TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Options
About
Email Blog Author
RSS for posts
Atom
RSS for comments
OK
Search Blogs
Tags
Cloud
Cloud Computing
Competition
Consumer
Crime
Critical Infrastructure Protection
cybercrime
Events/Training
Fun
Incident Response
Incidents
Industry Associations
Law Enforcement
Microsoft
Microsoft products
patch management
Policies
Policy
politics
Privacy
Processes
Security
Technology
Terrorism
trends
Archive
Archives
August 2013
(3)
June 2013
(4)
May 2013
(3)
April 2013
(2)
March 2013
(1)
February 2013
(2)
January 2013
(5)
December 2012
(1)
November 2012
(1)
October 2012
(4)
September 2012
(4)
August 2012
(4)
July 2012
(1)
June 2012
(3)
May 2012
(2)
April 2012
(9)
March 2012
(2)
February 2012
(2)
January 2012
(1)
December 2011
(3)
November 2011
(6)
October 2011
(11)
September 2011
(8)
August 2011
(3)
July 2011
(4)
June 2011
(8)
May 2011
(7)
April 2011
(7)
March 2011
(13)
February 2011
(18)
January 2011
(15)
December 2010
(6)
November 2010
(15)
October 2010
(15)
September 2010
(32)
August 2010
(10)
July 2010
(14)
June 2010
(18)
May 2010
(8)
April 2010
(6)
March 2010
(22)
February 2010
(5)
January 2010
(12)
December 2009
(8)
November 2009
(7)
October 2009
(11)
September 2009
(17)
August 2009
(12)
July 2009
(12)
June 2009
(13)
May 2009
(14)
April 2009
(16)
March 2009
(11)
February 2009
(12)
January 2009
(14)
December 2008
(22)
November 2008
(13)
October 2008
(22)
September 2008
(8)
August 2008
(14)
July 2008
(4)
June 2008
(16)
May 2008
(30)
April 2008
(29)
March 2008
(19)
February 2008
(16)
January 2008
(26)
December 2007
(18)
November 2007
(23)
October 2007
(11)
September 2007
(10)
August 2007
(7)
July 2007
(11)
June 2007
(11)
May 2007
(4)
April 2007
(9)
March 2007
(8)
February 2007
(8)
January 2007
(6)
July, 2010
TechNet Blogs
»
Roger's Security Blog
»
July, 2010
Sort by:
Most Recent
|
Most Views
|
Most Comments
Excerpt View
|
Full Post View
Microsoft and Adobe: Collaboration Against Threats
Posted
over 3 years ago
by
rhalbheer
You know my opinion on collaboration between countries, on public-private-partnerships as well as on collaboration between companies. Since quite a while we run a program called MAPP – the Microsoft Active Protections Program , where we share...
How to Deal With Vulnerabilities
Posted
over 3 years ago
by
rhalbheer
This is always a fairly emotional theme. What is better to protect the ecosystem? Public or private disclosure? Should somebody paying for vulnerabilities or not? Is a vulnerability auction ethical or not? I know that there are numerous views on that...
Chief Security Advisor in Sweden: Magnus is back
Posted
over 3 years ago
by
rhalbheer
After my overall announcement that we grow the community in Off to See the World , and Stuart Aston joining as the CSA in the UK, it is a great pleasure to see Magnus Lindkvist coming back. Magnus was the CSA in Sweden a few years back and accepted the...
A new Chief Security Advisor in the UK
Posted
over 3 years ago
by
rhalbheer
As you have seen in my post Off to see the World , we are hiring Chief Security Advisors all over the place. The first one was announced last week: Stuart Aston was announced to take over the Chief Security Advisor in the UK. Have a good start! Roger
Secunia: Apple makes the most vulnerable software in the market today
Posted
over 3 years ago
by
rhalbheer
1
Comment
And everybody tells me how secure they are….. So,according to this article Secunia: Apple makes the most vulnerable software in the market today, apple hast most vulns, then Oracle and then us (and then the rest). And you know, the interesting thing is...
Doing the right thing on ID management isn't enough...
Posted
over 3 years ago
by
rhalbheer
Even though it might be obvious, compliance is not only about protecting data but identities as well – and more. Jon Collins, Freeform Dynamics, whom I value high, wrote a good article: Doing the right thing on ID management isn't enough... – you should...
US Cybersecurity Research!
Posted
over 3 years ago
by
rhalbheer
The Department of Homeland Security published a report on A Roadmap for Cybersecurity Research , I was definitely impressed! All the themes, which are important to me are in their list : Scalable trustworthy systems (including system architectures and...
Blocking Social Networks? Think Again…
Posted
over 3 years ago
by
rhalbheer
You know that I am not a big fan of blocking social networks within enterprises for different reasons. I just read an article on this subject based on a study by Trend Micro. One of the conclusions in the article is: Trying to just prevent users accessing...
Support for Windows XP SP2 ends today!
Posted
over 3 years ago
by
rhalbheer
I just wanted to remind you: The support for Windows XP SP2 ends today. I hope that this does not catch you by surprise. If you need all the information about which kind of support ends when for which product, please consult out Lifecycle page. If you...
Off to See the World
Posted
over 3 years ago
by
rhalbheer
1
Comment
If you follow my blog you saw recently that there are two themes constantly popping up: One is everything about a government’s Cybersecurity Agenda (or the lack thereof) and the second one is the Cloud. Let me briefly line them out: When I talk to governments...
Make Your Influence Positive–Great TV Commercial
Posted
over 3 years ago
by
rhalbheer
It really made me think… Roger
Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud
Posted
over 3 years ago
by
rhalbheer
July 1st, Scott Charney, Corporate Vice President Trustworthy Computing was testifying at a hearing of the House Committee on Oversight and Government Reform. Basically the hearing was on the benefits and risk of Cloud adoption for the US government....
Microsoft By Numbers
Posted
over 3 years ago
by
rhalbheer
If you have not seen these numbers, they are very impressive: Microsoft by the numbers . One of the most impressive figure in there is that we sold 150,000,000 Windows 7 licenses since the launch. Well, this figure by itself does not really impress you...
Attacks on the Windows Help and Support Center Vulnerability (CVE-2010-1885)
Posted
over 3 years ago
by
rhalbheer
I blogged about the vulnerability which was publically disclosed by a researcher working for Google earlier this month . In the meantime the attacks started to increase. I think that it would be important for you to look at what is going on. There is...