Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Kinect Sensor For Autonomous Flight

    That’s really interesting: Impressive! Roger
  • Blog Post: How we do IT: Direct Access

    You might know that we have something we call the Microsoft IT Showcase , where our internal IT shows how they use our technology to run our environment. Now, we just published a new article, which might be interesting for you to read called Using DirectAccess to Provide Secure Access to Corporate Resources...
  • Blog Post: Live-Tweet from Analyst Event

    Wednesday and Thursday we are running an event for selected analysts in London. As you might know, I am tweeting via http://www.twitter.com/rhalbheer and I will try to do some live tweeting from the event during the event – never did this but I will try. In addition, there are some analysts we know that...
  • Blog Post: Getting Ready for TechED EMEA

    It is as so often, autumn is the time when all the big events are happening in EMEA. This week was RSA Europe (or I think still is) and next week I am looking forward to TechEd EMEA in Barcelona. So, I worked at RSA Europe on Monday and Tuesday on the two stories with went live with (the Desktop OS Vulnerability...
  • Blog Post: Would a properly managed IT have withstood Conficker?

    Before I start here: Let’s be clear that I will not say (and will never say) that if a customer was infected with Conficker he had a poorly managed network! I had a lot of discussions over the course of time about the reasons for customers being infected. We all know the attack vectors of Conficker but...
  • Blog Post: SAFECode released „Fundamental Practices for Secure Software Development”

    SAFECode just released a new paper called Fundamental Practices for Secure Software Development . This is a collaboration of different people from different companies (SAP, EMC, Symantec, Juniper, Nokia and Microsoft). As you probably know, SAFECode is a Forum to share good practices around development...
  • Blog Post: Implementing the Top 4 Defense Strategies

    The Australian Defense Signals Directorate maintains a list of the Top 35 Mitigation Strategies against targeted intrusions. This is just a reference to the top strategies: Patch Applications Patch the Operating System Minimize the use of local admin Application whitelisting … Looking at these 35 strategies...
  • Blog Post: Security Development Lifecycle – Website!

    I often talk about how we learned to engineer security into the products and the results prove that we are on the right track. One of the challenges we always have is how to help the ecosystem to improve as well. One of the ways is to communicate through our website. Not, that this is really new news...
  • Blog Post: Announcement of the MSRC Ecosystem Strategy Team Blog

    Our teams around the Microsoft Security Response Center recently launched a new blog called MSRC Ecosystem Strategy Team Blog. The blog is thought to give more insights into the work we do with the security ecosystem knowing that vulnerabilities and attacks today not "only" affect Microsoft products...
  • Blog Post: TV-Interview during IDC Security event in Belgrade

    As you have seen in my post The Fun of Travel , I was in Belgrade this week. It was the opening event for a tour by IDC in Central and Eastern Europe. IDC has a series of security events across Eastern Europe and I had the honor of having a keynote there. Usually, when I visit these kind of events, we...
  • Blog Post: Researcher at Microsoft Research wins ACM award for Privacy Protection

    I just read this article on Cryptography Expert Wins ACM Award for Advances in Protecting Privacy of Information Retrieval . This is really cool to see that research with do at Microsoft Research not "only" leads to advancements in our products but to public recognition as well. Well done Sergey! Roger
  • Blog Post: Is the “Managed Desktop” the ultimate solution?

    When I talk about the big trends, one of them is about the call of the younger generation for more flexibility. Flexibility in this context is about where you work, when you work and how you organize yourself. If you take this as a given, you have to wonder whether today’s IT is able to cope with that...
  • Blog Post: Security Updates and Exploits

    As you may know, we announced version four of the Microsoft Security Intelligence Report earlier this week. Amongst the many interesting findings is data which relates to software vulnerability exploits. I wanted to highlight these as Shoaib, one of my blog readers, contacted me recently to get my views...
  • Blog Post: The Worldwide Team is Complete

    I started with Off to See the World , where I announced that we grow the community. And then I had the pleasure to tell you the we have a new Chief Security Advisor for EMEA – Monika Josi. Now, my team is complete – at least on time zone level: It is a pleasure for me to welcome Freddy Kasprzykowski...
  • Blog Post: Moving to the Cloud: Where it worked and where I was challenged

    I am running a whole environment at home to experience our technology. However, up to now it was all “on premise”, no Cloud integration. This has to change. Therefore I was more than happy to join our internal  Hosted Exchange 14 beta program. We are offering the hosted Exchange program to Live...
  • Blog Post: Algeria: Conference on Certification (eID)

    When I tweeted last week that I am on my way to Algeria, I got quite some reactions and questions that I shall report how it was. So, let me try to briefly summarize my impressions. I was invited to speak at a conference on certification in Algiers. Well, initially I pushed back as I did not understand...
  • Blog Post: Attacks on MS08-067

    As we were pushing on our Out-of-Band release earlier this month we tried to make you understand that immediate deployment is needed as the vulnerability is high risk. Otherwise we would not have gone out of band… Interestingly enough, we have not seen widespread attacks since now. Earlier today now...
  • Blog Post: Stepto becoming a Gamer :-)

    If you are working with Microsoft and security you definitely know him – Stephen Toulouse one of the long-term people you know from Microsoft's security units. He worked within the Microsoft Security Response Center as one of our key spokespersons and later on used to be one of the key faces for Trustworthy...
  • Blog Post: Security Trends on our Malware Portal

    I recently blogged about three major announcements we made: http://blogs.technet.com/rhalbheer/archive/2007/04/25/three-microsoft-announcements.aspx On that I got some comments (public and private) and some wishes. Thank you all forthis feedback. I linked it back to the resposible perons and we will...
  • Blog Post: Windows Phone 7 Reviews

    I just got a mail that my Windows Phone 7 is ready for pick-up. Unfortunately I am in Redmond at the moment and my Windows Phone 7 is in Switzerland. The poor device will have to wait for me for another week (or is it the other way around – poor Roger has to wait for the phone another week?). In the...
  • Blog Post: Why it pays to be secure – Chapter 5 – I need tools!

    Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. So far, in the first 4 chapters, we have addressed the usual excuses for not Managing Your IT Environment...
  • Blog Post: Security Development Lifecycle Template – Your next step to “Secure Development”

    You might remember it: January 15th, 2002 Bill Gates wrote the famous memo on Trustworthy Computing to all the employees at Microsoft. This was probably one of the biggest initiatives at Microsoft and radically changed the way we develop software (and much, much more). I remember when I was the first...
  • Blog Post: Legal Challenges of International Business and the Cloud

    To start with: I am an engineer not a lawyer – and this might be part of the problem… When I started to think about the Cloud and security and thought about all the work I do with Law Enforcement and the challenges they face. Additionally, I started to think about the legal challenges we – as an industry...
  • Blog Post: Gazelle – the secure Web browser of the future?

    This is an interesting paper from Microsoft Research. Now, before you read it: This is research and be no means a commitement to develop it for IE 9. The Multi-Principal OS Construction of the Gazelle Web Browser Roger
  • Blog Post: EMC/RSA and Microsoft: Partnership Announcement

    I am more than pleased to inform you that we announced today a partnership between EMC/RSA and us . This partnership involves the integration of EMC/RSA technology into our platform. I quote from our press release: Microsoft will build the RSA® Data Loss Prevention (DLP) classification technology into...