Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Scam Awareness Month in the UK

    I guess you know Get Safe Online in the meantime. They are publishing a lot of good and insightful information. Now, they collaborate with the Office of Fair Trading in the UK for a Scam Awareness Month. Again, there is a log of excellent information on the web for you to look at: Get Safe Online Blog...
  • Blog Post: Testing our Security Technology

    Quite a while ago, I blogged on Virtual Labs, an offering we are making to you to get your hands dirty with our products and give you the opportunity to work with different hands-on labs. There is the VirtualLabs offering, containing MSDN and TechNet labs. The idea behind them is: It's simple: no...
  • Blog Post: RSA Europe: Are you ready for security and privacy?

    Do you remember? In January 2002, Bill Gates sent a famous mail to all the Microsoft employees and announced Trustworthy Computing . Since then it became part of our DNA. The interesting thing to me is, that the four pillars of TwC remained the same (except for pillar four, which we had to re-name)....
  • Blog Post: Privacy Video Competition

    On January 28th the European Union is holding the Data Protection Day . To prepare for that, they are holding a competition for young people from 15 to 19 to express their views about online privacy. Here is the teaser: Surf the net – Think privacy! So, please spread the word! Roger
  • Blog Post: Data Protection Day: An Interesting Study

    As you might know, it was time for the Data Protection Day in Europe again. Unfortunately I did not find the videos from this year’s competition yet but I guess we will find them later on the page and on YouTube. However, we released a study on Privacy which is pretty interesting. Find the summary here...
  • Blog Post: EMEA TwC Analyst Summit

    We are just kicking off the EMEA TwC Analyst Summit, which is running for the next two days. The first time we are using technologies like Twitter live from the event and we encourage the Analysts to do the same. Therefore, you might follow what is going on there on different channels but mainly: The...
  • Blog Post: Infosec: Security community must work together

    Ed Gibson, our CSA in the UK had an interview during Infosec with VNunet. He made some interesting statements: We have a good set of laws in place and they have teeth. But the police have priorities and budgets set by the Home Office and Any one of you here would volunteer for neighborhood watch...
  • Blog Post: IT Forum is about to begin

    It is always fascinating to see an event of this size! I actually arrived in Barcelona yesterday night and yes, you might be jealous if you see the weather. But actually I will probably not have a lot of time to enjoy it - PR filled my schedule all over :-) but that is why I am here. Here are the...
  • Blog Post: ISF Congress in Monte Carlo–let’s meet

    I will be at the ISF Congress in Monte Carlo from tomorrow on. If you are there as well and want to meet, drop me a mail It is actually the first event since a long time I am just going to participate, not to hold any speeches Roger
  • Blog Post: I was visiting Nigeria – watch out!

    You know that I rarely did trip reports in the past. I am personally convinced that you do not want to read, what I had for breakfast in Barcelona. But this trip was different. When I told the people around me that I will be travelling to Nigeria I got a lot of different reactions J . I guess that...
  • Blog Post: TechEd-IT Forum: The Keynote and Announcements

    I told you that I will keep you posted. We had some pretty exciting announcement at the keynote at IT Forum. For me, the whole area of virtualization is probably the biggest step forward. We announced that we name the official product/feature "Hyper-V", which will be integrated in some of the Windows...
  • Blog Post: Are we talking about the right things?

    I am in Qatar at the moment at the Doha Information Security Conference. They actually have a very interesting setup as they only have very short presentations (about 5-10 minutes) of approx. 2 people and from there on they are working with a panel discussion on the topic during the rest of the hour...
  • Blog Post: Live-Tweet from Analyst Event

    Wednesday and Thursday we are running an event for selected analysts in London. As you might know, I am tweeting via http://www.twitter.com/rhalbheer and I will try to do some live tweeting from the event during the event – never did this but I will try. In addition, there are some analysts we know that...
  • Blog Post: TV-Interview during IDC Security event in Belgrade

    As you have seen in my post The Fun of Travel , I was in Belgrade this week. It was the opening event for a tour by IDC in Central and Eastern Europe. IDC has a series of security events across Eastern Europe and I had the honor of having a keynote there. Usually, when I visit these kind of events, we...
  • Blog Post: Get Safe Online – This Week

    We see this concept all over Europe: There are National Security Awareness Days (or how ever they are called) in a lot of European countries. During these events, the industry (from software to banking to government to …) gets together to raise awareness on the most important trends, criminals explore...
  • Blog Post: Bluehat 2007 Fall Sessions

    I am in Redmond at the moment for internal meetings. We have been able to align these meetings with the Fall Session of Bluehat. I already blogged about the summer sessions and would like to give you some insights and views on the Fall sessions as well. To be clear, I am "just" attending the Exec Briefing...
  • Blog Post: Security Awareness Videos

    Check this out: http://www.educause.edu/content.asp?page_id=7103&bhcp=1 This is a Security Awareness Video contest and there are some cool, freaky videos. Some of them just use analogies that are interesting Roger
  • Blog Post: Scott Charney at RSA this year

    It is kind of a tradition that Scott Charney, our Corporate Vice President for Trustworthy Computing, is speaking at RSA . If you look back, he always showed the evolution of Trustworthy Computing and spoke about e.g. End to End Trust and other concepts we use to envision the future of the security ecosystem...
  • Blog Post: Get Safe Online: Don’t be a Money Mule

    You know, there are people who blog late, there are people who blog very late and then there is me… I actually missed that one even though I was triggered: Mid November there was the Get Safe Online Week 2009 in the UK. Usually they do really good stuff and this is the reason I usually blog on it. As...
  • Blog Post: Why it pays to be secure – Chapter 3 – But how do I?

    Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. Security — you hear about it every day. Being responsible for information security can be...
  • Blog Post: How Microsoft IT does Threat Analysis

    I wrote on that already earlier. We make processes and tools available how we internally do Threat Modeling. To make it clear: this has nothing to do with the Security Development Lifecycle but much more with Microsoft's own IT department. The reason for this post is that we just released version 2...
  • Blog Post: Europol High Tech Crime Experts Meeting 2008

    I recently had the great opportunity to join the Europol High Tech Crime Experts Meeting 2008 in Den Haag. This is mainly a get together of the High Tech Crime leads of the EU Law Enforcement agencies and countries where they have a close relationship with (e.g. Switzerland, Norway, Canada etc). Additionally...
  • Blog Post: Data Protection Day 2009

    In early December I blogged about the Privacy Video Competition of the Data Protection Day. Today is the day: The winners just were announced. If you want to look at the videos (they are actually pretty cool): Watch all entries: http://eskills.eun.org/web/dprotection/gallery Watch all shortlisted entries...
  • Blog Post: Cooperation against Cybercrime- Octopus Conference

    lt is time again! The Council of Europe Octopus Conference on Cooperation against Cybercrime is taking place this week. This year it is even the 10th anniversary of the Budapest Convention. Therefore a broad country of legal, law enforcement and private sector organizations are discussing the current...
  • Blog Post: My Visit to Bluehat

    This week I am staying on the Campus in Redmond for internal meetings. By accident it happened to me that our Bluehat briefings are taking place and I had a chance to attend the Executive Day this afternoon. If you want to know more about Bluehat, visit our public website at http://www.microsoft.com...