See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Chief Security Advisor
Critical Infrastructure Protection
Freedom of Speech
Securing My Infrastructure
Security Intelligence Report
Browse by Tags
Roger's Security Blog
Strong Authentication and Privacy – A Contradiction in Terms?
You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom of speech. I recently had a good discussion...
17 Mar 2010
E-Mail–The Low Hanging Fruit for the Cloud?
I am convinced that there are workloads that can and should be moved to the Cloud: For security reasons as well as for economical reasons. E-Mail might well be the first one of them. There is a good post on that: Editor's Note: Email, the Lowest-Hanging Fruit of the Cloud Roger
16 Aug 2010
Fighting Crime and Protecting Privacy–a Contradiction?
I was reading an article today called Does Your ISP Care About Protecting Your Privacy? . An interesting question. The ISPs in the article are even thinking of VPNing all the traffic to avoid the necessity for keeping the logs (or probably better, NATing the whole network). So it seems that the ISPs...
2 Feb 2011
Privacy Video Competition
On January 28th the European Union is holding the Data Protection Day . To prepare for that, they are holding a competition for young people from 15 to 19 to express their views about online privacy. Here is the teaser: Surf the net – Think privacy! So, please spread the word! Roger
12 Dec 2008
Data Protection Day: An Interesting Study
As you might know, it was time for the Data Protection Day in Europe again. Unfortunately I did not find the videos from this year’s competition yet but I guess we will find them later on the page and on YouTube. However, we released a study on Privacy which is pretty interesting. Find the summary here...
29 Jan 2010
Microsoft sponsors Privacy Enhancing Technology Awards
It is not really news anymore as it broke during my vacation. However, it is important from my point of view: We are a proud sponsor (and not for the first time) of the Privacy Enhancing Technology Awards, which recognizes the work of researchers in the area of Privacy Enhancing Technologies. There...
5 Aug 2008
Tired of Web 2.0? Kill your Online Identities
No, this is not a joke. If you are tired of all the discussions about Web 2.0, the privacy breaches and the related problems, you can commit Web 2.0 Suicide. There is a Web 2.0 Suicide Machine – but we warned before you do it – this process seems to work and is not reversible. There is no “undo”! Here...
7 Jan 2010
How to Do an Online Background Check for Free
Well, basically this title attracted my attention: How to Do an Online Background Check for Free . I had to try it with myself. So I started, following the sites and suggestions in the article: I clicked on the first link and landed on 9 Sites That Find People and Their 'Sensitive' Information – cool...
16 Feb 2011
Data Protection Heat Map
I was looking at some research done by Forrester which could be interesting for you as well. They try to lay out the landscape with regards to data protection for you and it looks fairly compelling. So if you are interested in the situation of the different Privacy laws across the globe and how Forrester...
10 Mar 2010
What is More Important to You? Privacy or Safety?
I want to start upfront: I do not want to take a position here. I have an opinion as a person in my cultural context but I understand that this opinion is by far not the only one which is right or wrong. This morning I read this article: FBI Drive for Encryption Backdoors Is Déjà Vu for Security Experts...
29 Sep 2010
How to circumvent Privacy Laws
As you all know, most jurisdictions allow individuals to ask for data collected by an organization (being it a company or a governmental organization). A lot of countries have Data Protection Commissioners that look into what companies and more often governments do with regards to PII (Personal Identifiable...
20 Aug 2008
Do We Really Want Privacy?
26 Aug 2010
Internet Personalization–and How I Never Looked at It…
This is actually a great speech but very, very, very scary: and the scariest part is that I never looked at it that way but he is right Roger
15 Jun 2011
10 of the Top Data Breaches of the Decade
You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable) iPad if you can get an nPad? and some people pushed back – which I can understand. So, to put it into perspective, I read this article this morning on the worst data breaches of the decade. An interesting...
18 Jun 2010
Am I Too Paranoid?
Sometimes I wonder whether I am too paranoid. I just got a call, which went like that: Caller: “ Hello, we are doing a health insurance survey and have just three questions for you, would you mind to join in? Just 20 seconds. We do it for Health Insurance statistics. ” Me: Was in a very good mood “ Sure...
18 Aug 2010
iPhone saves you the trouble of reporting your working time
You might know the problem if you are working in consulting: You have to fill out the report, form whom you spent your time. And then you forgot to fill in the tool and all of a sudden you have a hard time figuring out where you have been. There is a revolution: iPhone solves this problem! According...
20 Apr 2011
Sun and Apple Updates – A Sheer Nuisance!! – Part 2
Quite some of you read my initial post on that – and I like the comments I got. Now, it seems that I am not the only one being angry: I quote from What Microsoft can teach Apple about software updates For the record, I think Apple is dead wrong in the way it's gone about using its iPod monopoly...
25 Mar 2008
Important Privacy Announcement
I wanted to make you aware of a very important announcement we made earlier today. As you know, Trustworthy Computing is all about Security, Reliability and Business Practices. Our house has a fourth pillar - Privacy - which we view as extremely important, not only in terms of...
9 Dec 2008
Security and Piracy – a Correlation?
I am working on a blog post on Security and Piracy looking into the data I have available. Probably it will be ready next week but what I wanted to know: Is there anybody who did some research about this already? I would appreciate if you could let me know. I will definitely share my view on this in...
7 Dec 2008
Un-Google Yourself: Remove your Web Content
A few days ago, I blogged on Tired of Web 2.0? Kill your Online Identities – an automated way to “disappear” from Web 2.0 (actually Facebook has banned the tool since…). Today, I was reading an article called Un-Google Yourself . Trust me, I am not explicitly looking for such approaches but seem to find...
12 Jan 2010
New Privacy-Technology enables new (private) Business Models
We announced it recently: Be acquired the U-Prove technology by a company called Credentica and quite some key members of Credentica have joined us. When we announced it, my excitement was – well – limited. It was another company we bought. But when I started to look into it, I started to understand...
14 Mar 2008
When Identity Theft and Privacy Meet
It is always bad, if comics have a significant portion of truth: and then and finally hmm…. too much truth for me to cope with Roger
14 Oct 2010
Data Protection Day 2009
In early December I blogged about the Privacy Video Competition of the Data Protection Day. Today is the day: The winners just were announced. If you want to look at the videos (they are actually pretty cool): Watch all entries: http://eskills.eun.org/web/dprotection/gallery Watch all shortlisted entries...
28 Jan 2009
© 2015 Microsoft Corporation.
Privacy & Cookies