Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
IE9 certified as "trusted software" by TÜV
Internet Explorer was certified early May with a seal of “trusted software”, which is great news in...
Author: rhalbheer Date: 05/10/2011
NSA - Best Practices for Keeping Your Home Network Secure
A good paper: NSA - Best Practices for Keeping Your Home Network Secure Roger
Author: rhalbheer Date: 05/09/2011
Cloud computing providers: Clueless about security?
To me, one of the benefits of moving to the Cloud is security – obviously besides availability and...
Author: rhalbheer Date: 05/04/2011
Rediscover Microsoft Security Guides
Fairly often I am asked whether the Security Guides for our products still exist. The good news is:...
Author: rhalbheer Date: 05/02/2011
BPOS-Federal got FISMA Certification
Great progress on our Cloud: Our BPOF-Federal solution has received FISMA certification and...
Author: rhalbheer Date: 04/21/2011
iPhone saves you the trouble of reporting your working time
You might know the problem if you are working in consulting: You have to fill out the report, form...
Author: rhalbheer Date: 04/20/2011
A Security Comparison: Microsoft Office vs. Oracle Openoffice
Actually, there is not much to say about this. It is a blog post by CanegieMellon called A Security...
Author: rhalbheer Date: 04/19/2011
Six predictions for CIOs
An interesting article by ISACA: Six predictions for CIOs. Here they are: Prediction 1: Cloud...
Author: rhalbheer Date: 04/08/2011
Chris de Burgh: People of the World Stand Up for Freedom
This is one of the rare more private posts on this blog and this time has nothing to do with...
Author: rhalbheer Date: 04/05/2011
Windows 7 and Windows Server 2008 R2 CC EAL4+ Certified
On March 24th, we got the certificate for the Common Criteria certification for Windows 7 and...
Author: rhalbheer Date: 04/01/2011
Kinect Sensor For Autonomous Flight
That’s really interesting: Impressive! Roger
Author: rhalbheer Date: 03/31/2011
Microsoft Security Update Guide, Second Edition
A while ago we released the Microsoft Security Update Guide to explain how we release security...
Author: rhalbheer Date: 03/28/2011
Should you Accept Your Parent’s Facebook Friend Request?
It is kind of strange: I worked with some kids on Tuesday on online safety challenges and mainly we...
Author: rhalbheer Date: 03/24/2011
Ethisphere Institute: Microsoft amongst the world’s most ethical companies
Forbes posted: The World's Most Ethical Companies. I quote: The Ethisphere Institute, a New York...
Author: rhalbheer Date: 03/23/2011
Security in IE9
You know that we are trying to get rid of outdated versions of IE like IE6: IE6 Countdown–Migrate to...
Author: rhalbheer Date: 03/23/2011
Effectiveness of SecureID reduced?
It seems that RSA got attacked and might have lost some information. They actually took a really...
Author: rhalbheer Date: 03/18/2011
Internet Surprisingly Stable in Japan
My manager was on the Tokyo airport, when the earthquake started. We had a chat yesterday about this...
Author: rhalbheer Date: 03/15/2011
IE6 Countdown–Migrate to IE8 (or IE9)
10 years ago a browser was born. Its name was Internet Explorer 6. Now that we’re in 2011, in...
Author: rhalbheer Date: 03/08/2011
10 Tough Botnet Questions
Botnets are one of the toughest problems in the world of Cybercrime today. At least, this is what we...
Author: rhalbheer Date: 03/08/2011
Upgrading from Windows 1 to Windows 7
You might have seen this experiment but it is absolutely astonishing. A guy called Andy from...
Author: rhalbheer Date: 03/07/2011
Is Remote-Application-Removal Acceptable?
I just read this article on Google pulling 50 applications from their Android marketplace (Google...
Author: rhalbheer Date: 03/02/2011
Libya Violence Exploited by Scammers
It is a repeating pattern but not the less disgusting. Whenever bad things happens on the globe, the...
