Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Most Popular Usernames and Passwords

    No clue what the source is but if they are right, it is scary: DRG SSH Username and Password Authentication Tag Clouds Roger
  • Blog Post: Chris de Burgh: People of the World Stand Up for Freedom

    This is one of the rare more private posts on this blog and this time has nothing to do with security at all. Since ages one singer was always part of my wife’s and my live: Chris de Burgh. And even if it is uncool in our kid’s world, they love him and his songs – and it is a very good way for learning...
  • Blog Post: Hacking the Human Body

    Years ago I was sitting in a healthcare event, when a researcher was talking (very excited) about the idea of having a pacemaker with Bluetooth access to fine-tune the system and read information from the sensors. Even though this might medically be a great idea, I would be fairly reluctant having such...
  • Blog Post: Mutual Authentication in Real Life–Launching a Nuclear Missile…

    A few years ago, I wanted to run an exercise with our incident response team in Switzerland. A customer, the government and me came together to develop the goals and the scenario. One of the key question we tried to answer together with the university, which we wanted to use as observers was, whether...