TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support options
For small and midsize businesses
For enterprises
For developers
For IT professionals
From partners
For technical support
Support offerings
For home users
More support
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
Roger's Security Blog
TechNet Blogs
»
Roger's Security Blog
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Windows 8 Timeline
Posted
over 3 years ago
by
rhalbheer
1
Comment
Sorry but you do not get a date (I do not have one either). I was just reading an article on Bink.ru with a nice representation of the Windows timeline Roger
Definition of Cloud Computing
Posted
over 3 years ago
by
rhalbheer
1
Comment
Just found this on http://news.yahoo.com/photos/new-adventures-of-queen-victoria-slideshow/20110914-naqv110914-gif-photo-050626492.html Love that Roger
Lessons from Some of the Least Malware Infected Countries in the World
Posted
over 3 years ago
by
rhalbheer
2
Comments
Over the course of the last few years we have seen some countries having constantly low infection rates. So, our team in Trustworthy Computing started to ask the question why this is the case. The countries are Austria, Finland, Germany and Japan. I think...
It’s Performance Review Time
Posted
over 3 years ago
by
rhalbheer
We have our Financial Year closing in end of June. This means, it is Performance Review Time at Microsoft and it is by far not that bad. But I love Dilbert:
Security of Car Software
Posted
over 3 years ago
by
rhalbheer
2
Comments
We have seen some of the attacks recently, where people started to attack either the locks or the technology/software in the car itself controlling the chassis etc. On DarkReading I was just reading this article: Car Systems Reminiscent of Early PCs One...
Update on DigiNotar
Posted
over 3 years ago
by
rhalbheer
And interesting development tonight: Based on what happened with DigiNotar recently (especially with the false certificates for *.google.com), the Dutch government decided to have an official statement and in there to take over operations of the CA. The...
The DigiNor Story–So Far
Posted
over 3 years ago
by
rhalbheer
3
Comments
I just read an article on SANS: DigiNotar breach - the story so far . To be clear: This is not a Microsoft analysis nor any official statement from us. What we have to say is in the advisory: Microsoft Security Advisory (2607712) - Fraudulent Digital...
Windows Security Praised
Posted
over 3 years ago
by
rhalbheer
1
Comment
A result of a study by Kasperski lab is fairly promising – even though it shows the problem being raising up the stack: For the very first time in its history, the top 10 rating of vulnerabilities includes products from just two companies: Adobe and Oracle...
Searchable Encryption for the Cloud–soon?
Posted
over 3 years ago
by
rhalbheer
1
Comment
This is a very interesting development. Encryption generally would solve a lot of problems around data sovereignty. So, encrypting the data, keeping the key and moving the data to the public cloud could basically address a lot of the risks. Today, it...
Google accuses Microsoft to be unfair–Outch (or just stupid?)
Posted
over 3 years ago
by
rhalbheer
An interesting one: Google Threw A Punch, Microsoft Fires Back With A Missile Roger
Video on Microsoft’s Datacenter
Posted
over 3 years ago
by
rhalbheer
1
Comment
A very good overview over the way we run Microsoft’s Cloud. The interesting thing is – if you look at the video – that most customers are still running their datacenters on generation 1-2, which means that the efficiency (labor as well as energy) we can...
Microsoft Malware Protection Center on Facebook and Twitter
Posted
over 3 years ago
by
rhalbheer
I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects (which I will disclose later) and – time flies if you are having fun Just a quick one: The MMPC on Facebook and Twitter The Microsoft Malware Protection...
Cloud Security in Office365
Posted
over 3 years ago
by
rhalbheer
1
Comment
You heard about the launch of Office365 recently and I hope you read the blog post on the application of the Cloud Computing Security Considerations to the private. cloud. If not, here it is: Security Considerations in a Private Cloud To complete the...
Special Intelligence Report on the Rustock Takedown
Posted
over 3 years ago
by
rhalbheer
As you might remember, on Match 16th Microsoft together with other industry players was successfully able to take down the Rustock botnet and thus significantly reducing the spam level. We now just published a special Intelligence Report on this botnet...
Security Considerations in a Private Cloud
Posted
over 3 years ago
by
rhalbheer
1
Comment
I am talking a lot about Cloud Security. There are a few observations I made: Even though a lot of people are talking about the Cloud, there is still not too much knowledge about it. What is a private Cloud versus a public Cloud? What is Infrastructure...
Does the business really hate IT?
Posted
over 3 years ago
by
rhalbheer
1
Comment
Back at the times of outsourcing, there was real tension between IT and the business. Internal IT had the “comfortable” position of having a monopoly: The business used the internal IT and basically just had to pay the bill. Then times came, where the...
Windows Lifecycle and Support
Posted
over 3 years ago
by
rhalbheer
One of the things which surprises me often, when talking to customers is, that they do not know, when certain (key) products run out of support – and therefore no security updates will be shipped. You should include the following dates in your plans:...
Ten Immutable Laws Of Security (Version 2.0)
Posted
over 3 years ago
by
rhalbheer
3
Comments
You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the “collected non-technical wisdom” of what we see in security respeonse being it in Microsoft Security Response Center or in our Security Product Support. There...
Internet Personalization–and How I Never Looked at It…
Posted
over 3 years ago
by
rhalbheer
1
Comment
This is actually a great speech but very, very, very scary: and the scariest part is that I never looked at it that way but he is right Roger
Who cares where your data is?
Posted
over 3 years ago
by
rhalbheer
1
Comment
Wow, I guess the reason for you clicking on the link is this statement – right? Well, “unfortunately” I cannot claim ownership of it. It was made by a Google representative during an interview in Australia: Google: Who cares where your data is? To me...
How Microsoft Uses File Classification Infrastructure
Posted
over 3 years ago
by
rhalbheer
Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2: File Classification Infrastructure in Windows Server 2008 R2 File Classification Infrastructure:More content In my opinion, this is an interesting tool...
The Risks of Consumerization of IT
Posted
over 3 years ago
by
rhalbheer
We often talk about consumerization of IT. The advantages are huge – and so are the risks. The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our company’s – or even worse our country's – secrets. Consumerization...
Another Location Challenge with Smartphones :-)
Posted
over 3 years ago
by
rhalbheer
Roger
Facebook Implements Microsoft’s PhotoDNA Technology
Posted
over 3 years ago
by
rhalbheer
This is actually a great development to fight Child Porn: Facebook adopts PhotoDNA and joins Microsoft and The National Center for Missing & Exploited Children to disrupt the proliferation of online child exploitation. You find the information here...
Security Intelligence Report v10 Released
Posted
over 3 years ago
by
rhalbheer
1
Comment
Yesterday we released our Security Intelligence Report v10. A few highlights/lowlights from the Key Findings section: Industry vulnerability disclosure trends continue an overall trend of moderate declines since 2006. This trend is likely because of better...
<
>