Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Attacks on Application Level
That the attacks move up the stack is really nothing new. However, it increases the challenge to...
Author: rhalbheer Date: 01/18/2011
UNODC: Open Ended Expert Group on Cybercrime
From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really...
Author: rhalbheer Date: 01/16/2011
Real Physical Security
I saw this this morning – have a great weekend: Roger
Author: rhalbheer Date: 01/14/2011
Cybercrime as a Service–Our Future?
It is not really surprising that the criminals will leverage the economy of Cloud Computing for...
Author: rhalbheer Date: 01/12/2011
Dilbert on Cloud Computing
The worst thing is, that there is some truth in that: At least, this is what I see often, before I...
Author: rhalbheer Date: 01/07/2011
Exciting News from the Consumer Electronics Show in Vegas
After the launch of different products for the consumer, businesses and in the Cloud, Steve Ballmer...
Author: rhalbheer Date: 01/06/2011
Targeted Attacks: The Biggest Risk in 2011?
Since quite a while, I am saying that targeted attacks are the risks, which really keep me up at...
Author: rhalbheer Date: 01/03/2011
And you think you have security problems? Merry Christmas
Roger
Author: rhalbheer Date: 12/25/2010
My Blackberry Is Not Working!
That’s absolutely great and worth spending the few minutes – enjoy: Roger
Author: rhalbheer Date: 12/22/2010
I sold my soul to Google, can I get it back?
Well, this question was not asked by me but by a guy called Joe Wilcox on Betanews: I sold my soul...
Author: rhalbheer Date: 12/13/2010
On the effectiveness of DEP and ASLR
Our Security Research and Defense team published a blog post, which is really interesting to read to...
Author: rhalbheer Date: 12/09/2010
Mitigating the use of Local Admin
We recently had internal discussions on the use of local admin and how to mitigate it. During this,...
Author: rhalbheer Date: 12/05/2010
Behind the Curtain of Second Tuesdays: Challenges in Software Security Response
You might know about Bluehat, which is an internal security conference we run several times an year....
Author: rhalbheer Date: 12/02/2010
Security Development Lifecycle: Quick References
A quick one: An interesting download location: With the SDL Quick Security References (QSR), the...
Author: rhalbheer Date: 11/30/2010
Publishing Secret or Sensitive Information
With a lot of interest I followed the media on the latest Wikileaks’ publication of sensitive...
Author: rhalbheer Date: 11/30/2010
The Cloud is Also Green
Yes, not only gray Seriously, we commissioned a study to see what the impact of cloud computing is...
Author: rhalbheer Date: 11/21/2010
Information Security Management System for Microsoft Cloud Infrastructure
Just a quick one. Our Global Foundation Services organization (the ones who run our datacenters)...
Author: rhalbheer Date: 11/19/2010
New Baselines for the Security Compliance Manager
There were just new resources released for the Security Compliance Manager: the Windows Server 2008...
Author: rhalbheer Date: 11/16/2010
Basic Malware Protection for Free?
It is kind of strange, whenever I talk to governments and customers, everybody seems to agree that...
Author: rhalbheer Date: 11/15/2010
Fixing Risk Management
Since quite a while I am not satisfied with the way we (in the industry) are doing risk management....
Author: rhalbheer Date: 11/14/2010
Hotmail now with full-session SSL
If you use Hotmail, you should enable full session SSL in my opinion. Additionally we use SSL for...
Author: rhalbheer Date: 11/11/2010
Russia to revise Cybercrime Legislation?
You know that I am propagating the adoption of cybercrime legislation, which is aligned across the...
Author: rhalbheer Date: 11/05/2010
Move to latest versions - for security reasons
We all know that Windows XP is rock-solid but not capable anymore to defend against today’s...
Author: rhalbheer Date: 11/02/2010
Worldwide Chief Security Advisor Meeting
I know that I have been very, very quiet over the last two weeks. The reason was, that the worldwide...
Author: rhalbheer Date: 11/01/2010
Internet on Mount Everest
I already have a problem the way tourism develops on Mount Everest (definitely understanding that...
Author: rhalbheer Date: 10/29/2010
The Botnet Superhighway
An interesting analysis by the Malware Protection Center: The Botnet Superhighway Roger
Author: rhalbheer Date: 10/22/2010
Windows Phone 7 Reviews
I just got a mail that my Windows Phone 7 is ready for pick-up. Unfortunately I am in Redmond at the...
Author: rhalbheer Date: 10/22/2010
Ray Ozzie’s Blog is Back
As I am still oof, another short one: Ray Ozzie’s blog is back: https://ozzie.net/ Ray is definitely...
Author: rhalbheer Date: 10/17/2010
When Identity Theft and Privacy Meet
It is always bad, if comics have a significant portion of truth: and then and finally hmm…. too much...
Author: rhalbheer Date: 10/14/2010
Security Intelligence Report v9 is online
Usually I blog intensively on the release of the Security Intelligence Report. However, this time I...
Author: rhalbheer Date: 10/13/2010
Security in Switzerland
I am preparing the worldwide Chief Security Advisor meeting in Seattle, which takes place soon. I am...
Author: rhalbheer Date: 10/12/2010
Stuxnet talks – do we listen?
Stuxnet is a severe threat – that’s something we know for sure. But if we look at it – what do we...
Author: rhalbheer Date: 10/12/2010
Can cloud security ever work?
An interesting question, posed by V3.co.uk: Can cloud security ever work? – How relevant is the...
Author: rhalbheer Date: 10/06/2010
Responsibility of ISPs for the ecosystem?
If you like Scott Chaney's suggestion he made at ISSE this week called Collective Defense - Applying...
Author: rhalbheer Date: 10/06/2010
UNHCR and Microsoft to help refugees
No, this is not yet another announcement – this is a picture of today’s reality. UNHCR just...
Author: rhalbheer Date: 10/05/2010
Is the online world more dangerous?
I often hear statements that the risk of losing your identity or being a victim of fraud is much...
Author: rhalbheer Date: 10/04/2010
“Freedom of speech” does not mean you can say everything!
Sometimes I feel that people think the Internet is a room, where the laws of our society do not...
Author: rhalbheer Date: 10/03/2010
Windows Live Essentials 2011 available for download now
I am using it since the Beta and it is really cool. I am using Messenger (with the integration to...
Author: rhalbheer Date: 09/30/2010
How to Detect a Hacker Attack
This title immediately caught my attention and probably yours as well: How to detect a hacker attack...
Author: rhalbheer Date: 09/30/2010
Customer Experience Study: Security Improves in the Cloud
Last week, when I was in South Africa, a partner of us pointed me to a very interesting paper by...
Author: rhalbheer Date: 09/28/2010
Support and OpenSource
I know that I am not an OpenSource expert and to be completely clear: I do not want to complain at...
Author: rhalbheer Date: 09/28/2010
Stuxnet: Future of warfare? Or just lax security?
What is your view?: Stuxnet: Future of warfare? Or just lax security? Roger
Author: rhalbheer Date: 09/27/2010
The Value of Twitter–Revisited
Actually I had a few very interesting discussions lately as a reaction on my post Is There Any Value...
Author: rhalbheer Date: 09/27/2010