Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Strong Authentication and Privacy – A Contradiction in Terms?

    You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom of speech. I recently had a good discussion...
  • Blog Post: E-Mail–The Low Hanging Fruit for the Cloud?

    I am convinced that there are workloads that can and should be moved to the Cloud: For security reasons as well as for economical reasons. E-Mail might well be the first one of them. There is a good post on that: Editor's Note: Email, the Lowest-Hanging Fruit of the Cloud Roger
  • Blog Post: Fighting Crime and Protecting Privacy–a Contradiction?

    I was reading an article today called Does Your ISP Care About Protecting Your Privacy? . An interesting question. The ISPs in the article are even thinking of VPNing all the traffic to avoid the necessity for keeping the logs (or probably better, NATing the whole network). So it seems that the ISPs...
  • Blog Post: Privacy Video Competition

    On January 28th the European Union is holding the Data Protection Day . To prepare for that, they are holding a competition for young people from 15 to 19 to express their views about online privacy. Here is the teaser: Surf the net – Think privacy! So, please spread the word! Roger
  • Blog Post: Data Protection Day: An Interesting Study

    As you might know, it was time for the Data Protection Day in Europe again. Unfortunately I did not find the videos from this year’s competition yet but I guess we will find them later on the page and on YouTube. However, we released a study on Privacy which is pretty interesting. Find the summary here...
  • Blog Post: Microsoft sponsors Privacy Enhancing Technology Awards

    It is not really news anymore as it broke during my vacation. However, it is important from my point of view: We are a proud sponsor (and not for the first time) of the Privacy Enhancing Technology Awards, which recognizes the work of researchers in the area of Privacy Enhancing Technologies. There...
  • Blog Post: Tired of Web 2.0? Kill your Online Identities

    No, this is not a joke. If you are tired of all the discussions about Web 2.0, the privacy breaches and the related problems, you can commit Web 2.0 Suicide. There is a Web 2.0 Suicide Machine – but we warned before you do it – this process seems to work and is not reversible. There is no “undo”! Here...
  • Blog Post: How to Do an Online Background Check for Free

    Well, basically this title attracted my attention: How to Do an Online Background Check for Free . I had to try it with myself. So I started, following the sites and suggestions in the article: I clicked on the first link and landed on 9 Sites That Find People and Their 'Sensitive' Information – cool...
  • Blog Post: Data Protection Heat Map

    I was looking at some research done by Forrester which could be interesting for you as well. They try to lay out the landscape with regards to data protection for you and it looks fairly compelling. So if you are interested in the situation of the different Privacy laws across the globe and how Forrester...
  • Blog Post: What is More Important to You? Privacy or Safety?

    I want to start upfront: I do not want to take a position here. I have an opinion as a person in my cultural context but I understand that this opinion is by far not the only one which is right or wrong. This morning I read this article: FBI Drive for Encryption Backdoors Is Déjà Vu for Security Experts...
  • Blog Post: How to circumvent Privacy Laws

    As you all know, most jurisdictions allow individuals to ask for data collected by an organization (being it a company or a governmental organization). A lot of countries have Data Protection Commissioners that look into what companies and more often governments do with regards to PII (Personal Identifiable...
  • Blog Post: Do We Really Want Privacy?

    I really love reading Kim Cameron’s Identity Weblog . Fairly often it is thought provoking… He recently wrote about his experience with the new iPhone privacy policy: Apple giving out your iPhone fingerprints and location . He was one (probably of the very few) reading the privacy policy and found the...
  • Blog Post: Internet Personalization–and How I Never Looked at It…

    This is actually a great speech but very, very, very scary: and the scariest part is that I never looked at it that way but he is right Roger
  • Blog Post: 10 of the Top Data Breaches of the Decade

    You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable) iPad if you can get an nPad? and some people pushed back – which I can understand. So, to put it into perspective, I read this article this morning on the worst data breaches of the decade. An interesting...
  • Blog Post: Am I Too Paranoid?

    Sometimes I wonder whether I am too paranoid. I just got a call, which went like that: Caller: “ Hello, we are doing a health insurance survey and have just three questions for you, would you mind to join in? Just 20 seconds. We do it for Health Insurance statistics. ” Me: Was in a very good mood “ Sure...
  • Blog Post: iPhone saves you the trouble of reporting your working time

    You might know the problem if you are working in consulting: You have to fill out the report, form whom you spent your time. And then you forgot to fill in the tool and all of a sudden you have a hard time figuring out where you have been. There is a revolution: iPhone solves this problem! According...
  • Blog Post: Sun and Apple Updates – A Sheer Nuisance!! – Part 2

    Quite some of you read my initial post on that – and I like the comments I got. Now, it seems that I am not the only one being angry: I quote from What Microsoft can teach Apple about software updates For the record, I think Apple is dead wrong in the way it's gone about using its iPod monopoly...
  • Blog Post: Important Privacy Announcement

    I  wanted to make you aware of a very important announcement we made earlier today. As you know, Trustworthy Computing is all about Security,  Reliability and Business Practices. Our house has a fourth pillar -  Privacy - which we view as extremely  important, not only in terms of...
  • Blog Post: Security and Piracy – a Correlation?

    I am working on a blog post on Security and Piracy looking into the data I have available. Probably it will be ready next week but what I wanted to know: Is there anybody who did some research about this already? I would appreciate if you could let me know. I will definitely share my view on this in...
  • Blog Post: Un-Google Yourself: Remove your Web Content

    A few days ago, I blogged on Tired of Web 2.0? Kill your Online Identities – an automated way to “disappear” from Web 2.0 (actually Facebook has banned the tool since…). Today, I was reading an article called Un-Google Yourself . Trust me, I am not explicitly looking for such approaches but seem to find...
  • Blog Post: New Privacy-Technology enables new (private) Business Models

    We announced it recently: Be acquired the U-Prove technology by a company called Credentica and quite some key members of Credentica have joined us. When we announced it, my excitement was – well – limited. It was another company we bought. But when I started to look into it, I started to understand...
  • Blog Post: When Identity Theft and Privacy Meet

    It is always bad, if comics have a significant portion of truth: and then and finally hmm…. too much truth for me to cope with Roger
  • Blog Post: Data Protection Day 2009

    In early December I blogged about the Privacy Video Competition of the Data Protection Day. Today is the day: The winners just were announced. If you want to look at the videos (they are actually pretty cool): Watch all entries: http://eskills.eun.org/web/dprotection/gallery Watch all shortlisted entries...