TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Internet Explorer
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Lync
See all products »
Resources
Curah! curation service
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Subscriptions
TechNet Video
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Microsoft Update
Trials
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Related Sites
Microsoft Download Center
TechNet Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
e-Learning overview
Certifications
Certification overview
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Other resources
TechNet Events
Second shot for certification
Born To Learn blog
Find technical communities in your area
Support options
For small and midsize businesses
For enterprises
For developers
For IT professionals
From partners
For technical support
Support offerings
For home users
More support
Microsoft Premier Online
Microsoft Fix It Center
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Tags
Advisory
Anti-Malware
Applications
Architecture
Associations
Behaviour
Blog
botnet
Browsing
Chief Security Advisor
Children
Cloud
Cloud Computing
Collaboration
Competition
Compliance
Consumer
cost
Crime
Critical Infrastructure
Critical Infrastructure Protection
cybercrime
Cybersecurity Agenda
Data Protection
Development Lifecycle
Ecosystem
encryption
Event
Events/Training
Family
Freedom of Speech
Fun
Gaming
Government
Hacking
Home
Identity
Identity Theft
Incident Response
Incident Sharing
Incidents
Industry
Industry Associations
Internet Explorer
Interoperability
Law Enforcement
Legislation
Lifecycle
malware
Mass Mailer
Messaging
Microsoft
Microsoft products
Mindset
Mobile
Network
NGO
Online Safety
OpenSource
Passwrods
patch management
People
Phone
Piracy
Policies
Policy
Policy Makers
politics
Privacy
Processes
Products
protection
Real Life
risk assessment
risk management
Securing My Infrastructure
Security
Security Intelligence Report
Security Updates
Social Engineering
social media
Strategy
support
TechEd EMEA
TechEd-ITForum
Technology
Teens
Terrorism
trends
Trip
Trust
Trustworthy Computing
UN
University
Updates
Vulnerabilities
Windows
Windows Phone
worm
XBOX
Browse by Tags
TechNet Blogs
»
Roger's Security Blog
»
All Tags
»
trends
Related Posts
Blog Post:
Security Trends on our Malware Portal
rhalbheer
I recently blogged about three major announcements we made: http://blogs.technet.com/rhalbheer/archive/2007/04/25/three-microsoft-announcements.aspx On that I got some comments (public and private) and some wishes. Thank you all forthis feedback. I linked it back to the resposible perons and we will...
on
1 Jun 2007
Blog Post:
Virtual Keynotes – Do we always have to travel?
rhalbheer
The week before the last one, it happened to me – like it happened to thousand of other travelers all across the globe: I got stranded. Luckily for me I should have been flying out from home rather than flying home and being “stuck” home is much easier to handle :-) At least for me. I was actually to...
on
4 May 2010
Blog Post:
8 Dirty Secrets Of The Security Industry
rhalbheer
I just read this article called 8 Dirty Secrets Of The Security Industry , which seems pretty nasty. Let's briefly have a look at them: Vendors do not need to be ahead of the hackers; they only need to be ahead of the buyer : Wow, this is a bad statement – but how true is it? It might be true....
on
4 May 2008
Blog Post:
Analysis of the cyber-capabilities of AlQaeda
rhalbheer
I blogged already several times about Cyber-Terrorism. I think it is important to try to keep the pulse of these developments and to understand what the terrorists are capable of doing. There is an article about a recent event, where somebody tried to gain information about certain devices that ware...
on
1 Oct 2007
Blog Post:
Gazelle – the secure Web browser of the future?
rhalbheer
This is an interesting paper from Microsoft Research. Now, before you read it: This is research and be no means a commitement to develop it for IE 9. The Multi-Principal OS Construction of the Gazelle Web Browser Roger
on
20 Feb 2009
Blog Post:
You thought Worms are gone? Think again!
rhalbheer
I am one of the security guys saying that the likelihood for us seeing events like Blaster or Slammer again is very, very low (this shall not be a "call to action" for the criminals…). I think that the measures the whole industry took as well as the increased awareness with the consumer made it very...
on
5 Jan 2008
Blog Post:
The Future of the Internet in 2020
rhalbheer
This is a pretty interesting survey: Future of the Internet III: How the Experts See It Here are the key findings: The mobile device will be the primary connection tool to the internet for most people in the world in 2020. The transparency of people and organizations will increase, but that will not...
on
25 Aug 2009
Blog Post:
Security Threats in 2008
rhalbheer
Well, slowly the year is coming to an end – 10% to go J . This is the time where everybody is looking back and – additionally – tries to look into the Crystal Ball to understand how 2008 could be. Interestingly enough, I just had the discussion about the trends for 2008 this morning with a friend...
