TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
June, 2010
TechNet Blogs
»
Roger's Security Blog
»
June, 2010
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
The Growth of the Tablet Market
Posted
over 3 years ago
by
rhalbheer
2
Comments
You know that we have Tablet PCs since Windows XP and I think I did not have many PCs at Microsoft which were not tablets. How often do I use them as a tablet? Not too often but when I am in a customer meeting and do not use my notebook to present, I...
Why Google Won’t Beat Microsoft on Cloud Collaboration
Posted
over 3 years ago
by
rhalbheer
Well, it is not me saying that, it is actually Clint Boulton , eWeek. He published an article on 10 Reasons Why Google Won't Beat Microsoft in Cloud Collaboration and they are: Microsoft Is Big, Getting Bigger Local Still Preferable? Microsoft Now Lives...
Is a Copier Your Biggest Security Risk?
Posted
over 3 years ago
by
rhalbheer
1
Comment
Probably not. However, it indefinitely is a security risk. We are talking about this since a looooooong time as such copiers are sold since 2002. I just recently heard that the criminals are looking into this heavily and now it is even discussed publically...
What Teens Do Online
Posted
over 3 years ago
by
rhalbheer
From time to time I do speeches to parents here in the community with regards to online safety for the kids and the teens. Being a parent as well, I have a natural interest in this theme, knowing that I probably have better insights in some of the challenges...
Mature your IT and then move to the Cloud
Posted
over 3 years ago
by
rhalbheer
1
Comment
Today, I had the opportunity to talk to a group of partners on Cloud and security. The goal was to make them ready for the Cloud and make them ready to answer the customer’s questions. One block – obviously – was about security and as I look at it (and...
Raid against Piracy
Posted
over 3 years ago
by
rhalbheer
There seem to be policy organizations being serious about fighting piracy! Hungary, actually with 41% pirated software “not even that bad”, seems to be really serious. But before, let me just take those 41% up for a second: This means that 41% of the...
Apple Marketing
Posted
over 3 years ago
by
rhalbheer
Roger
10 of the Top Data Breaches of the Decade
Posted
over 3 years ago
by
rhalbheer
You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable) iPad if you can get an nPad? and some people pushed back – which I can understand. So, to put it into perspective, I read this article this morning on...
End of Support for Windows 2000 and Windows XP SP2
Posted
over 3 years ago
by
rhalbheer
I just want to make you aware the Windows 2000 and Windows XP SP2 are going out of support. There are a few good blog post you should look at: End of Support for Windows XP SP2 and Windows Vista (with no service packs installed) End of support for Windows...
Lies, Damned Lies and the “Gone Google” Calculator
Posted
over 3 years ago
by
rhalbheer
An interesting post (by a Microsoft employee) on the Google cost calculator. An interesting read on the way they compete…. Lies, Damned Lies and the “Gone Google” Calculator Roger
The Importance of International Collaboration–Even in Exercises
Posted
over 3 years ago
by
rhalbheer
One of the biggest challenges in Critical Infrastructure Protection or Incident Response is collaboration. Collaboration between the public and the private sector as the private sector is most often running the critical infrastructure; collaboration between...
Notebook searches at a country border
Posted
over 3 years ago
by
rhalbheer
2
Comments
I guess you still know the discussions a while ago where it was made public that notebooks can be searched without suspicion when you cross the border to the US. Actually the truth is, that this can happen everywhere as far as I understand. To be clear...
Should the Government be able to enforce security updates?
Posted
over 3 years ago
by
rhalbheer
This is actually an interesting question. A lot of governments enforce rules and regulations on how you have to run your car, how often you have to check it, in which condition you have to keep your tires etc. The same is true for a lot of other devices...
Who needs a (vulnerable) iPad if you can get an nPad?
Posted
over 3 years ago
by
rhalbheer
I actually wanted to show nPad to you as I loved it – it is a new hardware factor to what we did since years on the tablet. I like this new hardware (see below) and then read this article, showing that Apple got hit fairly hard this week by a vulnerability...
Vulnerability Disclosure to Compete?
Posted
over 3 years ago
by
rhalbheer
As you know (I stress that fairly often ), I am Swiss. The reason why I am stressing this today is that I want to give you an example on security from the Swiss market: The banks here on place compete with each other – obviously. However, I have...
Open Source and Hackers
Posted
over 3 years ago
by
rhalbheer
1
Comment
The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do...
We Need Solid and Strong Transparent Processes for the Cloud
Posted
over 3 years ago
by
rhalbheer
This morning I was reading an article called Google seeks to assure customers on cloud security practices on ComputerWeekly. I had to read this – obviously . It references a paper written by the Google Security Officer called Security Whitepaper...
Do we Need Special Laws?
Posted
over 3 years ago
by
rhalbheer
Well, yes we need Cybersecurity Legislation without doubt but sometimes the legislator goes too far in my opinion. I read this article this morning: Use Google Street View Maps & Serve More Time. I quote: The state legislature in the U.S. state of...