• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find
Date Name
DescAsc

Kaspersky's View of a Secure Internet – Does this make sense? I think not

A few months ago, I already had some discussions with Eugene Kaspersky during an event of the Council of Europe on Cybercrime, how to address cybercrime on the Internet. At the moment, I am at a very, very slot connection and just got, what I saw on my RSS feed enclosure and could not verify…

Details
July 19, 2009Leave a commentTrendsBy Roger Halbheer

SANS: Recent attacks and a false sense of security

Well, as I am not really working, just a quick one: http://isc.sans.org/diary.html?storyid=6787&rss

Roger

July 16, 2009Leave a commentIncidentsBy Roger Halbheer

Join the Windows 7 and Internet Explorer 8 Security Baselines Beta

The day before yesterday we opened the Windows 7 and Internet Explorer 8 Security Baselines Beta and would look forward to getting your feedback and comment. So, sign up for it if you are interested: Sign-Up Now for the New Windows 7 and Internet Explorer 8 Security Baselines Beta Opening July 13th!

Roger

July 14, 2009Leave a commentProcesses, Products, StrategyBy Roger Halbheer

Manage Network Access Protection at Microsoft

As you know, I am a big fan of the concepts behind Network Access Protection as it allows to dynamically define zones on you network. We just published a whitepaper called Manage Network Access Protection at Microsoft: Network Access Protection (NAP) is a powerful new Windows Server 2008 feature that can help protect networks from…

Details
July 14, 2009Leave a commentPolicy, Process, ProductsBy Roger Halbheer

Office 2010: The Movie

Just some fun before I leave for vacation: http://www.youtube.com/watch?v=VUawhjxLS2I

BTW: Office 2010 really rocks – I am running the Technical Preview since quite a while now…

Have a good summer

Roger

July 13, 2009Leave a commentProductsBy Roger Halbheer

Physical Security: ATMs equipped with Pepper Spray

This is “real” hard-core security. If the ATM feels that it is tempered with, it releases pepper spray. It is kind of a “self-defense” mechanism. I just hope it never thinks that I am tempering with the machine when I just want to get money…

ATMs fitted with pepper spray

Roger

July 10, 2009Leave a commentCrime, IncidentsBy Roger Halbheer

Paper on Information Warfare

I often see a lot of discussions on Information Warfare. Today I just stumbled across a paper published by RAND called Strategic Information Warfare – A New Face of War – from my first impression definitely worth reading

Roger

July 9, 2009Leave a commentCrime, TerrorismBy Roger Halbheer

Distributed Denial of Service – and how it works

I often get asked about Distributed Denial of Service (DDoS) attacks, how it works and what role we can play to prevent them. So, let me start with the first part of it: Our Security Intelligence Report version 5 talked about the underground economy and actually explained what is happening before a DDoS takes place.…

Details
July 8, 20091 CommentCrime, Technology, TrendsBy Roger Halbheer

Bitlocker To Go – Cool Stuff

I guess you know my view to protection of USB-ports. I get often asked how you can protect your user’s from using USB-sticks. There are ways – especially in Vista – but don’t do it. Your users most probably have a good business reason, why they would want to use USB-sticks and by not letting…

Details
July 1, 2009Leave a commentPolicy, Process, ProductsBy Roger Halbheer

File Classification Infrastructure: More content

At the Analyst Event last week I was asked more than once about the File Classification Infrastructure. As it was something I never looked into the details, I started from the blog post I wrote mid May File Classification Infrastructure in Windows Server 2008 R2 and just wanted to collect some information about it. If…

Details
June 29, 20091 CommentPolicy, Process, ProductsBy Roger Halbheer

End-to-End Trust: The Internet – a safer place to work, play, learn and do business

I often have the opportunity to keynote events on security. I rarely want to talk about products but much more about the way I see the development around security on the Internet. The reason why I do this presentation the way you see below is, that threats change and criminals evolved (and will still evolve)…

Details
June 25, 2009Leave a commentStrategy, TrendsBy Roger Halbheer

EMEA TwC Analyst Summit

We are just kicking off the EMEA TwC Analyst Summit, which is running for the next two days. The first time we are using technologies like Twitter live from the event and we encourage the Analysts to do the same. Therefore, you might follow what is going on there on different channels but mainly: The…

Details
June 24, 2009Leave a commentEvents/TrainingsBy Roger Halbheer

Test Microsoft Security Essentials

I am running Microsoft Security Essentials (called “Morro”) since quite a while on my Mediacenter and I am definitely convinced of it. So, go ahead and test it: http://www.microsoft.com/security_essentials/resources.aspx – it will be our free Anti-Malware solution

Roger

June 24, 2009Leave a commentConsumer, ProductsBy Roger Halbheer

Live-Tweet from Analyst Event

Wednesday and Thursday we are running an event for selected analysts in London. As you might know, I am tweeting via http://www.twitter.com/rhalbheer and I will try to do some live tweeting from the event during the event – never did this but I will try. In addition, there are some analysts we know that they…

Details
June 22, 2009Leave a commentEvents/Trainings, MicrosoftBy Roger Halbheer

Microsoft awarded for Security

This is probably one of the best news I read since a long time. I often said, that I am convinced that we are in a lot of areas around security leading the industry. The complexity of building multi-purpose software in a secure way started to be addressed by us back when we introduced the…

Details
June 16, 2009Leave a commentMicrosoft, ProcessesBy Roger Halbheer

SafeSearch in Bing

One more proof that we listen to you: We made certain changes to Bing in order rot help you to protect from sexual explicit content. Please read the corresponding blog post Safe Search Update. Even though this is very good news, it does not change my view that education of parents and children is at…

Details
June 13, 2009Leave a commentConsumer, Processes, Products, StrategyBy Roger Halbheer

Download Internet Explorer 8 and help hungry people

We started a program called “Browser for the Better” where we donate 8 meals to Feeding America per download of Internet Explorer 8 (until August 8th).

So, go out and download Internet Explorer 8 from the site above

Roger

June 11, 2009Leave a commentProductsBy Roger Halbheer

Welcome to reality: Apple Acknowledges OS X Malware

A few years ago, we ran a huge event in Switzerland: We offered people in Switzerland to come to us (we were for a whole week at the airport in Zurich) with their PC and we check it for malware, patch it etc. We did this with a lot of partners and had live TV…

Details
June 11, 2009Leave a commentIncidents, Technology, TrendsBy Roger Halbheer

XBox Project Natal

I got some questions on my blog post that you should not by a Wii at the moment. The key question was about whether this is just a teaser. Well, look at the demos they did at E3. You find them here:

Roger

June 5, 2009Leave a commentFun, ProductsBy Roger Halbheer

Bing and the Video Preview (and Family Safety Settings)

You might have seen recent posts on Bing getting under attack because of the video preview feature, which works (obviously) for “normal” videos as well as for porn… To be clear upfront: I am the daddy of two great sons at the age of 7 and 10, so at least the 10-year-old starts to get…

Details
June 5, 2009Leave a commentConsumer, People, Policy, Process, Processes, Products, StrategyBy Roger Halbheer
1
23456789101112131415161718192021222324252627282930
…3132333435…
3637383940414243
44
Prev pageNext page
Tag Cloud
Calendar
May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Aug    
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes