Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

June, 2010

  • Notebook searches at a country border

    I guess you still know the discussions a while ago where it was made public that notebooks can be searched without suspicion when you cross the border to the US. Actually the truth is, that this can happen everywhere as far as I understand. To be clear...
  • The Growth of the Tablet Market

    You know that we have Tablet PCs since Windows XP and I think I did not have many PCs at Microsoft which were not tablets. How often do I use them as a tablet? Not too often but when I am in a customer meeting and do not use my notebook to present, I...
  • Is a Copier Your Biggest Security Risk?

    Probably not. However, it indefinitely is a security risk. We are talking about this since a looooooong time as such copiers are sold since 2002. I just recently heard that the criminals are looking into this heavily and now it is even discussed publically...
  • Mature your IT and then move to the Cloud

    Today, I had the opportunity to talk to a group of partners on Cloud and security. The goal was to make them ready for the Cloud and make them ready to answer the customer’s questions. One block – obviously – was about security and as I look at it (and...
  • Open Source and Hackers

    The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do...
  • Vulnerability Disclosure to Compete?

    As you know (I stress that fairly often ), I am Swiss. The reason why I am stressing this today is that I want to give you an example on security from the Swiss market: The banks here on place compete with each other – obviously. However, I have...
  • Who needs a (vulnerable) iPad if you can get an nPad?

    I actually wanted to show nPad to you as I loved it – it is a new hardware factor to what we did since years on the tablet. I like this new hardware (see below) and then read this article, showing that Apple got hit fairly hard this week by a vulnerability...
  • Should the Government be able to enforce security updates?

    This is actually an interesting question. A lot of governments enforce rules and regulations on how you have to run your car, how often you have to check it, in which condition you have to keep your tires etc. The same is true for a lot of other devices...
  • The Importance of International Collaboration–Even in Exercises

    One of the biggest challenges in Critical Infrastructure Protection or Incident Response is collaboration. Collaboration between the public and the private sector as the private sector is most often running the critical infrastructure; collaboration between...
  • Lies, Damned Lies and the “Gone Google” Calculator

    An interesting post (by a Microsoft employee) on the Google cost calculator. An interesting read on the way they compete…. Lies, Damned Lies and the “Gone Google” Calculator Roger
  • End of Support for Windows 2000 and Windows XP SP2

    I just want to make you aware the Windows 2000 and Windows XP SP2 are going out of support. There are a few good blog post you should look at: End of Support for Windows XP SP2 and Windows Vista (with no service packs installed) End of support for Windows...
  • 10 of the Top Data Breaches of the Decade

    You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable) iPad if you can get an nPad? and some people pushed back – which I can understand. So, to put it into perspective, I read this article this morning on...
  • Apple Marketing

    Roger
  • Raid against Piracy

    There seem to be policy organizations being serious about fighting piracy! Hungary, actually with 41% pirated software “not even that bad”, seems to be really serious. But before, let me just take those 41% up for a second: This means that 41% of the...
  • What Teens Do Online

    From time to time I do speeches to parents here in the community with regards to online safety for the kids and the teens. Being a parent as well, I have a natural interest in this theme, knowing that I probably have better insights in some of the challenges...
  • Do we Need Special Laws?

    Well, yes we need Cybersecurity Legislation without doubt but sometimes the legislator goes too far in my opinion. I read this article this morning: Use Google Street View Maps & Serve More Time. I quote: The state legislature in the U.S. state of...
  • We Need Solid and Strong Transparent Processes for the Cloud

    This morning I was reading an article called Google seeks to assure customers on cloud security practices on ComputerWeekly. I had to read this – obviously . It references a paper written by the Google Security Officer called Security Whitepaper...
  • Why Google Won’t Beat Microsoft on Cloud Collaboration

    Well, it is not me saying that, it is actually Clint Boulton , eWeek. He published an article on 10 Reasons Why Google Won't Beat Microsoft in Cloud Collaboration and they are: Microsoft Is Big, Getting Bigger Local Still Preferable? Microsoft Now Lives...