Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Office 365 Single Sign-On with AD FS 2.0 whitepaper
Sorry, I did not blog for quite a while. When looking at the Cloud, one of the key challenges to...
Author: rhalbheer Date: 03/05/2012
Internet Explorer aces security test as Google faces accusations
I mean, I obviously like this article: Internet Explorer aces security test as Google faces...
Author: rhalbheer Date: 02/10/2012
Windows 8 Consumer Preview
Just got the date confirmed: The Windows 8 Consumer Preview will be available on February 29th. I am...
Author: rhalbheer Date: 02/08/2012
10 Reasons to migrate off Windows XP
I would like you to sit back, close your eyes and think about the year 2001. Think about how you...
Author: rhalbheer Date: 12/22/2011
Office 365 Becomes First and Only Major Cloud Productivity Service to Comply With Leading EU and U.S. Standards for Data Protection and Security
A long title but this was the title of the official press statement yesterday. Compliance is always...
Author: rhalbheer Date: 12/16/2011
Implementing the Top 4 Defense Strategies
The Australian Defense Signals Directorate maintains a list of the Top 35 Mitigation Strategies...
Author: rhalbheer Date: 12/13/2011
Cyber War Will Not Take Place
I have to admit – it is not my title but it caught my attention. Over the course of the last few...
Author: rhalbheer Date: 11/17/2011
How to manage “Bring your own device”
A few years back a customer’s CSO left the room when I said that this customer should start thinking...
Author: rhalbheer Date: 11/10/2011
Finally I have the app: TouchMountain–a “must have” (at least for me)
As I said in one of my recent posts Comparing Windows Phone 7 and iPhone, there are very few apps I...
Author: rhalbheer Date: 11/08/2011
Connecting with your Windows Phone 7
I tried to convince my wife that using the Windows Phone 7 to keep track of the shopping to do is a...
Author: rhalbheer Date: 11/04/2011
Microsoft Security Compliance Manager 2 ready for download
If you are a regular reader of my blog, you should know the Security Compliance Manager (if you are...
Author: rhalbheer Date: 10/25/2011
EMET–Protection Against Zero-Days
The Enhanced Mitigation Experience Toolkit is definitely not new but I recently realized that...
Author: rhalbheer Date: 10/23/2011
Moving from Linux to Windows
I know, that’s the second time now I am doing this comparison thingy and I promise that I will stop...
Author: rhalbheer Date: 10/21/2011
Comparing Windows Phone 7 and iPhone
Well, I have to admit – I am biased. I never used an iPhone in my life and based on my experience...
Author: rhalbheer Date: 10/20/2011
Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response
A few years ago I posted on DaRT after having seen it: Microsoft Diagnostics and Recovery Toolset....
Author: rhalbheer Date: 10/19/2011
VeriSign to Take Down Malware Sites?
This is actually an interesting approach: VeriSign Proposes Takedown Procedures and Malware Scanning...
Author: rhalbheer Date: 10/12/2011
German’s Government-Created Trojan Vulnerable
It is not that rare for Law Enforcement that they use software to spy in the case of severe...
Author: rhalbheer Date: 10/11/2011
Why Patents are not here to be violated: Google’s challenges with Android
Interesting: Microsoft takes the Android profit, the Wonkas take the pain I quote: Yet Android costs...
Author: rhalbheer Date: 10/03/2011
Hackers using QR Codes to Push Malware
Always something new… As these kinds of codes are mainly used on mobile phones (or only used on...
Author: rhalbheer Date: 10/02/2011
Less Spam? Another Successful Botnet Takedown!
Our Digital Crimes Unit just took down another one: After Rustock and Waladec, now comes Kelihos....
Author: rhalbheer Date: 09/28/2011
Windows 8 Timeline
Sorry but you do not get a date (I do not have one either). I was just reading an article on Bink.ru...
Author: rhalbheer Date: 09/16/2011
Definition of Cloud Computing
Just found this on...
Author: rhalbheer Date: 09/15/2011
It’s Performance Review Time
We have our Financial Year closing in end of June. This means, it is Performance Review Time at...
Author: rhalbheer Date: 09/11/2011
Security of Car Software
We have seen some of the attacks recently, where people started to attack either the locks or the...
Author: rhalbheer Date: 09/09/2011
Update on DigiNotar
And interesting development tonight: Based on what happened with DigiNotar recently (especially with...
Author: rhalbheer Date: 09/04/2011
The DigiNor Story–So Far
I just read an article on SANS: DigiNotar breach - the story so far. To be clear: This is not a...
Author: rhalbheer Date: 09/02/2011
Windows Security Praised
A result of a study by Kasperski lab is fairly promising – even though it shows the problem being...
Author: rhalbheer Date: 08/16/2011
Searchable Encryption for the Cloud–soon?
This is a very interesting development. Encryption generally would solve a lot of problems around...
Author: rhalbheer Date: 08/10/2011
Google accuses Microsoft to be unfair–Outch (or just stupid?)
An interesting one: Google Threw A Punch, Microsoft Fires Back With A Missile Roger
Author: rhalbheer Date: 08/05/2011
Video on Microsoft’s Datacenter
A very good overview over the way we run Microsoft’s Cloud. The interesting thing is – if you look...
Author: rhalbheer Date: 07/29/2011
Microsoft Malware Protection Center on Facebook and Twitter
I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects...
Author: rhalbheer Date: 07/28/2011
Cloud Security in Office365
You heard about the launch of Office365 recently and I hope you read the blog post on the...
Author: rhalbheer Date: 07/15/2011
Special Intelligence Report on the Rustock Takedown
As you might remember, on Match 16th Microsoft together with other industry players was successfully...
Author: rhalbheer Date: 07/06/2011
Does the business really hate IT?
Back at the times of outsourcing, there was real tension between IT and the business. Internal IT...
Author: rhalbheer Date: 06/23/2011
Windows Lifecycle and Support
One of the things which surprises me often, when talking to customers is, that they do not know,...
Author: rhalbheer Date: 06/21/2011
Ten Immutable Laws Of Security (Version 2.0)
You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the...
Author: rhalbheer Date: 06/16/2011
Internet Personalization–and How I Never Looked at It…
This is actually a great speech but very, very, very scary: and the scariest part is that I never...
Author: rhalbheer Date: 06/15/2011
How Microsoft Uses File Classification Infrastructure
Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2:...
Author: rhalbheer Date: 06/08/2011
Another Location Challenge with Smartphones :-)
Roger
Author: rhalbheer Date: 05/27/2011
Facebook Implements Microsoft’s PhotoDNA Technology
This is actually a great development to fight Child Porn: Facebook adopts PhotoDNA and joins...
Author: rhalbheer Date: 05/20/2011
Security Intelligence Report v10 Released
Yesterday we released our Security Intelligence Report v10. A few highlights/lowlights from the Key...
Author: rhalbheer Date: 05/13/2011