次の方法で共有


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Attacks on Application Level

That the attacks move up the stack is really nothing new. However, it increases the challenge to...

Author: rhalbheer Date: 01/18/2011

UNODC: Open Ended Expert Group on Cybercrime

From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really...

Author: rhalbheer Date: 01/16/2011

Real Physical Security

I saw this this morning – have a great weekend: Roger

Author: rhalbheer Date: 01/14/2011

Cybercrime as a Service–Our Future?

It is not really surprising that the criminals will leverage the economy of Cloud Computing for...

Author: rhalbheer Date: 01/12/2011

Dilbert on Cloud Computing

The worst thing is, that there is some truth in that: At least, this is what I see often, before I...

Author: rhalbheer Date: 01/07/2011

Exciting News from the Consumer Electronics Show in Vegas

After the launch of different products for the consumer, businesses and in the Cloud, Steve Ballmer...

Author: rhalbheer Date: 01/06/2011

Targeted Attacks: The Biggest Risk in 2011?

Since quite a while, I am saying that targeted attacks are the risks, which really keep me up at...

Author: rhalbheer Date: 01/03/2011

And you think you have security problems? Merry Christmas

Roger

Author: rhalbheer Date: 12/25/2010

My Blackberry Is Not Working!

That’s absolutely great and worth spending the few minutes – enjoy: Roger

Author: rhalbheer Date: 12/22/2010

I sold my soul to Google, can I get it back?

Well, this question was not asked by me but by a guy called Joe Wilcox on Betanews: I sold my soul...

Author: rhalbheer Date: 12/13/2010

On the effectiveness of DEP and ASLR

Our Security Research and Defense team published a blog post, which is really interesting to read to...

Author: rhalbheer Date: 12/09/2010

Mitigating the use of Local Admin

We recently had internal discussions on the use of local admin and how to mitigate it. During this,...

Author: rhalbheer Date: 12/05/2010

Behind the Curtain of Second Tuesdays: Challenges in Software Security Response

You might know about Bluehat, which is an internal security conference we run several times an year....

Author: rhalbheer Date: 12/02/2010

Security Development Lifecycle: Quick References

A quick one: An interesting download location: With the SDL Quick Security References (QSR), the...

Author: rhalbheer Date: 11/30/2010

Publishing Secret or Sensitive Information

With a lot of interest I followed the media on the latest Wikileaks’ publication of sensitive...

Author: rhalbheer Date: 11/30/2010

The Cloud is Also Green

Yes, not only gray Seriously, we commissioned a study to see what the impact of cloud computing is...

Author: rhalbheer Date: 11/21/2010

Information Security Management System for Microsoft Cloud Infrastructure

Just a quick one. Our Global Foundation Services organization (the ones who run our datacenters)...

Author: rhalbheer Date: 11/19/2010

New Baselines for the Security Compliance Manager

There were just new resources released for the Security Compliance Manager: the Windows Server 2008...

Author: rhalbheer Date: 11/16/2010

Basic Malware Protection for Free?

It is kind of strange, whenever I talk to governments and customers, everybody seems to agree that...

Author: rhalbheer Date: 11/15/2010

Fixing Risk Management

Since quite a while I am not satisfied with the way we (in the industry) are doing risk management....

Author: rhalbheer Date: 11/14/2010

Hotmail now with full-session SSL

If you use Hotmail, you should enable full session SSL in my opinion. Additionally we use SSL for...

Author: rhalbheer Date: 11/11/2010

Russia to revise Cybercrime Legislation?

You know that I am propagating the adoption of cybercrime legislation, which is aligned across the...

Author: rhalbheer Date: 11/05/2010

Move to latest versions - for security reasons

We all know that Windows XP is rock-solid but not capable anymore to defend against today’s...

Author: rhalbheer Date: 11/02/2010

Worldwide Chief Security Advisor Meeting

I know that I have been very, very quiet over the last two weeks. The reason was, that the worldwide...

Author: rhalbheer Date: 11/01/2010

Internet on Mount Everest

I already have a problem the way tourism develops on Mount Everest (definitely understanding that...

Author: rhalbheer Date: 10/29/2010

The Botnet Superhighway

An interesting analysis by the Malware Protection Center: The Botnet Superhighway Roger

Author: rhalbheer Date: 10/22/2010

Windows Phone 7 Reviews

I just got a mail that my Windows Phone 7 is ready for pick-up. Unfortunately I am in Redmond at the...

Author: rhalbheer Date: 10/22/2010

Ray Ozzie’s Blog is Back

As I am still oof, another short one: Ray Ozzie’s blog is back: https://ozzie.net/ Ray is definitely...

Author: rhalbheer Date: 10/17/2010

When Identity Theft and Privacy Meet

It is always bad, if comics have a significant portion of truth: and then and finally hmm…. too much...

Author: rhalbheer Date: 10/14/2010

Security Intelligence Report v9 is online

Usually I blog intensively on the release of the Security Intelligence Report. However, this time I...

Author: rhalbheer Date: 10/13/2010

Security in Switzerland

I am preparing the worldwide Chief Security Advisor meeting in Seattle, which takes place soon. I am...

Author: rhalbheer Date: 10/12/2010

Stuxnet talks – do we listen?

Stuxnet is a severe threat – that’s something we know for sure. But if we look at it – what do we...

Author: rhalbheer Date: 10/12/2010

Can cloud security ever work?

An interesting question, posed by V3.co.uk: Can cloud security ever work? – How relevant is the...

Author: rhalbheer Date: 10/06/2010

Responsibility of ISPs for the ecosystem?

If you like Scott Chaney's suggestion he made at ISSE this week called Collective Defense - Applying...

Author: rhalbheer Date: 10/06/2010

UNHCR and Microsoft to help refugees

No, this is not yet another announcement – this is a picture of today’s reality. UNHCR just...

Author: rhalbheer Date: 10/05/2010

Is the online world more dangerous?

I often hear statements that the risk of losing your identity or being a victim of fraud is much...

Author: rhalbheer Date: 10/04/2010

“Freedom of speech” does not mean you can say everything!

Sometimes I feel that people think the Internet is a room, where the laws of our society do not...

Author: rhalbheer Date: 10/03/2010

Windows Live Essentials 2011 available for download now

I am using it since the Beta and it is really cool. I am using Messenger (with the integration to...

Author: rhalbheer Date: 09/30/2010

How to Detect a Hacker Attack

This title immediately caught my attention and probably yours as well: How to detect a hacker attack...

Author: rhalbheer Date: 09/30/2010

Customer Experience Study: Security Improves in the Cloud

Last week, when I was in South Africa, a partner of us pointed me to a very interesting paper by...

Author: rhalbheer Date: 09/28/2010

Support and OpenSource

I know that I am not an OpenSource expert and to be completely clear: I do not want to complain at...

Author: rhalbheer Date: 09/28/2010

Stuxnet: Future of warfare? Or just lax security?

What is your view?: Stuxnet: Future of warfare? Or just lax security? Roger

Author: rhalbheer Date: 09/27/2010

The Value of Twitter–Revisited

Actually I had a few very interesting discussions lately as a reaction on my post Is There Any Value...

Author: rhalbheer Date: 09/27/2010

<Previous Next>