Roger's Security Blog
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
At FIRST in Vancouver the formation of the Industry Consortium for Advancement of Security on the...
Author: rhalbheer Date: 06/27/2008
We just released Windows Server 2008 Hyper-V to manufacturing. You can find more information on our...
Author: rhalbheer Date: 06/26/2008
A question I often get is "How does Microsoft solve the problem x in their IT?" (e.g. How does...
Author: rhalbheer Date: 06/26/2008
I just wanted to make sure that you have seen the Advisory (Rise in SQL Injection Attacks Exploiting...
Author: rhalbheer Date: 06/24/2008
Our Chief Security Advisor in Italy spent quite some time to collect a list of web-pages and blogs...
Author: rhalbheer Date: 06/24/2008
I am very proud for the product team to tell you that Windows Vista Bitlocker™ completes FIPS 140-2...
Author: rhalbheer Date: 06/19/2008
There seems to be some problems deploying the latest security updates with System Center...
Author: rhalbheer Date: 06/16/2008
A question that was often raised after the launch of Windows Server 2008 was about Server Core and...
Author: rhalbheer Date: 06/11/2008
I am in Qatar at the moment at the Doha Information Security Conference. They actually have a very...
Author: rhalbheer Date: 06/10/2008
I wrote about it as we released the Beta. Now, the Solution Accelerator for Security Compliance...
Author: rhalbheer Date: 06/07/2008
In the world of Chinese Hackers there seems to be a group especially for female hackers. I just read...
Author: rhalbheer Date: 06/04/2008
I was made aware of a pretty good report on Software as a Service Quocirca did in collaboration with...
Author: rhalbheer Date: 06/04/2008
Fresh out of press (ok, it is out since beginning of April but I just saw it now): Brian Komar, the...
Author: rhalbheer Date: 06/03/2008
I was just posting on SOA and the Security Implications of it from a CIO/CSO perspective on my other...
Author: rhalbheer Date: 06/03/2008
I guess you read it as it was pretty wide-spread in the press in the last few days: On the...
Author: rhalbheer Date: 06/02/2008
We just published yesterday two new pieces of guidance for the latest SQL Injection attacks, which I...
Author: rhalbheer Date: 05/31/2008
I posted yesterday on the Safari flaw (Why Apple has to fix the Safari flaw) as Apple did not...
Author: rhalbheer Date: 05/31/2008
Well, there was quite some chatter over the last few weeks with regards to the massive defacements...
Author: rhalbheer Date: 05/30/2008
Remember me talking about Is Security Research Ethical? I made a statement in there when it comes to...
Author: rhalbheer Date: 05/30/2008
I just read this essay by Bruce Schneier: How to Sell Security. This is definitely a must-read in my...
Author: rhalbheer Date: 05/27/2008
No, no. For sure. I am not going to give you advise how to hack – but look at this video:...
Author: rhalbheer Date: 05/27/2008
If you are planning to implement Windows Server 2008, there are two paper recently published that...
Author: rhalbheer Date: 05/26/2008
I just read this article on Cryptography Expert Wins ACM Award for Advances in Protecting Privacy of...
Author: rhalbheer Date: 05/26/2008
We just announced that we will add support for additional file formats in Office System 2007 SP2....
Author: rhalbheer Date: 05/22/2008
Shoaib's blog actually pointed me to a pretty interesting article called Face-Off: Is vulnerability...
Author: rhalbheer Date: 05/22/2008
I just read a paper on the political analysis of the Estonian Attack. If you are interested reading...
Author: rhalbheer Date: 05/21/2008
Well, I know DOS, I know DDOS, but I never knew PDOS until today: there seems to be a new way to...
Author: rhalbheer Date: 05/21/2008
One fact strikes me pretty often: Companies have the problem that they have legacy software running...
Author: rhalbheer Date: 05/20/2008
Here Blogging on MOSS 2007 (SharePoint) I talked about the way I use SharePoint and a Codeplex...
Author: rhalbheer Date: 05/20/2008
I just read first reports that Storm is coming back as we speak. This is frightening but shows the...
Author: rhalbheer Date: 05/20/2008
Shoaib just blogged on Hacking & Security Community - Ethical or Unethical?. To start with: I do...
Author: rhalbheer Date: 05/18/2008
Well, this is not what I am claiming to have…. This is what I am looking for. At the moment, I am...
Author: rhalbheer Date: 05/17/2008
Wow, this was impressive: A Swiss Developer posted on Saturday a blog that he found a bug which...
Author: rhalbheer Date: 05/14/2008
Ever tried to open a file? Roger
Author: rhalbheer Date: 05/12/2008
If you would like to know a little bit more on botnets and how they actually look like, there is a...
Author: rhalbheer Date: 05/09/2008
Recently I was sitting on a panel which was pretty heterogeneous: There was a representative from...
Author: rhalbheer Date: 05/09/2008
I just read an interesting chat with Joel Snyder from Opus One who did Interop testing on the...
Author: rhalbheer Date: 05/08/2008
I wrote on that already earlier. We make processes and tools available how we internally do Threat...
Author: rhalbheer Date: 05/05/2008
I just read this article called 8 Dirty Secrets Of The Security Industry, which seems pretty nasty....
Author: rhalbheer Date: 05/03/2008
If there would be a price for the "Dumbest Thief of the Month", this guy deserves #1: Texan tries to...
Author: rhalbheer Date: 05/03/2008
Are you working on Office System 2007? Ever looked for a command, you knew in 2003 exactly where it...
Author: rhalbheer Date: 04/30/2008
There has been a lot of discussions in different blogs on the attacks on IIS servers. Microsoft...
Author: rhalbheer Date: 04/29/2008
Cert.org published guidance on how to secure your browser. Here you would find them if you are...
Author: rhalbheer Date: 04/29/2008
You might know Brian Komar. He wrote numerous books on PKI and Certificate Management and he is a...
Author: rhalbheer Date: 04/29/2008