• Accenture
  • Cybercrime
    • Crime
    • Terrorism
  • Fun
  • Government
    • Critical Infrastructure Protection
    • Law Enforcement
    • Legislation
  • Industry
    • Associations
    • Cloud Computing
    • Consumerization of IT
    • Events/Trainings
    • General
    • Incidents
    • Internet of Things
    • Open Source
    • Outsourcing
    • Piracy
    • Social Media
    • Technology
    • Trends
  • Intergovernmental Organizations
  • Microsoft
    • Cloud Computing
    • Consumer
    • Incidents
    • Partner
    • Processes
    • Products
    • Strategy
  • Privacy
  • Security
    • People
    • Policy
    • Process
    • Technology
Catagories
Roger Halbheer on SecurityRoger Halbheer on Security
Roger Halbheer on Security
Information Security Discussion

Roger Halbheer on Security

  • Home
  • Downloads
  • My Photo Gallery
  • Bio and Contact
  • Blogroll
    • Chief Security Advisor Microsoft Finland
    • Chief Security Advisor Microsoft Italy
    • Chief Security Advisor Microsoft Russia
    • Chief Security Advisor Microsoft South Africa
    • Chief Security Advisor Microsoft Switzerland
    • Chief Security Advisor GCR (Chinese)
    • Chief Security Advisor Germany
    • Gerhard Göschl (Microsoft Austria)
    • Microsoft’s Security Blog
    • Trustworthy Computing
    • Microsoft Switzerland Security Blog
    • Shoaib Yousuf
  • Tweetroll
    • Roger Halbheer
    • Henk van Roest
    • Microsoft Security Response
    • Microsoft Digital Crimes Unit
Menu back  
LinkedinRssTwitterXING
Find
Date Name
DescAsc

Two Important Whitepaper on Windows Server 2008

If you are planning to implement Windows Server 2008, there are two paper recently published that could help you with it:

  • Active Directory Certificate Services Upgrade and Migration Guide
  • Configuring and Troubleshooting Certification Authority Clustering in Windows Server 2008

Roger

May 26, 2008Leave a commentProcesses, ProductsBy Roger Halbheer

How to sell security

I just read this essay by Bruce Schneier: How to Sell Security. This is definitely a must-read in my opinion. Not that it really tells you how to sell it but it helps you to understand the “mechanics” about it.
Roger

May 26, 2008Leave a commentProcess, SecurityBy Roger Halbheer

SANS Commits $1 Million to Fight Cybercrime in Developing Countries

You know that I criticize SANS from time to time. Especially when it come to their handlers, I am convinced that they are creating the problem rather than solving it. This time I have to say that I am impressed as they are helping developing countries to help to fight Cybercrime. This is as “we…

Details
May 24, 2008Leave a commentCrime, Critical Infrastructure Protection, Cybercrime, Government, TerrorismBy Roger Halbheer

Is Security Research Ethical?

Shoaib’s blog actually pointed me to a pretty interesting article called Face-Off: Is vulnerability research ethical? – Security Experts Bruce Schneier & Marcus Ranum Offer Their Opposing Points of View. Not surprisingly Bruce says “yes” and Marcus says “no”. If you read through their points, you might even agree partly with each of them: Bruce…

Details
May 22, 2008Leave a commentIncidents, People, PolicyBy Roger Halbheer

Adding additional File Formats in Office 2007 SP2

We just announced that we will add support for additional file formats in Office System 2007 SP2. Just read more on Open XML, ODF, PDF, and XPS in Office

Roger

May 22, 2008Leave a commentProductsBy Roger Halbheer

Analysis of the Estonian Attacks

We all remember the cyber-attacks on Estonia last April. A lot of people are interested what really was going on during these attacks. You find a lot of sites looking into the technical analysis of the attack – which could be more or less speculation. What I found recently and just had time to read…

Details
May 21, 2008Leave a commentCrime, Critical Infrastructure Protection, Cybercrime, Government, TerrorismBy Roger Halbheer

Security Risks of VoIP

Internet Telephony Has Security Problems: This was an interesting read this morning for different reasons: First of all, it is not surprising (even if we would not have known the problems it would have to be expected). I liked the statement: The goal is to raise awareness about flaws in these systems – and create…

Details
May 20, 2008Leave a commentTechnology, TrendsBy Roger Halbheer

Building a faster Internet

Does not solve any of the security problems (challenges?) but it sounds promising anyway

Building A Faster Internet

Roger

May 20, 2008Leave a commentTechnology, TrendsBy Roger Halbheer

How long does it take to hack a Power Plant?

I start to get scared – more and more. Back in September I blogged on Critical Infrastructure Protection – Live which shows what would happen if somebody would be able to tamper with power generators. Now, during RSA there was a guy called Ira Winkler telling the audience that they had the job to do…

Details
May 20, 2008Leave a commentCritical Infrastructure Protection, TerrorismBy Roger Halbheer

“The Security Business has no Future” (Quote by IBM)

This is actually an interesting statement. If you had ever to deal with the press you know how these headlines are composed. It might be that the person actually made the sentence in this way – the question is whether he meant it so absolute. Nevertheless, if you read the corresponding article on darkReading, I…

Details
May 20, 2008Leave a commentTrendsBy Roger Halbheer

SDL and End to End Trust

Last week we published – as you hopefully know – our “End to End Trust” whitepaper. If not, please read my blog post on it J Now, Eric Bidstrup just commented on End to End Trust in the light of the Security Development Lifecycle (or better: the other way around). It might be interesting for…

Details
May 20, 2008Leave a commentMicrosoft, Process, ProcessesBy Roger Halbheer

The ideal profile of a CSO

I was in Bratislava this week for an IDC Conference. During these kind of events I often talk to the press as well. Additionally I had this time the opportunity to talk to a pretty well-known blogger in Slovakia called Jozef Vyskoč. You may have a look at his blog (provided your Slovakian is better…

Details
May 20, 2008Leave a commentPeople, Policy, SecurityBy Roger Halbheer

0-Day-Patch – An new Metric for Security?

The Federal Institute of Technology in Zurich released a study at Blackhat, which is definitely worth looking into. Now, let’s be serious: They looked at a metric they call 0-Day-Patch being the number of patches a vendor is able to release at the day of the public disclosure of a new vulnerability. We could discuss…

Details
May 20, 2008Leave a commentIncidents, Process, TrendsBy Roger Halbheer

Hacking Back?

Pretty often there is a discussion how far it is allowed to hack back. I was just reading an interesting post called Hackers Could Become The Hacked? which I wanted to share with you

Roger

May 20, 2008Leave a commentCrime, Cybercrime, Policy, SecurityBy Roger Halbheer

Technology to Circumvent Censorship (Part 2)

Back in March I blogged on a Technology to Circumvent Censorship. I actually expected some dialogue on this but today somebody posted an interesting comment, I think is worth reading. Just click the link above and look at the second comment

Roger

May 20, 2008Leave a commentPolicy, Process, SecurityBy Roger Halbheer

Infosec: Security community must work together

Ed Gibson, our CSA in the UK had an interview during Infosec with VNunet. He made some interesting statements: We have a good set of laws in place and they have teeth. But the police have priorities and budgets set by the Home Office and Any one of you here would volunteer for neighborhood watch…

Details
May 20, 2008Leave a commentCrime, Cybercrime, Events/Trainings, TerrorismBy Roger Halbheer

Our Malicious Software Removal Tool and Storm

There is an interesting article on the value of the Malicious Software Removal Tool (MSRT – the tool we release monthly to clean PCs) and the fight against storm. It gives you some insight how our Malware Protection Center works and what they did against storm. A pretty interesting reading (even though I do not…

Details
May 20, 2008Leave a commentCybercrime, Incidents, MicrosoftBy Roger Halbheer

Security Pros ignoring their own message

As you probably know: I am Swiss. We have a saying in Switzerland (I do not know whether something like this exists in English as well) that the kids of the shoemaker always have the worst shoes… So, what about the security professionals? No, I am not talking about their shoes but what about the…

Details
May 20, 2008Leave a commentIncidents, People, Policy, Process, SecurityBy Roger Halbheer

Best Practices for Microsoft PKI & Certificate Management

You might know Brian Komar. He wrote numerous books on PKI and Certificate Management and he is a well-known speaker at quite some events like TechEd and IT Forum. Now, nCipher organized a Webimar on Best Practices for Microsoft PKI & Certificate Management.

If you are interested, you might register at the link above.

Roger

May 20, 2008Leave a commentIndustry, Microsoft, Products, TechnologyBy Roger Halbheer

Securing your Web Browser

Cert.org published guidance on how to secure your browser. Here you would find them if you are interested: Securing Your Web Browser

I am just not clear, how the browsing experience for my mom and dad would be…

Roger

May 20, 2008Leave a commentMicrosoft, Policy, Processes, Products, SecurityBy Roger Halbheer
1
23456789101112131415161718192021222324252627282930313233343536
…3738394041
Prev pageNext page
Tag Cloud
Mobile Microsoft Azure Cost Confidential Computing Regulation Cybersecurity Google Research Data Residency Legislation Data Classification Customer Cybersecurity Agenda Police Banking Switzerland Incident Response Risk Management Australia Incidents Federal Council Child pornography Compliance Trust Swiss Datacenter Processes Talent Cloud Cloud computing Cloud computing security Artificial intelligence People underground Change Management Microsoft Black market Identity CEO Amazon Consumer user Facebook Password Cybercrime Revenge porn
Calendar
February 2019
M T W T F S S
« Jan    
 123
45678910
11121314151617
18192021222324
25262728  
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Copyright by Roger Halbheer Dream-Theme — truly premium WordPress themes