In Off to See the World I told you that we are growing the Chief Security Advisor Community and then I updated you on the UK and Sweden. Now it is time to update you again. Just before the summer vacation, we could hire the Chief Security Advisor in South Africa who is Khomotso Kganyago.…Details
It hits the press from time to time that somebody was successful taking down a botnet. We had some success as well with the Waledac Botnet Takedown. There is actually a good article on What it takes to shut down a botnet. When I was doing some bing-search on the botnet takedowns, I found good…Details
I think I told the story thousands of time and everybody knows it but I will do it the 1001st time now . When I joined Microsoft and became what is the Chief Security Advisor for Switzerland today, we had an airlift for Windows Server 2003. The Product Manager in Switzerland asked me to keynote…Details
Steve Ballmer was once asked by a journalist whether and why he allows blogging by Microsoft employees, without any approval process. His answer was that he lets Microsoft employees talk to customers without approval process as well (at least thatâ€™s the story which was told ). You know that I am a big fan of…Details
Sometimes I wonder whether I am too paranoid. I just got a call, which went like that: Caller: â€œHello, we are doing a health insurance survey and have just three questions for you, would you mind to join in? Just 20 seconds. We do it for Health Insurance statistics.â€ Me: Was in a very good…Details
It is an interesting and difficult question. What can we do to really be able to stay on top? Or shall we give up? Well, clearly, I do not think so. I read this article today, which really made me think: Black Hats are Winning, Symantec Says â€“ wow! A fairly clear statement. We lost…Details
I am convinced that there are workloads that can and should be moved to the Cloud: For security reasons as well as for economical reasons. E-Mail might well be the first one of them.
There is a good post on that: Editor’s Note: Email, the Lowest-Hanging Fruit of the Cloud
I blogged often about it: Blocking certain websites today can fire back in different ways. The CIO published an article called Workarounds: 5 Ways Employees Try to Access Restricted Sites â€“ and they say: “Some workarounds can be dangerous because they might create a channel that data can flow out through that is not managed…Details
If you do not know this blog, it is definitely worth looking at it from time to time: Paleo-Future. There I found a prediction on cybercrime dated 1981: It describes the impact of computers in the â€œfutureâ€ â€“ say today. If you click on the picture, you can see the original. There is a good…Details
You know my opinion on collaboration between countries, on public-private-partnerships as well as on collaboration between companies. Since quite a while we run a program called MAPP â€“ the Microsoft Active Protections Program, where we share vulnerability information with security vendors to help them to get signatures out to our joint customers the moment we…Details
This is always a fairly emotional theme. What is better to protect the ecosystem? Public or private disclosure? Should somebody paying for vulnerabilities or not? Is a vulnerability auction ethical or not? I know that there are numerous views on that and I do not want to debate them here and now. What I just…Details
After my overall announcement that we grow the community in Off to See the World, and Stuart Aston joining as the CSA in the UK, it is a great pleasure to see Magnus Lindkvist coming back. Magnus was the CSA in Sweden a few years back and accepted the offer now to come back and…Details
And everybody tells me how secure they areâ€¦.. So,according to this article Secunia: Apple makes the most vulnerable software in the market today, apple hast most vulns, then Oracle and then us (and then the rest). And you know, the interesting thing is that the comparison is not â€œapples with applesâ€ as we tend to…Details
Even though it might be obvious, compliance is not only about protecting data but identities as well â€“ and more. Jon Collins, Freeform Dynamics, whom I value high, wrote a good article: Doing the right thing on ID management isn’t enough… â€“ you should read it!
The Department of Homeland Security published a report on A Roadmap for Cybersecurity Research, I was definitely impressed! All the themes, which are important to me are in their list : Scalable trustworthy systems (including system architectures and requisite development methodology) Enterprise-level metrics (including measures of overall system trustworthiness) System evaluation life cycle (including approaches…Details