Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

April, 2012

  • Windows Defender Offline

    A few days ago, Windows Defender Offline was released. This is basically the tool to use, if you are unable to remove malware from a running PC. To quote the website: Sometimes, malicious and other potentially unwanted software, including rootkits, try...
  • Consumerization of IT–How to address this

    Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer organizations. When I talk to customers, there are typically different reactions, once we bring this up. Some tell us, that it is not part of their strategy; some...
  • Build your own sniffing kit

    When people look at attackers, they always think that they are extremely smart people. There are really smart people building the kits but the ones applying it? Well, you just need the right guidance: Hacker's Tiny Spy Computer Cracks Corporate Networks...
  • 5 Common Types of Security Professionals

    I am following Shoaib’s blog since quite a while – actually due to the beauty of the Internet, we only met virtually so far . He just posted on his blog: 5 Common Types of Security Professionals I really like this post. The way he categorizes them is...
  • Q1 Software Vulnerabilities

    This was an interesting article on cio.com: Apple, Oracle, Google Lead Major Vendors with Software Vulnerabilities in Q1, Security Report Says – by TrendMicro. Now, these stats are always a bit a challenge: They make a really good headline but if the...
  • Run your company like a burrito?

    This has nothing to do with security nor with technology – but it is worth (in my opinion) 20 minutes of your time! Recently a friend of mine told me to read Good to Great: Why Some Companies Make the Leap...And Others Don't by Jim Collins. Well, I said...
  • Keep all your software updated and current

    I know that I keep going and going on that. When I talk to customers and mainly to providers of the critical infrastructure about security, one of the key things to me is to keep the software updated. It is about patching and it is about staying on the...
  • Selecting the right Cloud partner

    One of the challenges customers always have is, how to select the right cloud partner and fairly often security drives this selection. The Cloud Security Alliance published the Cloud Controls Matrix quite a while ago and in addition a Consensus Assessments...
  • Cybersecurity–Do we need to change the approach?

    Years ago information security or cybersecurity was in the hands of specialists, which set the rules and the users had to follow – in theory. Whether the users really followed the rules, policies and recommendations is a different story but it worked...