Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Roger's Security Blog

  • Windows 8 Timeline

    Sorry but you do not get a date (I do not have one either). I was just reading an article on Bink.ru with a nice representation of the Windows timeline Roger
  • Definition of Cloud Computing

    Just found this on http://news.yahoo.com/photos/new-adventures-of-queen-victoria-slideshow/20110914-naqv110914-gif-photo-050626492.html Love that Roger
  • Lessons from Some of the Least Malware Infected Countries in the World

    Over the course of the last few years we have seen some countries having constantly low infection rates. So, our team in Trustworthy Computing started to ask the question why this is the case. The countries are Austria, Finland, Germany and Japan. I think...
  • It’s Performance Review Time

    We have our Financial Year closing in end of June. This means, it is Performance Review Time at Microsoft and it is by far not that bad. But I love Dilbert:
  • Security of Car Software

    We have seen some of the attacks recently, where people started to attack either the locks or the technology/software in the car itself controlling the chassis etc. On DarkReading I was just reading this article: Car Systems Reminiscent of Early PCs One...
  • Update on DigiNotar

    And interesting development tonight: Based on what happened with DigiNotar recently (especially with the false certificates for *.google.com), the Dutch government decided to have an official statement and in there to take over operations of the CA. The...
  • The DigiNor Story–So Far

    I just read an article on SANS: DigiNotar breach - the story so far . To be clear: This is not a Microsoft analysis nor any official statement from us. What we have to say is in the advisory: Microsoft Security Advisory (2607712) - Fraudulent Digital...
  • Windows Security Praised

    A result of a study by Kasperski lab is fairly promising – even though it shows the problem being raising up the stack: For the very first time in its history, the top 10 rating of vulnerabilities includes products from just two companies: Adobe and Oracle...
  • Searchable Encryption for the Cloud–soon?

    This is a very interesting development. Encryption generally would solve a lot of problems around data sovereignty. So, encrypting the data, keeping the key and moving the data to the public cloud could basically address a lot of the risks. Today, it...
  • Google accuses Microsoft to be unfair–Outch (or just stupid?)

    An interesting one: Google Threw A Punch, Microsoft Fires Back With A Missile Roger
  • Video on Microsoft’s Datacenter

    A very good overview over the way we run Microsoft’s Cloud. The interesting thing is – if you look at the video – that most customers are still running their datacenters on generation 1-2, which means that the efficiency (labor as well as energy) we can...
  • Microsoft Malware Protection Center on Facebook and Twitter

    I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects (which I will disclose later) and – time flies if you are having fun Just a quick one: The MMPC on Facebook and Twitter The Microsoft Malware Protection...
  • Cloud Security in Office365

    You heard about the launch of Office365 recently and I hope you read the blog post on the application of the Cloud Computing Security Considerations to the private. cloud. If not, here it is: Security Considerations in a Private Cloud To complete the...
  • Special Intelligence Report on the Rustock Takedown

    As you might remember, on Match 16th Microsoft together with other industry players was successfully able to take down the Rustock botnet and thus significantly reducing the spam level. We now just published a special Intelligence Report on this botnet...
  • Security Considerations in a Private Cloud

    I am talking a lot about Cloud Security. There are a few observations I made: Even though a lot of people are talking about the Cloud, there is still not too much knowledge about it. What is a private Cloud versus a public Cloud? What is Infrastructure...
  • Does the business really hate IT?

    Back at the times of outsourcing, there was real tension between IT and the business. Internal IT had the “comfortable” position of having a monopoly: The business used the internal IT and basically just had to pay the bill. Then times came, where the...
  • Windows Lifecycle and Support

    One of the things which surprises me often, when talking to customers is, that they do not know, when certain (key) products run out of support – and therefore no security updates will be shipped. You should include the following dates in your plans:...
  • Ten Immutable Laws Of Security (Version 2.0)

    You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the “collected non-technical wisdom” of what we see in security respeonse being it in Microsoft Security Response Center or in our Security Product Support. There...
  • Internet Personalization–and How I Never Looked at It…

    This is actually a great speech but very, very, very scary: and the scariest part is that I never looked at it that way but he is right Roger
  • Who cares where your data is?

    Wow, I guess the reason for you clicking on the link is this statement – right? Well, “unfortunately” I cannot claim ownership of it. It was made by a Google representative during an interview in Australia: Google: Who cares where your data is? To me...
  • How Microsoft Uses File Classification Infrastructure

    Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2: File Classification Infrastructure in Windows Server 2008 R2 File Classification Infrastructure:More content In my opinion, this is an interesting tool...
  • The Risks of Consumerization of IT

    We often talk about consumerization of IT. The advantages are huge – and so are the risks. The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our company’s – or even worse our country's – secrets. Consumerization...
  • Another Location Challenge with Smartphones :-)

    Roger
  • Facebook Implements Microsoft’s PhotoDNA Technology

    This is actually a great development to fight Child Porn: Facebook adopts PhotoDNA and joins Microsoft and The National Center for Missing & Exploited Children to disrupt the proliferation of online child exploitation. You find the information here...
  • Security Intelligence Report v10 Released

    Yesterday we released our Security Intelligence Report v10. A few highlights/lowlights from the Key Findings section: Industry vulnerability disclosure trends continue an overall trend of moderate declines since 2006. This trend is likely because of better...