Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Security Trends on our Malware Portal

    I recently blogged about three major announcements we made: http://blogs.technet.com/rhalbheer/archive/2007/04/25/three-microsoft-announcements.aspx On that I got some comments (public and private) and some wishes. Thank you all forthis feedback. I linked it back to the resposible perons and we will...
  • Blog Post: Virtual Keynotes – Do we always have to travel?

    The week before the last one, it happened to me – like it happened to thousand of other travelers all across the globe: I got stranded. Luckily for me I should have been flying out from home rather than flying home and being “stuck” home is much easier to handle :-) At least for me. I was actually to...
  • Blog Post: 8 Dirty Secrets Of The Security Industry

    I just read this article called 8 Dirty Secrets Of The Security Industry , which seems pretty nasty. Let's briefly have a look at them: Vendors do not need to be ahead of the hackers; they only need to be ahead of the buyer : Wow, this is a bad statement – but how true is it? It might be true....
  • Blog Post: Analysis of the cyber-capabilities of AlQaeda

    I blogged already several times about Cyber-Terrorism. I think it is important to try to keep the pulse of these developments and to understand what the terrorists are capable of doing. There is an article about a recent event, where somebody tried to gain information about certain devices that ware...
  • Blog Post: Gazelle – the secure Web browser of the future?

    This is an interesting paper from Microsoft Research. Now, before you read it: This is research and be no means a commitement to develop it for IE 9. The Multi-Principal OS Construction of the Gazelle Web Browser Roger
  • Blog Post: You thought Worms are gone? Think again!

    I am one of the security guys saying that the likelihood for us seeing events like Blaster or Slammer again is very, very low (this shall not be a "call to action" for the criminals…). I think that the measures the whole industry took as well as the increased awareness with the consumer made it very...
  • Blog Post: The Future of the Internet in 2020

    This is a pretty interesting survey: Future of the Internet III: How the Experts See It Here are the key findings: The mobile device will be the primary connection tool to the internet for most people in the world in 2020. The transparency of people and organizations will increase, but that will not...
  • Blog Post: Security Threats in 2008

    Well, slowly the year is coming to an end – 10% to go J . This is the time where everybody is looking back and – additionally – tries to look into the Crystal Ball to understand how 2008 could be. Interestingly enough, I just had the discussion about the trends for 2008 this morning with a friend...
  • Blog Post: Ray Ozzie’s Blog is Back

    As I am still oof, another short one: Ray Ozzie’s blog is back: http://ozzie.net/ Ray is definitely one of the driving persons behind our overall vision and architecture. So, it is worth keeping him on your RSS feed. Roger
  • Blog Post: Consumer Trust in e-Business

    If the light of the latest outreach we did around scam ( Lottery Scam – The voice of the victim ), Research firm Ipsos was retained to conduct research with consumers in Germany, Italy, Denmark, UK and The Netherlands. About 3'500 users were contacted and here are some of the highlights (well, lowlights...
  • Blog Post: Insider Threat of Cloud Computing

    Tonight I got this article forwarded to me: Afraid of outside cloud attacks? You're missing the real threat . David Linthicum (the author) claimed that if you are looking at the hackers attacking “your” cloud from the outside, you are missing the real problem as the insider threat is still bigger. When...
  • Blog Post: Attacks on your Reputation

    There is definitely some risk in reputation-based systems: The Threat of Reputation-Based Attacks on Securityfix from Washington Post Roger
  • Blog Post: Do we have to move away from SHA-1 immediately

    Sometimes it is interesting how certain themes keep popping up again and again. But let's start at the beginning: For example in the field of public key cryptography we make use of so-called hash functions. A hash function is a function which turns data into a number of limited size. For example SHA...
  • Blog Post: Important Privacy Announcement

    I  wanted to make you aware of a very important announcement we made earlier today. As you know, Trustworthy Computing is all about Security,  Reliability and Business Practices. Our house has a fourth pillar -  Privacy - which we view as extremely  important, not only in terms of...
  • Blog Post: Are you ready for your users of the (near) future?

    Yankee Group Study Actually near future might be wrong: I am convinced that the future (with regards to the requirements) is already here. We sponsored a study with Yankee Group with the title Anywhere Access Technologies - Open Enterprise Networks . I read through it and tried to analyze the key findings...
  • Blog Post: 0-Day-Patch – An new Metric for Security?

    The Federal Institute of Technology in Zurich released a study at Blackhat, which is definitely worth looking into. Now, let's be serious: They looked at a metric they call 0-Day-Patch being the number of patches a vendor is able to release at the day of the public disclosure of a new vulnerability...
  • Blog Post: YOUR FEEDBACK REQUESTED

    I am in the position of the Chief Security Advisor in Europe, Middle East and Africa since February 1 st . Since then I am blogging here (before that I ran together with Urs the Swiss Security Blog). The hits per post rose over the first 6-7 months but now started to slowly drop. However, looking at...
  • Blog Post: H1 OS Desktop Vulnerability Report – Get It Now

    You might know Jeff Jones' work on the different vulnerability reports comparing different products and vendors. Our goal is to understand and measure our progress and see where we stand with regards to the industry. Today, Jeff release his OS Desktop vulnerability report for H1 2008, which shows...
  • Blog Post: Steve Ballmer on next revolution in computing

    Over the next time (actually starting at RSA) you will hear more from us how we see the future of security. You should watch out for Craig Mundie's keynote there. But last Monday Steve Ballmer had a speech at the CeBIT in Germany on the next revolution in computing. You will find a summary of this...
  • Blog Post: Microsoft is winning the NAC war

    I just read an interesting chat with Joel Snyder from Opus One who did Interop testing on the different NAC solutions. I think he makes some statements which are worth to read (from my perspective anyway J ): He also says that those who are anti-NAC simply don't understand the technology. What we...
  • Blog Post: Open Source and Hackers

    The debate is probably as old as the Open Source software development model: Which one is more secure: Open Source or shared source as we at Microsoft run it? I know that we could now enter a religious debate about that, which I do not want to as I do not really believe in the value of such debate. ...
  • Blog Post: Where next? – Watch out for RSA

    We are six years into Trustworthy Computing (TwC). When we launched it, we said a number of things: "It is a 10-year vision". Well, that's something we have had to update. As long as there are criminals out there using the Internet to steal, Trustworthy Computing will be around. "It is an industry...
  • Blog Post: Not About Security but Cool – Search based on Silverlight

    This has definitely nothing to do with security. But anyway, I thought it worthwhile, to write to blog post about that. I found that today: an absolutely cool new search engine based on our latest development called Silverlight. Simply have a look at it and give it a try. It is definitely worth it...
  • Blog Post: Security Progress at Microsoft (Interview with Scott)

    I just stumbled across this interview with Scott Charney (Corporate Vice President Trustworthy Computing) which is very interesting to read: Q&A: Microsoft no longer a 'laughingstock' of security, Charney says Roger
  • Blog Post: Terrorism and the Internet

    Since a long time (at least 9/11) there is a lot of discussion about the way terrorists use/will use the Internet, It is clear that the Internet is used for publicity and communication. There are experts saying that the Internet itself will not be a target for an attack for terrorists because of this...