Wow, I guess the reason for you clicking on the link is this statement â€“ right? Well, â€œunfortunatelyâ€ I cannot claim ownership of it. It was made by a Google representative during an interview in Australia: Google: Who cares where your data is? To me, the whole Cloud discussion sometimes drives into interesting directions. I…Details
Quite a while ago, I blogged about the File Classification Infrastructure in Windows Server 2008 R2: File Classification Infrastructure in Windows Server 2008 R2 File Classification Infrastructure:More content In my opinion, this is an interesting tool, built in to your server platform. Now, we just published a paper about how we use this File Classification…Details
We often talk about consumerization of IT. The advantages are huge â€“ and so are the risks. The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our companyâ€™s â€“ or even worse our country’s â€“ secrets. Consumerization is huge and makes a lot of sense from a…Details
This is not surprising as I guess they are not alone: China’s Blue Army of 30 computer experts could deploy cyber warfare on foreign powers However, what really scares me is, that I expect governments to train more people than they really need â€“ or some of them might be laid off during priority shifts…Details
This is actually a great development to fight Child Porn:
Facebook adopts PhotoDNA and joins Microsoft and The National Center for Missing & Exploited Children to disrupt the proliferation of online child exploitation.
You find the information here.
Yesterday we released our Security Intelligence Report v10. A few highlights/lowlights from the Key Findings section: Industry vulnerability disclosure trends continue an overall trend of moderate declines since 2006. This trend is likely because of better development practices and quality control throughout the industry, which result in more secure software and fewer vulnerabilities. Vulnerability disclosures…Details
Internet Explorer was certified early May with a seal of â€œtrusted softwareâ€, which is great news in my opinion. Here is the English translation of the official press bulletin: Internet Explorer 9 passed the review of TÃœV Trust IT GmbH and carries the official TÃœV seal approval from today on. Within the framework of the…Details
A good paper: NSA – Best Practices for Keeping Your Home Network Secure
To me, one of the benefits of moving to the Cloud is security â€“ obviously besides availability and costs. Recent incidents made me doubt: Amazon not only having significant downtime but in the same time losing customer data. Sonyâ€™s game network being significantly compromised. This is definitely not to blame them but I was heavily…Details
Fairly often I am asked whether the Security Guides for our products still exist. The good news is: They do. The bad news is: They are called differently The previously stand-alone Microsoft product-specific security guides are now included within the Microsoft Security Compliance Manager (SCM) tool, which I blogged about several times already (e.g. New…Details
You might know the problem if you are working in consulting: You have to fill out the report, form whom you spent your time. And then you forgot to fill in the tool and all of a sudden you have a hard time figuring out where you have been. There is a revolution: iPhone solves…Details
Actually, there is not much to say about this. It is a blog post by CanegieMellon called A Security Comparison: Microsoft Office vs. Oracle Openoffice and just does what it says. However, I do not particularly like the security comparison of products built solely on vulnerabilities as this shows only one side of the equation…Details
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work, which is definitely worth working through. It lays out the problem space and then does a deep dive into the different sections: Governments Legislative Bodies The Armed Forces Law Enforcement Judges…Details
An interesting article by ISACA: Six predictions for CIOs. Here they are: Prediction 1: Cloud computing is here to stay and will become business as usual. Prediction 2: Virtualization will be a catalyst that drives IT modernization. Prediction 3: IT operations become service-centric and business value-focused, rather than process-driven and reactive. Prediction 4: Risk management…Details
This is one of the rare more private posts on this blog and this time has nothing to do with security at all. Since ages one singer was always part of my wifeâ€™s and my live: Chris de Burgh. And even if it is uncool in our kidâ€™s world, they love him and his songs…Details
On March 24th, we got the certificate for the Common Criteria certification for Windows 7 and Windows Server 2008 on EAL 4+.
Here are the certified products: http://www.commoncriteriaportal.org/products/ and here you find the certificate.
A great job by the team â€“ congratulations!
Thatâ€™s really interesting:
Impressive! Kudos to MIT
A few years ago, I wanted to run an exercise with our incident response team in Switzerland. A customer, the government and me came together to develop the goals and the scenario. One of the key question we tried to answer together with the university, which we wanted to use as observers was, whether we…Details