Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Dependant on the Internet? Not me!

    I was reading this article this morning Internet failure hits two continents and was thinking about my dependence on the Internet. Well, outch: I am used to get the information I need everywhere! Always! Now! And I am used that the Internet is just here. Always! Might be that it is a little slower one...
  • Blog Post: Some Thoughts on Today’s Bulletins

    As always: It is the second Tuesday of the months and we released the Security Updates. However, this month is special from one perspective: We released an update for the DNS resolver, which is released simultaneously by a lot of DNS vendors with the same vulnerability. Here are some technical details...
  • Blog Post: Patch Management, a key step towards compliance!

    As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance – honestly, I actually played with our latest technology . I wrote about Deploying PKI Time Sync on Virtual DCs Now, a necessary and very important next step towards...
  • Blog Post: Are you ready for your users of the (near) future?

    Yankee Group Study Actually near future might be wrong: I am convinced that the future (with regards to the requirements) is already here. We sponsored a study with Yankee Group with the title Anywhere Access Technologies - Open Enterprise Networks . I read through it and tried to analyze the key findings...
  • Blog Post: Bug Hidden for more than 25 Years

    Wow, this was impressive: A Swiss Developer posted on Saturday a blog that he found a bug which remained hidden for more than 25 years: When seekdir() Won't Seek to the Right Position . BTW: It is in BSD, where the code is available to everyone and as I am told on most of the panels I am sitting in...
  • Blog Post: UNHCR and Microsoft to help refugees

    No, this is not yet another announcement – this is a picture of today’s reality. UNHCR just published a website called Protecting and Empowering Refugees , where the results of the partnership between the UNHCR and Microsoft is shown in a pretty impressive way. On the one hand side it is all about using...
  • Blog Post: Building a faster Internet

    Does not solve any of the security problems (challenges?) but it sounds promising anyway Building A Faster Internet Roger
  • Blog Post: Monitoring – a Key Activity to a Trustworthy Infrastructure?

    As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance. I wrote about Deploying PKI Time Sync on Virtual DCs Patch Management, a key step towards compliance! Especially the Time Sync post was more about...
  • Blog Post: Why it pays to be secure – Chapter 3 – But how do I?

    Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. Security — you hear about it every day. Being responsible for information security can be...
  • Blog Post: Open Source and Hackers

    The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do not really believe in the value of such debate. ...
  • Blog Post: Network Access Protection Client for Mac and Linux

    This is very exciting news: Unet , one of our NAP partners now delivers a NAP Client for Mac and Linux . Here are some very cool screenshots from their website: This is the Windows Client : Here for Mac : And finally for Linux : If you are running mixed environments, you should look into Roger
  • Blog Post: Anti-Phishing-Training

    Wow! Ever thought that you are a phishing-expert? Ever tried to train your users? Carnegie Mellon University developed a game which trains you or tests your knowledge (where ever you are). I like it: http://cups.cs.cmu.edu/antiphishing_phil/ Roger
  • Blog Post: Not About Security but Cool – Search based on Silverlight

    This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to blog post about that. I found that today: an absolutely cool new search engine based on our latest development called Silverlight. Simply have a look at it and give it a try. It is definitely worth it...
  • Blog Post: Security Risks of Virtualization

    One fact strikes me pretty often: Companies have the problem that they have legacy software running on legacy operating systems (e.g. NT4) running on legacy hardware. This is a severe problem as you all know. Now, these companies look into virtualization so solve this problem. From all the three "legacy...
  • Blog Post: Have a look at Server and Domain Isolation

    I am often talking about different zones in the network and how you can create them. There is no a demo kit available for you to download and "play" with it: Server and Domain Isolation Demo Roger
  • Blog Post: Azure Showcase: The Eye on Earth

    Well, you know, fairly often when I look at showcases I am a little bit disappointed I have to admit. Mainly because the technology which is shown is really cool and I would love to leverage it – just it works in the US only. Or better, it works across the globe but the data which is available is fairly...
  • Blog Post: Monitoring the Blog Hits – Live in Silverlight!

    If you are running a blog, you might most probably use one of the websites which show where your user come from – no? Like Clustrmaps , which I used for a few years. Then I found a new one, which I like much more as it gives me more information. If is called WorldMaps and the best thing is, it is based...