date: 03/28/2011

Should you Accept Your Parent’s Facebook Friend Request?

It is kind of strange: I worked with some kids on Tuesday on online safety challenges and mainly we...

Author: rhalbheer Date: 03/24/2011

Ethisphere Institute: Microsoft amongst the world’s most ethical companies

Forbes posted: The World's Most Ethical Companies. I quote: The Ethisphere Institute, a New York...

Author: rhalbheer Date: 03/23/2011

Security in IE9

You know that we are trying to get rid of outdated versions of IE like IE6: IE6 Countdown–Migrate to...

Author: rhalbheer Date: 03/23/2011

Effectiveness of SecureID reduced?

It seems that RSA got attacked and might have lost some information. They actually took a really...

Author: rhalbheer Date: 03/18/2011

Internet Surprisingly Stable in Japan

My manager was on the Tokyo airport, when the earthquake started. We had a chat yesterday about this...

Author: rhalbheer Date: 03/15/2011

IE6 Countdown–Migrate to IE8 (or IE9)

10 years ago a browser was born. Its name was Internet Explorer 6. Now that we’re in 2011, in...

Author: rhalbheer Date: 03/08/2011

10 Tough Botnet Questions

Botnets are one of the toughest problems in the world of Cybercrime today. At least, this is what we...

Author: rhalbheer Date: 03/08/2011

Upgrading from Windows 1 to Windows 7

You might have seen this experiment but it is absolutely astonishing. A guy called Andy from...

Author: rhalbheer Date: 03/07/2011

Is Remote-Application-Removal Acceptable?

I just read this article on Google pulling 50 applications from their Android marketplace (Google...

Author: rhalbheer Date: 03/02/2011

Libya Violence Exploited by Scammers

It is a repeating pattern but not the less disgusting. Whenever bad things happens on the globe, the...

Author: rhalbheer Date: 02/28/2011

A European Dinner :-)

I just got this from a friend of mine: European heaven : You are invited to an official dinner. The...

Author: rhalbheer Date: 02/25/2011

Windows Phone 7 Updates

You might have heard that we will ship an update for Windows Phone 7 soon. Yes, with some new...

Author: rhalbheer Date: 02/23/2011

WHY ARE YOU STILL READING THIS?

Just a reminder: I am slowly consolidating my blog to https://www.halbheer.info/security. So, if you...

Author: rhalbheer Date: 02/21/2011

Infrastructure Planning and Design Guide for Malware Response

A new version of this guide went live – I think something, you should look at. There is a...

Author: rhalbheer Date: 02/20/2011

Six “New” Attack Vectors

Reading this article Six New Hacks That Will Make Your CSO Cringe made me think as it has a few...

Author: rhalbheer Date: 02/18/2011

Fighting a Botnet

Microsoft Malware Protection Center published a document on Battling the Zbot Threat, a special...

Author: rhalbheer Date: 02/17/2011

Privacy à la Dilbert

It kind of reminds me of someone – but whom? Roger source: Dilbert website

Author: rhalbheer Date: 02/16/2011

How to Do an Online Background Check for Free

Well, basically this title attracted my attention: How to Do an Online Background Check for Free. I...

Author: rhalbheer Date: 02/16/2011

Scott Charney at RSA this year

It is kind of a tradition that Scott Charney, our Corporate Vice President for Trustworthy...

Author: rhalbheer Date: 02/12/2011

Phone Security: Lose your Passwords on iPhone in a few minutes

Jailbreaking is probably one of the biggest problems on phones – mainly because it allows easy...

Author: rhalbheer Date: 02/11/2011

Security Impact of the Nokia/Microsoft Announcement

I am definitely looking forward to the collaboration Nokia/Microsoft and it seems to have gotten...

Author: rhalbheer Date: 02/11/2011

Internet Explorer 9, Release Candidate available

You might have seen it: IE9 RC is now ready for download. I am using IE9 since quite a while and it...

Author: rhalbheer Date: 02/10/2011

The Wild West on the Internet… A Crime Story

A fairly interesting thriller on the Internet. It just shows that we need better ways to collaborate...

Author: rhalbheer Date: 02/10/2011

Cybercrime: A Recession-Proof Growth Industry

That’s obvious as people probably tend to want to trust more, the worse their situation is....

Author: rhalbheer Date: 02/08/2011

How much it takes to get on the No-Fly List

I questioned the value of No-Fly lists since quite a while as I read all these story about how...

Author: rhalbheer Date: 02/06/2011

Quit Worrying About Cloud Security?

Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as...

Author: rhalbheer Date: 02/04/2011

Blocking Social Media–What is Your View?

If you are reading my blog posts regularly, you might have seen that I am not a big friend of...

Author: rhalbheer Date: 01/31/2011

Moving my blog!!

Well, I will continue to announce this, until I see the hitrate decline At the moment, I am running...

Author: rhalbheer Date: 01/28/2011

Are You Focused On The Wrong Security Risks?

There is an good article on CIO Central: Are You Focused On The Wrong Security Risks? An interesting...

Author: rhalbheer Date: 01/28/2011

Phishing still very effective: 35 cards in 5 hours

I just read this blog post by ESET laboratories: Inside a phishing attack: 35 credit cards in 5...

Author: rhalbheer Date: 01/27/2011

From the Inside: Our CISO on Cloud Security

You are worried about compliance and risks in the cloud? Well, listen to our CISO and see his views:...

Author: rhalbheer Date: 01/24/2011

How to Build a CERT

Often, when governments look into Critical Infrastructure Protection, they start to build a CERT...

Author: rhalbheer Date: 01/21/2011

Moving Blogs

Quite a while ago, I started a second blog outside our technet site. One of the reasons was that I...

Author: rhalbheer Date: 01/20/2011

<Previous Next>