TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Compatability & Converters
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support by product
Exchange Server
Forefront Server
Forefront Edge Security
Forefront Server Security
Internet Explorer
Office
SharePoint
SQL Server
System Center
Windows Server
Windows XP
Windows Vista
Windows 7
Windows 8
Other support links
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Look up event IDs and error codes
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Tags
Advisory
Anti-Malware
Applications
Architecture
Associations
Behaviour
Blog
botnet
Browsing
Chief Security Advisor
Children
Cloud
Cloud Computing
Collaboration
Competition
Compliance
Consumer
cost
Crime
Critical Infrastructure
Critical Infrastructure Protection
cybercrime
Cybersecurity Agenda
Data Protection
Development Lifecycle
Ecosystem
encryption
Event
Events/Training
Family
Freedom of Speech
Fun
Gaming
Government
Hacking
Home
Identity
Identity Theft
Incident Response
Incident Sharing
Incidents
Industry
Industry Associations
Internet Explorer
Interoperability
Law Enforcement
Legislation
Lifecycle
malware
Mass Mailer
Messaging
Microsoft
Microsoft products
Mindset
Mobile
Network
NGO
Online Safety
OpenSource
Passwrods
patch management
People
Phone
Piracy
Policies
Policy
Policy Makers
politics
Privacy
Processes
Products
protection
Real Life
risk assessment
risk management
Securing My Infrastructure
Security
Security Intelligence Report
Security Updates
Social Engineering
social media
Strategy
support
TechEd EMEA
TechEd-ITForum
Technology
Teens
Terrorism
trends
Trip
Trust
Trustworthy Computing
UN
University
Updates
Vulnerabilities
Windows
Windows Phone
worm
XBOX
Browse by Tags
TechNet Blogs
»
Roger's Security Blog
»
All Tags
»
privacy
Related Posts
Blog Post:
Internet Personalization–and How I Never Looked at It…
rhalbheer
This is actually a great speech but very, very, very scary: and the scariest part is that I never looked at it that way but he is right Roger
on
15 Jun 2011
Blog Post:
iPhone saves you the trouble of reporting your working time
rhalbheer
You might know the problem if you are working in consulting: You have to fill out the report, form whom you spent your time. And then you forgot to fill in the tool and all of a sudden you have a hard time figuring out where you have been. There is a revolution: iPhone solves this problem! According...
on
20 Apr 2011
Blog Post:
How to Do an Online Background Check for Free
rhalbheer
Well, basically this title attracted my attention: How to Do an Online Background Check for Free . I had to try it with myself. So I started, following the sites and suggestions in the article: I clicked on the first link and landed on 9 Sites That Find People and Their 'Sensitive' Information – cool...
on
16 Feb 2011
Blog Post:
Fighting Crime and Protecting Privacy–a Contradiction?
rhalbheer
I was reading an article today called Does Your ISP Care About Protecting Your Privacy? . An interesting question. The ISPs in the article are even thinking of VPNing all the traffic to avoid the necessity for keeping the logs (or probably better, NATing the whole network). So it seems that the ISPs...
on
2 Feb 2011
Blog Post:
When Identity Theft and Privacy Meet
rhalbheer
It is always bad, if comics have a significant portion of truth: and then and finally hmm…. too much truth for me to cope with Roger
on
14 Oct 2010
Blog Post:
What is More Important to You? Privacy or Safety?
rhalbheer
I want to start upfront: I do not want to take a position here. I have an opinion as a person in my cultural context but I understand that this opinion is by far not the only one which is right or wrong. This morning I read this article: FBI Drive for Encryption Backdoors Is Déjà Vu for Security Experts...
on
29 Sep 2010
Blog Post:
Do We Really Want Privacy?
rhalbheer
I really love reading Kim Cameron’s Identity Weblog . Fairly often it is thought provoking… He recently wrote about his experience with the new iPhone privacy policy: Apple giving out your iPhone fingerprints and location . He was one (probably of the very few) reading the privacy policy and found the...
on
26 Aug 2010
Blog Post:
Am I Too Paranoid?
rhalbheer
Sometimes I wonder whether I am too paranoid. I just got a call, which went like that: Caller: “ Hello, we are doing a health insurance survey and have just three questions for you, would you mind to join in? Just 20 seconds. We do it for Health Insurance statistics. ” Me: Was in a very good mood “ Sure...
on
18 Aug 2010
Blog Post:
E-Mail–The Low Hanging Fruit for the Cloud?
