• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find

Author Archives: Roger Halbheer

You are here:
  1. Home
  2. Article author Roger Halbheer
  3. (Page 30)

Why it pays to be secure – Chapter 3 – But how do I?

Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to use. Security — you hear about it every day. Being responsible for information security can be a daunting…

October 18, 2009Leave a commentEvents/Trainings, Partner, Processes, Products, StrategyBy Roger Halbheer

COFEE now distributed via a NW3C as well

COFEE is a tool available to Law Enforcement only to capture online evidence with a little training as possible. The idea behind the tool is, that there is little need for high-trained staff to be available during e.g. house searches and that a normal, much less trained officer can capture all the data. Until today,…

October 16, 2009Leave a commentCrime, Law Enforcement, Processes, Products, StrategyBy Roger Halbheer

Software Piracy – A Threat to Security!

Beginning of this year, I tried to understand, whether we can show a collaboration between Piracy (stolen software) and Malware Infections. I played a little bit with the data I had available and came to the conclusion, that there most probably is: Is there a Correlation between Stolen Software (Piracy) and Security/Patching? Now, the Business…

October 14, 2009Leave a commentPiracy, ProcessBy Roger Halbheer

SharePoint External Collaboration Toolkit moved to Codeplex

Quite a while ago I blogged about the SharePoint External Collaboration Toolkit. I just wanted to make you aware that this toolkit is now moved to Codeplex and can be found here: http://cks.codeplex.com/

Roger

October 14, 2009Leave a commentOpen Source, ProductsBy Roger Halbheer

The Africa Cable – A Chance for Africa! – A Threat for the Internet?

The development in Africa especially with the new broadband services to me is a huge chance for the whole continent. I just found this map on the next two years: source: IntelFusion Even though I have not been in Africa over the last few months, I heard that in different cities fiber is brought directly…

October 7, 2009Leave a commentCrime, Critical Infrastructure Protection, Legislation, TrendsBy Roger Halbheer

What's the "Cloud" or better "What's not a Cloud"

On analyst (and very active Tweeter on http://twitter.com/monkchips) quite a while ago (March 08) published a post, which we recently drew up in one of the cloud discussions: If you peel back the label and its says “Grid” or “OGSA” underneath… its not a cloud. If you need to send a 40 page requirements document…

October 2, 2009Leave a commentCloud ComputingBy Roger Halbheer

Thoughts on the Registered Traveler Programs at Airports

When I entered the US this time, I got a brochure on how I could avoid the line at immigration and just get a fast track by registering with the Global Entry Program, a program, which would pre-screen me and then I just have to register with a machine by entering the US. As I…

September 30, 2009Leave a commentLaw Enforcement, TrendsBy Roger Halbheer

Microsoft Security Essentials – Ready to download

Why pay for a Anti-Malware solution if you can get one of the best solutions in the world for free – go and download it! It is there: http://www.microsoft.com/security_essentials/ And now, the disclaimer: It runs only on genuine Windows! Have fun, enjoy. I am running it since quite a while with my friends and families…

September 29, 2009Leave a commentConsumer, ProductsBy Roger Halbheer

Interesting Cyber Security Challenge

I read an article on Cyber Security Challenge Brings Out the Best about a “defend your system” challenge by the USENIX Security Conference in Montreal, Canada. I like the approach: Find and fix common vulnerabilities on a web server.

Roger

September 29, 2009Leave a commentEvents/Trainings, IncidentsBy Roger Halbheer

Hey, You, Get Off of My Cloud

I recently had different discussions with different customers and we were looking into the key questions to ask, when you plan to move to the cloud (yes, I am working on a corresponding blog post). I was then asked whether we have an answer to these questions – well no. For sure not for all…

September 27, 2009Leave a commentCloud Computing, IncidentsBy Roger Halbheer

When it comes to security, who do you trust more – Microsoft or Google?

I started to read the article and actually just wanted to Tweet about it but then I voted and had to publish at least the current state: When it comes to security, who do you trust more? Microsoft (44%) Google (32%) Neither (22%) Both (3%) Total Votes: 716 This is just now – might change…

September 26, 2009Leave a commentCloud ComputingBy Roger Halbheer

Do you really want to move to the Cloud? Really?

Well, the question is not too provocative. The longer I look into the risk, the more I am asking this question. Now, we have to separate the different company sizes. I guess for a small and medium business – with the correct safety measures – it makes a lot of sense and you could safe…

September 25, 2009Leave a commentCloud ComputingBy Roger Halbheer

IT outsourcing most affected by data leaks – What about the Cloud?

I recently asked in a panel, where the difference is between Cloud Computing and classical outsourcing – I kind of became unpopular because this is simply uncool… But I stick with it (knowing there are differences) but the difference is not that big in my opinion. So, reading this article IT outsourcing most affected by…

September 24, 2009Leave a commentCloud Computing, Incidents, TrendsBy Roger Halbheer

Moving to the Cloud: Where it worked and where I was challenged

I am running a whole environment at home to experience our technology. However, up to now it was all “on premise”, no Cloud integration. This has to change. Therefore I was more than happy to join our internal  Hosted Exchange 14 beta program. We are offering the hosted Exchange program to Live@Edu – but we…

September 21, 2009Leave a commentCloud Computing, ProductsBy Roger Halbheer

When Goog becomes your Roommate (a "must see")

I just found that this morning. If you have 15 minutes, you have to watch these videos. They are really fun (are they?):

 

Enjoy! I did (partly)

Roger

September 17, 2009Leave a commentFun, PrivacyBy Roger Halbheer

Microsoft SDL Team Releases New Security Testing Tools

I often mention that we try to give you all the tools we have as long as it makes sense form a risk perspective. The risk perspective is a simple one: If we give it to you as our customer, we give it as well to the criminals. There are two new tools which just…

September 16, 2009Leave a commentPartner, Processes, ProductsBy Roger Halbheer

H1N1 (Swine) Flu Preparedness – Guide for Critical Infrastructure and Key Resources

This morning I stumbled across a guide by the US Health & Human Services with regards to H1N1. Even though it did not catch much news lately I am not sure whether it is really over. Staying prepared it definitely not a bad thing. Even though it is US-centric, you should probably look into it:…

September 16, 2009Leave a commentCritical Infrastructure ProtectionBy Roger Halbheer

Typing Arabic without a Arabic Keyboard: Microsoft Maren

I am using a Latin keyboard and my Arabic is kind of “rusty” but I guess that this could be of real help if you write Arabic:

Microsoft Maren

There is a good video on that page.

Roger

September 9, 2009Leave a commentProducts, StrategyBy Roger Halbheer

Monitoring the Virtual Environment

I recently blogged on how I monitor my environment: Monitoring – a Key Activity to a Trustworthy Infrastructure? In the meantime, I am doing more. I was just recently looking into System Center Virtual Machine Manager (VMM). So, I installed it on my monitoring server and started to manage my virtual hosts centrally. Basically VMM…

September 9, 2009Leave a commentProductsBy Roger Halbheer

PHP on Windows Server 2008 – My New Photo Gallery

Well, it was one of these days. In order to make photos available to our family we used SharePoint since quite a while. It did a fairly decent job but I wanted more fancy stuff. So I started to look for something in Silverlight as Silverlight is our web platform. I really found something on…

September 4, 2009Leave a commentProducts, TechnologyBy Roger Halbheer
1
23456789101112131415161718192021222324252627
…2829303132…
33343536373839404142
43
Prev pageNext page
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes