共用方式為


Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Office 365 Single Sign-On with AD FS 2.0 whitepaper

Sorry, I did not blog for quite a while. When looking at the Cloud, one of the key challenges to...

Author: rhalbheer Date: 03/05/2012

Internet Explorer aces security test as Google faces accusations

I mean, I obviously like this article: Internet Explorer aces security test as Google faces...

Author: rhalbheer Date: 02/10/2012

Windows 8 Consumer Preview

Just got the date confirmed: The Windows 8 Consumer Preview will be available on February 29th. I am...

Author: rhalbheer Date: 02/08/2012

10 Reasons to migrate off Windows XP

I would like you to sit back, close your eyes and think about the year 2001. Think about how you...

Author: rhalbheer Date: 12/22/2011

Office 365 Becomes First and Only Major Cloud Productivity Service to Comply With Leading EU and U.S. Standards for Data Protection and Security

A long title but this was the title of the official press statement yesterday. Compliance is always...

Author: rhalbheer Date: 12/16/2011

Implementing the Top 4 Defense Strategies

The Australian Defense Signals Directorate maintains a list of the Top 35 Mitigation Strategies...

Author: rhalbheer Date: 12/13/2011

Cyber War Will Not Take Place

I have to admit – it is not my title but it caught my attention. Over the course of the last few...

Author: rhalbheer Date: 11/17/2011

How to manage “Bring your own device”

A few years back a customer’s CSO left the room when I said that this customer should start thinking...

Author: rhalbheer Date: 11/10/2011

Finally I have the app: TouchMountain–a “must have” (at least for me)

As I said in one of my recent posts Comparing Windows Phone 7 and iPhone, there are very few apps I...

Author: rhalbheer Date: 11/08/2011

Connecting with your Windows Phone 7

I tried to convince my wife that using the Windows Phone 7 to keep track of the shopping to do is a...

Author: rhalbheer Date: 11/04/2011

Microsoft Security Compliance Manager 2 ready for download

If you are a regular reader of my blog, you should know the Security Compliance Manager (if you are...

Author: rhalbheer Date: 10/25/2011

EMET–Protection Against Zero-Days

The Enhanced Mitigation Experience Toolkit  is definitely not new but I recently realized that...

Author: rhalbheer Date: 10/23/2011

Moving from Linux to Windows

I know, that’s the second time now I am doing this comparison thingy and I promise that I will stop...

Author: rhalbheer Date: 10/21/2011

Comparing Windows Phone 7 and iPhone

Well, I have to admit – I am biased. I never used an iPhone in my life and based on my experience...

Author: rhalbheer Date: 10/20/2011

Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response

A few years ago I posted on DaRT after having seen it: Microsoft Diagnostics and Recovery Toolset....

Author: rhalbheer Date: 10/19/2011

VeriSign to Take Down Malware Sites?

This is actually an interesting approach: VeriSign Proposes Takedown Procedures and Malware Scanning...

Author: rhalbheer Date: 10/12/2011

German’s Government-Created Trojan Vulnerable

It is not that rare for Law Enforcement that they use software to spy in the case of severe...

Author: rhalbheer Date: 10/11/2011

Why Patents are not here to be violated: Google’s challenges with Android

Interesting: Microsoft takes the Android profit, the Wonkas take the pain I quote: Yet Android costs...

Author: rhalbheer Date: 10/03/2011

Hackers using QR Codes to Push Malware

Always something new… As these kinds of codes are mainly used on mobile phones (or only used on...

Author: rhalbheer Date: 10/02/2011

Less Spam? Another Successful Botnet Takedown!

Our Digital Crimes Unit just took down another one: After Rustock and Waladec, now comes Kelihos....

Author: rhalbheer Date: 09/28/2011

Windows 8 Timeline

Sorry but you do not get a date (I do not have one either). I was just reading an article on Bink.ru...

Author: rhalbheer Date: 09/16/2011

Definition of Cloud Computing

Just found this on...

Author: rhalbheer Date: 09/15/2011

It’s Performance Review Time

We have our Financial Year closing in end of June. This means, it is Performance Review Time at...

Author: rhalbheer Date: 09/11/2011

Security of Car Software

We have seen some of the attacks recently, where people started to attack either the locks or the...

Author: rhalbheer Date: 09/09/2011

Update on DigiNotar

And interesting development tonight: Based on what happened with DigiNotar recently (especially with...

Author: rhalbheer Date: 09/04/2011

The DigiNor Story–So Far

I just read an article on SANS: DigiNotar breach - the story so far. To be clear: This is not a...

Author: rhalbheer Date: 09/02/2011

Windows Security Praised

A result of a study by Kasperski lab is fairly promising – even though it shows the problem being...

Author: rhalbheer Date: 08/16/2011

Searchable Encryption for the Cloud–soon?

This is a very interesting development. Encryption generally would solve a lot of problems around...

Author: rhalbheer Date: 08/10/2011

Google accuses Microsoft to be unfair–Outch (or just stupid?)

An interesting one: Google Threw A Punch, Microsoft Fires Back With A Missile Roger

Author: rhalbheer Date: 08/05/2011

Video on Microsoft’s Datacenter

A very good overview over the way we run Microsoft’s Cloud. The interesting thing is – if you look...

Author: rhalbheer Date: 07/29/2011

Microsoft Malware Protection Center on Facebook and Twitter

I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects...

Author: rhalbheer Date: 07/28/2011

Cloud Security in Office365

You heard about the launch of Office365 recently and I hope you read the blog post on the...

Author: rhalbheer Date: 07/15/2011

Special Intelligence Report on the Rustock Takedown

As you might remember, on Match 16th Microsoft together with other industry players was successfully...

Author: rhalbheer Date: 07/06/2011

Does the business really hate IT?

Back at the times of outsourcing, there was real tension between IT and the business. Internal IT...

Author: rhalbheer Date: 06/23/2011

Windows Lifecycle and Support

One of the things which surprises me often, when talking to customers is, that they do not know,...

Author: rhalbheer Date: 06/21/2011

Ten Immutable Laws Of Security (Version 2.0)

You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the...

Author: rhalbheer Date: 06/16/2011

Internet Personalization–and How I Never Looked at It…

This is actually a great speech but very, very, very scary: and the scariest part is that I never...

Author: rhalbheer Date: 06/15/2011

How Microsoft Uses File Classification Infrastructure

Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2:...

Author: rhalbheer Date: 06/08/2011

Another Location Challenge with Smartphones :-)

Roger

Author: rhalbheer Date: 05/27/2011

Facebook Implements Microsoft’s PhotoDNA Technology

This is actually a great development to fight Child Porn: Facebook adopts PhotoDNA and joins...

Author: rhalbheer Date: 05/20/2011

Security Intelligence Report v10 Released

Yesterday we released our Security Intelligence Report v10. A few highlights/lowlights from the Key...

Author: rhalbheer Date: 05/13/2011

<Previous Next>