Author: rhalbheer Date: 02/28/2011
A European Dinner :-)
I just got this from a friend of mine: European heaven : You are invited to an official dinner. The...
Author: rhalbheer Date: 02/25/2011
Windows Phone 7 Updates
You might have heard that we will ship an update for Windows Phone 7 soon. Yes, with some new...
Author: rhalbheer Date: 02/23/2011
WHY ARE YOU STILL READING THIS?
Just a reminder: I am slowly consolidating my blog to https://www.halbheer.info/security. So, if you...
Author: rhalbheer Date: 02/21/2011
Infrastructure Planning and Design Guide for Malware Response
A new version of this guide went live – I think something, you should look at. There is a...
Author: rhalbheer Date: 02/20/2011
Six “New” Attack Vectors
Reading this article Six New Hacks That Will Make Your CSO Cringe made me think as it has a few...
Author: rhalbheer Date: 02/18/2011
Fighting a Botnet
Microsoft Malware Protection Center published a document on Battling the Zbot Threat, a special...
Author: rhalbheer Date: 02/17/2011
Privacy à la Dilbert
It kind of reminds me of someone – but whom? Roger source: Dilbert website
Author: rhalbheer Date: 02/16/2011
How to Do an Online Background Check for Free
Well, basically this title attracted my attention: How to Do an Online Background Check for Free. I...
Author: rhalbheer Date: 02/16/2011
Scott Charney at RSA this year
It is kind of a tradition that Scott Charney, our Corporate Vice President for Trustworthy...
Author: rhalbheer Date: 02/12/2011
Phone Security: Lose your Passwords on iPhone in a few minutes
Jailbreaking is probably one of the biggest problems on phones – mainly because it allows easy...
Author: rhalbheer Date: 02/11/2011
Security Impact of the Nokia/Microsoft Announcement
I am definitely looking forward to the collaboration Nokia/Microsoft and it seems to have gotten...
Author: rhalbheer Date: 02/11/2011
Internet Explorer 9, Release Candidate available
You might have seen it: IE9 RC is now ready for download. I am using IE9 since quite a while and it...
Author: rhalbheer Date: 02/10/2011
The Wild West on the Internet… A Crime Story
A fairly interesting thriller on the Internet. It just shows that we need better ways to collaborate...
Author: rhalbheer Date: 02/10/2011
Cybercrime: A Recession-Proof Growth Industry
That’s obvious as people probably tend to want to trust more, the worse their situation is....
Author: rhalbheer Date: 02/08/2011
How much it takes to get on the No-Fly List
I questioned the value of No-Fly lists since quite a while as I read all these story about how...
Author: rhalbheer Date: 02/06/2011
Quit Worrying About Cloud Security?
Well, it is not THAT easy but at least there are people starting to claim that it is not as hard as...
Author: rhalbheer Date: 02/04/2011
Blocking Social Media–What is Your View?
If you are reading my blog posts regularly, you might have seen that I am not a big friend of...
Author: rhalbheer Date: 01/31/2011
Moving my blog!!
Well, I will continue to announce this, until I see the hitrate decline At the moment, I am running...
Author: rhalbheer Date: 01/28/2011
Are You Focused On The Wrong Security Risks?
There is an good article on CIO Central: Are You Focused On The Wrong Security Risks? An interesting...
Author: rhalbheer Date: 01/28/2011
Phishing still very effective: 35 cards in 5 hours
I just read this blog post by ESET laboratories: Inside a phishing attack: 35 credit cards in 5...
Author: rhalbheer Date: 01/27/2011
From the Inside: Our CISO on Cloud Security
You are worried about compliance and risks in the cloud? Well, listen to our CISO and see his views:...
Author: rhalbheer Date: 01/24/2011
How to Build a CERT
Often, when governments look into Critical Infrastructure Protection, they start to build a CERT...
Author: rhalbheer Date: 01/21/2011
Moving Blogs
Quite a while ago, I started a second blog outside our technet site. One of the reasons was that I...
Author: rhalbheer Date: 01/20/2011