on
26 Nov 2007
Blog Post:
Ray Ozzie’s Blog is Back
rhalbheer
As I am still oof, another short one: Ray Ozzie’s blog is back: http://ozzie.net/ Ray is definitely one of the driving persons behind our overall vision and architecture. So, it is worth keeping him on your RSS feed. Roger
on
17 Oct 2010
Blog Post:
Consumer Trust in e-Business
rhalbheer
If the light of the latest outreach we did around scam ( Lottery Scam – The voice of the victim ), Research firm Ipsos was retained to conduct research with consumers in Germany, Italy, Denmark, UK and The Netherlands. About 3'500 users were contacted and here are some of the highlights (well, lowlights...
on
21 Dec 2007
Blog Post:
Insider Threat of Cloud Computing
rhalbheer
Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real threat . David Linthicum (the author) claimed that if you are looking at the hackers attacking “your” cloud from the outside, you are missing the real problem as the insider threat is still bigger. When...
on
11 Mar 2010
Blog Post:
Attacks on your Reputation
rhalbheer
There is definitely some risk in reputation-based systems: The Threat of Reputation-Based Attacks on Securityfix from Washington Post Roger
on
19 Sep 2007
Blog Post:
Do we have to move away from SHA-1 immediately
rhalbheer
Sometimes it is interesting how certain themes keep popping up again and again. But let's start at the beginning: For example in the field of public key cryptography we make use of so-called hash functions. A hash function is a function which turns data into a number of limited size. For example SHA...
on
28 Jan 2007
Blog Post:
Important Privacy Announcement
rhalbheer
I wanted to make you aware of a very important announcement we made earlier today. As you know, Trustworthy Computing is all about Security, Reliability and Business Practices. Our house has a fourth pillar - Privacy - which we view as extremely important, not only in terms of...
on
9 Dec 2008
Blog Post:
Are you ready for your users of the (near) future?
rhalbheer
Yankee Group Study Actually near future might be wrong: I am convinced that the future (with regards to the requirements) is already here. We sponsored a study with Yankee Group with the title Anywhere Access Technologies - Open Enterprise Networks . I read through it and tried to analyze the key findings...
on
20 Nov 2007
Blog Post:
0-Day-Patch – An new Metric for Security?
rhalbheer
The Federal Institute of Technology in Zurich released a study at Blackhat, which is definitely worth looking into. Now, let's be serious: They looked at a metric they call 0-Day-Patch being the number of patches a vendor is able to release at the day of the public disclosure of a new vulnerability...
on
18 Apr 2008
Blog Post:
YOUR FEEDBACK REQUESTED
rhalbheer
I am in the position of the Chief Security Advisor in Europe, Middle East and Africa since February 1 st . Since then I am blogging here (before that I ran together with Urs the Swiss Security Blog). The hits per post rose over the first 6-7 months but now started to slowly drop. However, looking at...
on
30 Nov 2007
Blog Post:
H1 OS Desktop Vulnerability Report – Get It Now
rhalbheer
You might know Jeff Jones' work on the different vulnerability reports comparing different products and vendors. Our goal is to understand and measure our progress and see where we stand with regards to the industry. Today, Jeff release his OS Desktop vulnerability report for H1 2008, which shows...
on
27 Oct 2008
Blog Post:
Steve Ballmer on next revolution in computing
rhalbheer
Over the next time (actually starting at RSA) you will hear more from us how we see the future of security. You should watch out for Craig Mundie's keynote there. But last Monday Steve Ballmer had a speech at the CeBIT in Germany on the next revolution in computing. You will find a summary of this...
on
6 Mar 2008
Blog Post:
Microsoft is winning the NAC war
rhalbheer
I just read an interesting chat with Joel Snyder from Opus One who did Interop testing on the different NAC solutions. I think he makes some statements which are worth to read (from my perspective anyway J ): He also says that those who are anti-NAC simply don't understand the technology. What we...
on
8 May 2008
Blog Post:
Open Source and Hackers
rhalbheer
The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do not really believe in the value of such debate. ...
on
9 Jun 2010
Blog Post:
Where next? – Watch out for RSA
rhalbheer
We are six years into Trustworthy Computing (TwC). When we launched it, we said a number of things: "It is a 10-year vision". Well, that's something we have had to update. As long as there are criminals out there using the Internet to steal, Trustworthy Computing will be around. "It is an industry...
on
3 Apr 2008
Blog Post:
Not About Security but Cool – Search based on Silverlight
rhalbheer
This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to blog post about that. I found that today: an absolutely cool new search engine based on our latest development called Silverlight. Simply have a look at it and give it a try. It is definitely worth it...
on
22 Aug 2007
Blog Post:
Security Progress at Microsoft (Interview with Scott)
rhalbheer
I just stumbled across this interview with Scott Charney (Corporate Vice President Trustworthy Computing) which is very interesting to read: Q&A: Microsoft no longer a 'laughingstock' of security, Charney says Roger
on
21 Sep 2007
Blog Post:
Terrorism and the Internet
rhalbheer
Since a long time (at least 9/11) there is a lot of discussion about the way terrorists use/will use the Internet, It is clear that the Internet is used for publicity and communication. There are experts saying that the Internet itself will not be a target for an attack for terrorists because of this...
on
26 Jan 2007
<
>