• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find

Monthly Archives: October 2018

You are here:
  1. Home
  2. 2018
  3. October

Microsoft and Amazon to partner against Google?

This is an interesting view on what could happen after the EU ruling against Google. Definitely worth reading:

How Amazon and Microsoft will oust Google to become our next Android overlords

October 23, 2018Leave a commentIndustry, MicrosoftBy Roger Halbheer

Encryption in Use – Confidential Computing in Azure

If you have not read, yet about Confidential Computing, you definitely should. This can be a real game-changer in how to deal with sensitive data in the cloud.

Mark Russinovich held a Microsoft Mechanics session at Ignite on that – 15 minutes well spent. Watch yourself:

October 19, 2018Leave a commentCloud Computing, MicrosoftBy Roger Halbheer

6 Reason for People to Resist

We had a meeting today between a customer and our CISO, Bret Arsenault. As always Bret was giving a lot of insights into his world and he was talking about our cloud transformation. Obviously, there was a time, where our migration stalled, and they were trying to figure out, why. He then learned from somebody,…

October 19, 20182 CommentsIndustry, PeopleBy Roger Halbheer

Good Washington Post Article: Microsoft welcomes scrutiny of tech industry

Interesting how the title turned out: Microsoft welcomes scrutiny of tech industry that has roiled its competition this year, says CEO Nadella. Easy for him to say. Kind of true as Microsoft was not in the focus of all the troubles this year but on the other hand, one could say that we learned our…

October 11, 2018Leave a commentGeneral, Industry, Microsoft, Security, Strategy, TrendsBy Roger Halbheer

Does AI solve it all?

Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and a lot of promises by the vendors in that space. Microsoft invests in this technology as well and I would say we are…

October 9, 2018Leave a commentCloud Computing, Cloud Computing, Incidents, Industry, Microsoft, Strategy, TrendsBy Roger Halbheer

Security in the Supply Chain

Supply chain security is a very complex and difficult topic. The industry started to focus more and more on it and different approaches start to materialize. Mainly, security becomes part of the contract negotiation and part of the responsibilities of the supplier. In some cases, certifications like ISO 27001 are requested and the certificate must…

October 8, 2018Leave a commentCrime, Cybercrime, Process, SecurityBy Roger Halbheer
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes