共用方式為


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Making Sense from Snowden: What’s Significant in the NSA Surveillance Revelations

I do not want to comment this but it is a fairly interesting article on Snowden's Revelations, the...

Date: 08/24/2013

Careful, when Microsoft Support is calling

I guess you are aware of the phone scams, when Microsoft support is calling you to tell you that you...

Date: 08/22/2013

Windows XP: The world after April 8, 2014

To be clear upfront: After support for Windows XP will end, the world will still exist – at least I...

Date: 08/19/2013

Unique in the Crowd – False sense of Privacy

This morning, I was reading a very interesting article called Unique in the Crowd: The privacy...

Date: 06/27/2013

Targeted Attacks – a Video Series

Trustworthy Computing in partnership with Microsoft IT, Microsoft Consulting and the product groups...

Date: 06/17/2013

The Moscow Rules in the Cyberspace

Doing your basics is a natural given, when you defend your assets. Basics like updating your...

Date: 06/03/2013

Is there a future for Product Certifications?

Often, when I talk to customers, product certification is one of the key themes they want to...

Date: 05/17/2013

Microsoft Account: Enable Two-Step Verification

We could even talk about two-factor authentication in my opinion. The idea is, that whenever you...

Date: 04/19/2013

Internet Accessible SCADA Systems

This is a fairly scary view of the world…. Freie Universität Freiburg mapped the Internet accessible...

Date: 03/25/2013

Cyber Espionage and Targeted Attacks

This morning I read an article on Infoworld: Why you should care about cyber espionage which – to me...

Date: 02/08/2013

The Challenge of Patch Management

Depending on where I travel and with which customers I talk, patch management is still the number 1...

Date: 02/01/2013

Try Office 365 Home Premium

Today is the day we launched Office 2013 officially to the broad market. This is a real cool step...

Date: 01/29/2013

An Attack via VPN – Really?

I was just made aware of a case study, which is a really interesting "attack" on a US company via...

Date: 01/17/2013

New book on Direct Access

A lot of customers are asking us about Direct Access and how you can implement it. Erez Ben Ari (a...

Date: 01/09/2013

Mitigating Pass the Hash Attacks

In the recent months, we have seen more and more targeted attacks towards our customers. A lot of...

Date: 12/13/2012

Kaspersky Lab: Microsoft software products pretty darn secure

What a statement! The last time I was on a panel with Eugene Kaspersky, he told us that the world...

Date: 11/03/2012

Two Papers on Current Issues

Trustworthy Computing just released two papers on current issues: Determined Adversaries and...

Date: 10/26/2012

The Future of Crime

You should spend 15 minutes on this TED talk – really worth it!! https://youtu.be/7_OcyWcNi_Y Roger

Date: 10/21/2012

Security Lessons from Star Wars

Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from...

Date: 10/20/2012

New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual machine on personal computer"

Out friends in France are currently working intensively on Test Lab Guides for Consumerization of...

Date: 10/01/2012

Paper: Information Protection and Control (IPC) in Office 365 Preview with Windows Azure AD Rights Management

As you know, protecting your information in the cloud is key. We just published a paper called...

Date: 09/27/2012

Security Implications of Pirated Software

A while ago, when I was travelling a journalist told me that he never pays for our software as he...

Date: 09/17/2012

How to secure your Facebook account

I think that this is actually a fairly good overview of the privacy settings on Facebook and how you...

Date: 09/10/2012

Hacking on the plane: who has jurisdiction?

Wow, that's an interesting question: Let's say a Canadian flies from New York to Tokyo on Korean Air...

Date: 09/03/2012

Direct Access and Virtual Smartcard

I am a huge fan of DirectAccess – especially as a user. This means mainly, that I love it as a user...

Date: 08/26/2012

Microsoft Security Response Center: Progress Report

End of July we issued the fourth MSRC progress report showing not only the work we did on the...

Date: 08/20/2012

UPDATE: Security Advisory – Update For Minimum Certificate Key Length

Yesterday I blogged about the Security Advisory – Update For Minimum Certificate Key Length. I would...

Date: 08/16/2012

Security Advisory - Update For Minimum Certificate Key Length

As you know, I rarely blog about Security Advisories or updates but this time, I want to make sure...

Date: 08/14/2012

DNSChanger explained

A very good video from Sophos on DNSChanger: Roger

Date: 07/10/2012

Banking Trojan hits banks globally

When I was talking to governments about Flame a few weeks ago, they typically told me that they do...

Date: 06/29/2012

Consumerization of IT

In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device...

Date: 06/22/2012

Tackling Cybersecurity Together

Yesterday we all had a very long day: We hosted the EU Cybersecurity and Digital Crimes Forum in...

Date: 06/01/2012

Laptop lost with data for more than 2,000 patients, Boston Children’s reports

What about using Bitlocker???? Laptop lost with data for more than 2,000 patients, Boston Children’s...

Date: 05/25/2012

What Microsoft can teach Apple about security response

I guess, I do not have to comment this – right? What Microsoft can teach Apple about security...

Date: 05/09/2012

Windows Defender Offline

A few days ago, Windows Defender Offline was released. This is basically the tool to use, if you are...

Date: 04/27/2012

Consumerization of IT–How to address this

Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer...

Date: 04/26/2012

Build your own sniffing kit

When people look at attackers, they always think that they are extremely smart people. There are...

Date: 04/24/2012

5 Common Types of Security Professionals

I am following Shoaib’s blog since quite a while – actually due to the beauty of the Internet, we...

Date: 04/23/2012

Q1 Software Vulnerabilities

This was an interesting article on cio.com: Apple, Oracle, Google Lead Major Vendors with Software...

Date: 04/20/2012

Run your company like a burrito?

This has nothing to do with security nor with technology – but it is worth (in my opinion) 20...

Date: 04/19/2012

Keep all your software updated and current

I know that I keep going and going on that. When I talk to customers and mainly to providers of the...

Date: 04/12/2012

Selecting the right Cloud partner

One of the challenges customers always have is, how to select the right cloud partner and fairly...

Date: 04/09/2012

Cybersecurity–Do we need to change the approach?

Years ago information security or cybersecurity was in the hands of specialists, which set the rules...

Date: 04/06/2012

Security Updates and Exploit Code

In our last update cycle we published the security bulletin MS12-020 Vulnerabilities in Remote...

Date: 03/19/2012

Next>