Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As Chief Security Advisor of Microsoft EMEA - lets share interesting security information
Making Sense from Snowden: What’s Significant in the NSA Surveillance Revelations
I do not want to comment this but it is a fairly interesting article on Snowden's Revelations, the...
Date: 08/24/2013
Careful, when Microsoft Support is calling
I guess you are aware of the phone scams, when Microsoft support is calling you to tell you that you...
Date: 08/22/2013
Windows XP: The world after April 8, 2014
To be clear upfront: After support for Windows XP will end, the world will still exist – at least I...
Date: 08/19/2013
Unique in the Crowd – False sense of Privacy
This morning, I was reading a very interesting article called Unique in the Crowd: The privacy...
Date: 06/27/2013
Targeted Attacks – a Video Series
Trustworthy Computing in partnership with Microsoft IT, Microsoft Consulting and the product groups...
Date: 06/17/2013
The Moscow Rules in the Cyberspace
Doing your basics is a natural given, when you defend your assets. Basics like updating your...
Date: 06/03/2013
Is there a future for Product Certifications?
Often, when I talk to customers, product certification is one of the key themes they want to...
Date: 05/17/2013
Microsoft Account: Enable Two-Step Verification
We could even talk about two-factor authentication in my opinion. The idea is, that whenever you...
Date: 04/19/2013
Internet Accessible SCADA Systems
This is a fairly scary view of the world…. Freie Universität Freiburg mapped the Internet accessible...
Date: 03/25/2013
Cyber Espionage and Targeted Attacks
This morning I read an article on Infoworld: Why you should care about cyber espionage which – to me...
Date: 02/08/2013
The Challenge of Patch Management
Depending on where I travel and with which customers I talk, patch management is still the number 1...
Date: 02/01/2013
Try Office 365 Home Premium
Today is the day we launched Office 2013 officially to the broad market. This is a real cool step...
Date: 01/29/2013
An Attack via VPN – Really?
I was just made aware of a case study, which is a really interesting "attack" on a US company via...
Date: 01/17/2013
New book on Direct Access
A lot of customers are asking us about Direct Access and how you can implement it. Erez Ben Ari (a...
Date: 01/09/2013
Mitigating Pass the Hash Attacks
In the recent months, we have seen more and more targeted attacks towards our customers. A lot of...
Date: 12/13/2012
Kaspersky Lab: Microsoft software products pretty darn secure
What a statement! The last time I was on a panel with Eugene Kaspersky, he told us that the world...
Date: 11/03/2012
Two Papers on Current Issues
Trustworthy Computing just released two papers on current issues: Determined Adversaries and...
Date: 10/26/2012
The Future of Crime
You should spend 15 minutes on this TED talk – really worth it!! https://youtu.be/7_OcyWcNi_Y Roger
Date: 10/21/2012
Security Lessons from Star Wars
Exactly the right article for a weekend: May the (En)Force(ment) Be With You – Security Lessons from...
Date: 10/20/2012
New Consumerization of IT Test Lab Guide: Hyper-V Windows 8 corporate virtual machine on personal computer"
Out friends in France are currently working intensively on Test Lab Guides for Consumerization of...
Date: 10/01/2012
Paper: Information Protection and Control (IPC) in Office 365 Preview with Windows Azure AD Rights Management
As you know, protecting your information in the cloud is key. We just published a paper called...
Date: 09/27/2012
Security Implications of Pirated Software
A while ago, when I was travelling a journalist told me that he never pays for our software as he...
Date: 09/17/2012
How to secure your Facebook account
I think that this is actually a fairly good overview of the privacy settings on Facebook and how you...
Date: 09/10/2012
Hacking on the plane: who has jurisdiction?
Wow, that's an interesting question: Let's say a Canadian flies from New York to Tokyo on Korean Air...
Date: 09/03/2012
Direct Access and Virtual Smartcard
I am a huge fan of DirectAccess – especially as a user. This means mainly, that I love it as a user...
Date: 08/26/2012
Microsoft Security Response Center: Progress Report
End of July we issued the fourth MSRC progress report showing not only the work we did on the...
Date: 08/20/2012
UPDATE: Security Advisory – Update For Minimum Certificate Key Length
Yesterday I blogged about the Security Advisory – Update For Minimum Certificate Key Length. I would...
Date: 08/16/2012
Security Advisory - Update For Minimum Certificate Key Length
As you know, I rarely blog about Security Advisories or updates but this time, I want to make sure...
Date: 08/14/2012
DNSChanger explained
A very good video from Sophos on DNSChanger: Roger
Date: 07/10/2012
Banking Trojan hits banks globally
When I was talking to governments about Flame a few weeks ago, they typically told me that they do...
Date: 06/29/2012
Consumerization of IT
In the meantime I guess that most of us agreed that Consumerization of IT or Bring Your Own Device...
Date: 06/22/2012
Tackling Cybersecurity Together
Yesterday we all had a very long day: We hosted the EU Cybersecurity and Digital Crimes Forum in...
Date: 06/01/2012
Laptop lost with data for more than 2,000 patients, Boston Children’s reports
What about using Bitlocker???? Laptop lost with data for more than 2,000 patients, Boston Children’s...
Date: 05/25/2012
What Microsoft can teach Apple about security response
I guess, I do not have to comment this – right? What Microsoft can teach Apple about security...
Date: 05/09/2012
Windows Defender Offline
A few days ago, Windows Defender Offline was released. This is basically the tool to use, if you are...
Date: 04/27/2012
Consumerization of IT–How to address this
Bring Your Own Device or Consumerization of IT are fairly hot themes in a lot of customer...
Date: 04/26/2012
Build your own sniffing kit
When people look at attackers, they always think that they are extremely smart people. There are...
Date: 04/24/2012
5 Common Types of Security Professionals
I am following Shoaib’s blog since quite a while – actually due to the beauty of the Internet, we...
Date: 04/23/2012
Q1 Software Vulnerabilities
This was an interesting article on cio.com: Apple, Oracle, Google Lead Major Vendors with Software...
Date: 04/20/2012
Run your company like a burrito?
This has nothing to do with security nor with technology – but it is worth (in my opinion) 20...
Date: 04/19/2012
Keep all your software updated and current
I know that I keep going and going on that. When I talk to customers and mainly to providers of the...
Date: 04/12/2012
Selecting the right Cloud partner
One of the challenges customers always have is, how to select the right cloud partner and fairly...
Date: 04/09/2012
Cybersecurity–Do we need to change the approach?
Years ago information security or cybersecurity was in the hands of specialists, which set the rules...
Date: 04/06/2012
Security Updates and Exploit Code
In our last update cycle we published the security bulletin MS12-020 Vulnerabilities in Remote...
Date: 03/19/2012