Quantcast
Channel: Incident Response – Roger Halbheer on Security
Browsing all 17 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Infrastructure Planning and Design Guide for Malware Response

A new version of this guide went live – I think something, you should look at. There is a metrology and a process in detail: So, if you want to learn more:...

View Article



Image may be NSFW.
Clik here to view.

Ten Immutable Laws Of Security (Version 2.0)

You might have known the 10 Immutable Laws Of Security since quite a while. It is kind of the “collected non-technical wisdom” of what we see in security respeonse being it in Microsoft Security...

View Article

Special Intelligence Report on the Rustock Takedown

As you might remember, on Match 16th Microsoft together with other industry players was successfully able to take down the Rustock botnet and thus significantly reducing the spam level. We now just...

View Article

Microsoft Malware Protection Center on Facebook and Twitter

I know, I have been fairly slow in blogging currently but I was fairly busy with a few cool projects (which I will disclose later) and – time flies if you are having fun Just a quick one: The MMPC on...

View Article

VeriSign to Take Down Malware Sites?

This is actually an interesting approach: VeriSign Proposes Takedown Procedures and Malware Scanning for .Com. This leads to the discussion I have so often: What is more important? The single website...

View Article


Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident...

A few years ago I posted on DaRT after having seen it: Microsoft Diagnostics and Recovery Toolset. It is a really good an interesting tool for a lot of problems, one of them being incident response. I...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity–More than a good headline

A lot of governments all across the globe are working on starting, restarting or pushing their Cybersecurity initiative. What often concerns me is, that the last real headline has more impact on the...

View Article

Image may be NSFW.
Clik here to view.

10 Years of Trustworthy Computing at Microsoft

Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I...

View Article


Security Updates and Exploit Code

CORRECTION:So far there is “only” Proof of Concept code in the wild, no real exploit. In our last update cycle we published the security bulletin MS12-020 Vulnerabilities in Remote Desktop Could Allow...

View Article


Keep all your software updated and current

I know that I keep going and going on that. When I talk to customers and mainly to providers of the critical infrastructure about security, one of the key things to me is to keep the software updated....

View Article

Protecting USB Sticks

It is in my opinion a controversial discussion: Do you allow the use of USB sticks in a corporate environment and if yes, how? Obviously, today there are a lot of other means to exchange information...

View Article

Does AI solve it all?

Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and a lot...

View Article

Image may be NSFW.
Clik here to view.

Politician’s Reactions on VIP Hack in Germany

I recently complained about the Swiss government and our inability in Switzerland to really drive Cybersecurity forward (Federal Council not deciding again – Switzerland falling behind on...

View Article


Using multi-factor authentication blocks 99.9% of account hacks

This is not fundamentally new but the figure is really high… So, why are you still using username/password? Your Pa$$word doesn’t matter

View Article

Azure Sentinel-the cloud-native SIEM is now generally available

During RSA we announced that we will bring a cloud-native SIEM/SOAR solution to the market. Since then the team worked very hard to drive it forward. The number of private and public preview customers...

View Article


Microsoft Threat Intell: GALLIUM: Targeting global telecom

I guess this is important for Telcos (and others): GALLIUM: Targeting global telecom

View Article

Threat Intelligence on COVID-19

The question what the malicious actors do during the crisis is one which comes up fairly often. My observation was – as bad as it sounds – that we had “business as usual”. As with any catastrophe or...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images