If you have not seen these numbers, they are very impressive: Microsoft by the numbers. One of the most impressive figure in there is that we sold 150,000,000 Windows 7 licenses since the launch. Well, this figure by itself does not really impress you, no? It is just big I guess. Well there is another…Details
July 1st, Scott Charney, Corporate Vice President Trustworthy Computing was testifying at a hearing of the House Committee on Oversight and Government Reform. Basically the hearing was on the benefits and risk of Cloud adoption for the US government. If you are interested in reading his full testimony, you will find it here. Additionally, Scott…Details
It really made me thinkâ€¦
I recently migrated to WordPress 3.0 â€“ it is great and the upgrade was absolutely smooth.
Afterwards, I was looking into the latest plugins and decided to open a guestbook. So, please sign in and make me feel good
If you follow my blog you saw recently that there are two themes constantly popping up: One is everything about a governmentâ€™s Cybersecurity Agenda (or the lack thereof) and the second one is the Cloud. Let me briefly line them out: When I talk to governments I often feel that there is a lack of…Details
I just wanted to remind you: The support for Windows XP SP2 ends today. I hope that this does not catch you by surprise. If you need all the information about which kind of support ends when for which product, please consult out Lifecycle page. If you have a Premier Support contract with us, your…Details
You know that I am not a big fan of blocking social networks within enterprises for different reasons. I just read an article on this subject based on a study by Trend Micro. One of the conclusions in the article is: Trying to just prevent users accessing social networks from work could potentially increase the…Details
The Department of Homeland Security published a report on A Roadmap for Cybersecurity Research, I was definitely impressed! All the themes, which are important to me are in their list : Scalable trustworthy systems (including system architectures and requisite development methodology) Enterprise-level metrics (including measures of overall system trustworthiness) System evaluation life cycle (including approaches…Details
Even though it might be obvious, compliance is not only about protecting data but identities as well â€“ and more. Jon Collins, Freeform Dynamics, whom I value high, wrote a good article: Doing the right thing on ID management isn’t enough… â€“ you should read it!
And everybody tells me how secure they areâ€¦.. So,according to this article Secunia: Apple makes the most vulnerable software in the market today, apple hast most vulns, then Oracle and then us (and then the rest). And you know, the interesting thing is that the comparison is not â€œapples with applesâ€ as we tend to…Details
After my overall announcement that we grow the community in Off to See the World, and Stuart Aston joining as the CSA in the UK, it is a great pleasure to see Magnus Lindkvist coming back. Magnus was the CSA in Sweden a few years back and accepted the offer now to come back and…Details
This is always a fairly emotional theme. What is better to protect the ecosystem? Public or private disclosure? Should somebody paying for vulnerabilities or not? Is a vulnerability auction ethical or not? I know that there are numerous views on that and I do not want to debate them here and now. What I just…Details
You know my opinion on collaboration between countries, on public-private-partnerships as well as on collaboration between companies. Since quite a while we run a program called MAPP â€“ the Microsoft Active Protections Program, where we share vulnerability information with security vendors to help them to get signatures out to our joint customers the moment we…Details
If you do not know this blog, it is definitely worth looking at it from time to time: Paleo-Future. There I found a prediction on cybercrime dated 1981: It describes the impact of computers in the â€œfutureâ€ â€“ say today. If you click on the picture, you can see the original. There is a good…Details
I blogged often about it: Blocking certain websites today can fire back in different ways. The CIO published an article called Workarounds: 5 Ways Employees Try to Access Restricted Sites â€“ and they say: “Some workarounds can be dangerous because they might create a channel that data can flow out through that is not managed…Details
I am convinced that there are workloads that can and should be moved to the Cloud: For security reasons as well as for economical reasons. E-Mail might well be the first one of them.
There is a good post on that: Editor’s Note: Email, the Lowest-Hanging Fruit of the Cloud
It is an interesting and difficult question. What can we do to really be able to stay on top? Or shall we give up? Well, clearly, I do not think so. I read this article today, which really made me think: Black Hats are Winning, Symantec Says â€“ wow! A fairly clear statement. We lost…Details