rhalbheer
I am convinced that there are workloads that can and should be moved to the Cloud: For security reasons as well as for economical reasons. E-Mail might well be the first one of them. There is a good post on that: Editor's Note: Email, the Lowest-Hanging Fruit of the Cloud Roger
on
16 Aug 2010
Blog Post:
10 of the Top Data Breaches of the Decade
rhalbheer
You might have read that I ranted a little bit about the iPad data breach: Who needs a (vulnerable) iPad if you can get an nPad? and some people pushed back – which I can understand. So, to put it into perspective, I read this article this morning on the worst data breaches of the decade. An interesting...
on
18 Jun 2010
Blog Post:
Strong Authentication and Privacy – A Contradiction in Terms?
rhalbheer
You know that I am not a big fan of the requirement for having all Internet users authenticate strongly. There are people in the security arena who think that this is the only way to fight cybercrime – and in parallel accept that they would kill freedom of speech. I recently had a good discussion...
on
17 Mar 2010
Blog Post:
Data Protection Heat Map
rhalbheer
I was looking at some research done by Forrester which could be interesting for you as well. They try to lay out the landscape with regards to data protection for you and it looks fairly compelling. So if you are interested in the situation of the different Privacy laws across the globe and how Forrester...
on
10 Mar 2010
Blog Post:
Data Protection Day: An Interesting Study
rhalbheer
As you might know, it was time for the Data Protection Day in Europe again. Unfortunately I did not find the videos from this year’s competition yet but I guess we will find them later on the page and on YouTube. However, we released a study on Privacy which is pretty interesting. Find the summary here...
on
29 Jan 2010
Blog Post:
Un-Google Yourself: Remove your Web Content
rhalbheer
A few days ago, I blogged on Tired of Web 2.0? Kill your Online Identities – an automated way to “disappear” from Web 2.0 (actually Facebook has banned the tool since…). Today, I was reading an article called Un-Google Yourself . Trust me, I am not explicitly looking for such approaches but seem to find...
on
12 Jan 2010
Blog Post:
Tired of Web 2.0? Kill your Online Identities
rhalbheer
No, this is not a joke. If you are tired of all the discussions about Web 2.0, the privacy breaches and the related problems, you can commit Web 2.0 Suicide. There is a Web 2.0 Suicide Machine – but we warned before you do it – this process seems to work and is not reversible. There is no “undo”! Here...
on
7 Jan 2010
Blog Post:
Data Protection Day 2009
rhalbheer
In early December I blogged about the Privacy Video Competition of the Data Protection Day. Today is the day: The winners just were announced. If you want to look at the videos (they are actually pretty cool): Watch all entries: http://eskills.eun.org/web/dprotection/gallery Watch all shortlisted entries...
on
28 Jan 2009
Blog Post:
Privacy Video Competition
rhalbheer
On January 28th the European Union is holding the Data Protection Day . To prepare for that, they are holding a competition for young people from 15 to 19 to express their views about online privacy. Here is the teaser: Surf the net – Think privacy! So, please spread the word! Roger
on
12 Dec 2008
Blog Post:
Important Privacy Announcement
rhalbheer
I wanted to make you aware of a very important announcement we made earlier today. As you know, Trustworthy Computing is all about Security, Reliability and Business Practices. Our house has a fourth pillar - Privacy - which we view as extremely important, not only in terms of...
on
9 Dec 2008
Blog Post:
Security and Piracy – a Correlation?
rhalbheer
I am working on a blog post on Security and Piracy looking into the data I have available. Probably it will be ready next week but what I wanted to know: Is there anybody who did some research about this already? I would appreciate if you could let me know. I will definitely share my view on this in...
on
7 Dec 2008
Blog Post:
How to circumvent Privacy Laws
rhalbheer
As you all know, most jurisdictions allow individuals to ask for data collected by an organization (being it a company or a governmental organization). A lot of countries have Data Protection Commissioners that look into what companies and more often governments do with regards to PII (Personal Identifiable...
on
20 Aug 2008
Blog Post:
Microsoft sponsors Privacy Enhancing Technology Awards
rhalbheer
It is not really news anymore as it broke during my vacation. However, it is important from my point of view: We are a proud sponsor (and not for the first time) of the Privacy Enhancing Technology Awards, which recognizes the work of researchers in the area of Privacy Enhancing Technologies. There...
on
5 Aug 2008
Blog Post:
Sun and Apple Updates – A Sheer Nuisance!! – Part 2
rhalbheer
Quite some of you read my initial post on that – and I like the comments I got. Now, it seems that I am not the only one being angry: I quote from What Microsoft can teach Apple about software updates For the record, I think Apple is dead wrong in the way it's gone about using its iPod monopoly...
on
25 Mar 2008
Blog Post:
New Privacy-Technology enables new (private) Business Models
rhalbheer
We announced it recently: Be acquired the U-Prove technology by a company called Credentica and quite some key members of Credentica have joined us. When we announced it, my excitement was – well – limited. It was another company we bought. But when I started to look into it, I started to understand...
on
14 Mar 2008