• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find
Date Name
DescAsc
Aug62020

Zero Trust: Identity at the Core

In my last post we looked into why Zero Trust is not this huge revolutionary vision but something reflecting today’s reality. Technology is ready to go –technology is ready for you to embark on a journey and start to align your security architecture and investments with this approach. The biggest change when implementing Zero Trust…

Details
August 6, 20202 CommentsMicrosoft, Products, Security, TechnologyBy Roger Halbheer
Apr72020

Zero Trust Journey

During these days with a lot of people in their Home Office, discussions around Zero Trust are more important than ever as this journey enables scenarios like we see today. There are different resources, which might be interesting for you to look at: Microsoft Zero Trust assets These are links to currently available assets.  We…

Details
April 7, 2020Leave a commentCloud Computing, Microsoft, Products, StrategyBy Roger Halbheer
May112020

Zero Trust in the IoT/OT Space

Zero Trust is definitely not new but around for something like 16 years if you look at it. This is, when the Jericho Forum was formally established and Network Access Control architectures started to get deployed (or at least designed). It definitely got some tailwind 10 years later with Google’s work on BeyondCorp (as a…

Details
May 11, 2020Leave a commentIndustry, Internet of Things, UncategorizedBy Roger Halbheer

Zero Trust and Home Office

As you might know, I am part of the Cybersecurity Advisory Board of the Swiss Academy of Engineering Sciences here in Switzerland. In this capacity I had the opportunity to publish an article at Inside IT: SATW insights: Zero Trust – Sicherheit in Zeiten von Homeoffice (in German).

Enjoy!

May 28, 2020Leave a commentPeople, Policy, Process, Security, TechnologyBy Roger Halbheer
Oct252019

Zero Trust

During the Global CISO Summit we ran this week, one theme was high on the list for a lot of CISOs: Zero Trust. Besides, what is out there, we just released different material how we think about it and how you can approach it: A landing page with a lot of great material: Zero Trust…

Details
October 25, 2019Leave a commentCloud Computing, General, Industry, Microsoft, Products, Strategy, TrendsBy Roger Halbheer

Zero Days and underground markets

The Dutch TV broadcaster VPRO made a great video (about 50 minutes) about zero-days and security leaks for sales.

It raises really good social questions about the role of governments and citizens. Really worth looking at.

Roger

Related articles
  • ‘Zero Days’, the documentary (f-secure.com)
August 1, 2015Leave a commentCrime, Cybercrime, Incidents, Industry, TerrorismBy Roger Halbheer

Your PIN on the Internet

Yes, it is true: There is somebody who publically put known PINs on the Internet. I bet yours is there too: http://www.positiveatheism.org/crt/pin.htm

Roger

August 20, 2008Leave a commentFunBy Roger Halbheer

You need to understand security to get it right

In certain areas, getting security right can seem to be very easy. But, hmm, let’s look at this: Poorly anonymized logs reveal NYC cab drivers’ detailed whereabouts. They used MD5 to anonymize the license plate numbers of the taxi drivers – and they did not use any salt. So, it is fairly easy to run…

Details
July 1, 2014Leave a commentUncategorizedBy Roger Halbheer

You know about PDOS?

Well, I know DOS, I know DDOS, but I never knew PDOS until today: there seems to be a new way to attack systems using the firmware update mechanism and generating a Permanent Denial of Service (actually damaging the hardware)…. I was involved in a Ciritical Infrastrucutre Protection workshop about 2 years ago and one…

Details
May 20, 2008Leave a commentCrime, Cybercrime, Industry, TrendsBy Roger Halbheer

You deployed MS09-008 – are you now protected?

You might have seen several reports that MS09-008 does not protect you from the vulnerabilities. We reviewed these claims and customers who have deployed MS09-008 are protected from the four vulnerabilities. If you want to have the details, you should consult our Security Research & Defense Blog, where we posted MS09-008: DNS and WINS Server…

Details
March 14, 2009Leave a commentIncidentsBy Roger Halbheer

Yes, it is still me

Yes, you are still on the right blog. Things change and one of these is my blog design (the rest I will communicate in due time).

Roger

September 13, 2013Leave a commentUncategorizedBy Roger Halbheer

XBox Project Natal

I got some questions on my blog post that you should not by a Wii at the moment. The key question was about whether this is just a teaser. Well, look at the demos they did at E3. You find them here:

Roger

June 5, 2009Leave a commentFun, ProductsBy Roger Halbheer

Writing Security Policies

I am a fan of simple and easy to read policies. I do not think that policies consisting of several thousand documents to any good nor will they be followed.

In this context I found a noteworthy blog post: 5 Tips on Writing Security Policies

Roger

August 21, 2015Leave a commentGeneral, Industry, Policy, SecurityBy Roger Halbheer

Would a properly managed IT have withstood Conficker?

Before I start here: Let’s be clear that I will not say (and will never say) that if a customer was infected with Conficker he had a poorly managed network! I had a lot of discussions over the course of time about the reasons for customers being infected. We all know the attack vectors of…

Details
March 4, 2009Leave a commentPeople, Policy, Process, Products, SecurityBy Roger Halbheer

Worldwide Chief Security Advisor Meeting

I know I have been very, very quiet over the last two weeks. The reason was, that the worldwide Chief Security Advisor met at our HQ in Redmond for four days to discuss community related questions as well as the future of certain products.

Details
November 1, 2010Leave a commentMicrosoft, StrategyBy Roger Halbheer
Mar142016

Women in Security – Event in Zürich

Unfortunately, we do not see too many women in security – even though there are huge opportunities irrespective of the gender. Over the years, I had the pleasure to work with great women in this business. We will run an event on Thursday, April 28, 2016 at 6.30pm at the Accenture Office in Zurich with…

Details
March 14, 2016Leave a commentGeneral, Industry, People, Security, TrendsBy Roger Halbheer

Windows XP: The world after April 8, 2014

To be clear upfront: After support for Windows XP will end, the world will still exist – at least I hope. However, over the course of the last few months I read numerous articles with speculations, what is going to happen, once we stop support of Windows XP. The key problem is, that we do…

Details
August 19, 2013Leave a commentMicrosoft, ProductsBy Roger Halbheer

Windows Server 2008 PKI and Certificate Security

Fresh out of press (ok, it is out since beginning of April but I just saw it now): Brian Komar, the well-known author of several PKI books on Windows Server just released a new book called Windows Server 2008 PKI and Certificate Security. If you are planning a Windows Server 2008 PKI, this is a…

Details
June 3, 2008Leave a commentProducts, TechnologyBy Roger Halbheer

Windows Server 2008 Hyper-V Role EAL 4+ certified by BSI

That’s new: We have Windows Server 2008 Hyper-V Common Criteria EAL 4+ certified. The new thing is that we certified it in Germany by the BSI (Bundesamt für Sicherheit in der Informationstechnik). You can find the report here: https://www.bsi.bund.de/cae/servlet/contentblob/612768/publicationFile/35487/0570a_pdf.pdf

Roger

August 15, 2009Leave a commentProductsBy Roger Halbheer

Windows Security Praised

A result of a study by Kasperski lab is fairly promising – even though it shows the problem being raising up the stack: For the very first time in its history, the top 10 rating of vulnerabilities includes products from just two companies: Adobe and Oracle (Java), with seven of those 10 vulnerabilities being found…

Details
August 16, 2011Leave a commentIndustry, Microsoft, Process, Processes, Products, Security, TechnologyBy Roger Halbheer
12345…
678910111213141516171819202122232425262728293031323334353637383940414243
44
Next page
Tag Cloud
Calendar
May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Aug    
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes