Why it pays to be secure – Chapter 2 – Vulnerabilities
Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to...
View ArticleMicrosoft SDL Team Releases New Security Testing Tools
I often mention that we try to give you all the tools we have as long as it makes sense form a risk perspective. The risk perspective is a simple one: If we give it to you as our customer, we give it...
View ArticlePower of Knowledge: Security Intelligence Report v7
It is a good tradition since quite a while that we make the intelligence we have available accessible to the broad public. This will help out customers to protect themselves much better. The Security...
View ArticleHP and Microsoft Partnership: That's What You Need in the Cloud
Often when I talk to our customers and they ask me about the cloud, a lot of questions come up. Most of them are security related (obviously) but some of them are more management focused. For example...
View ArticleResults of Operation b49 (Botnet Takedown)
On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post called Cracking Down on Botnets. Now it is time to look back and try to understand what we learned so...
View ArticleWho needs a (vulnerable) iPad if you can get an nPad?
I actually wanted to show nPad to you as I loved it – it is a new hardware factor to what we did since years on the tablet. I like this new hardware (see below) and then read this article, showing that...
View ArticleFree Software for NGOs
I would just like to forward you to a blog post by Brad Smith as of today: Anti-Piracy Enforcement and NGOs. There is one statement I would like to quote: To prevent non-government organizations from...
View ArticleFacebook Implements Microsoft’s PhotoDNA Technology
This is actually a great development to fight Child Porn: Facebook adopts PhotoDNA and joins Microsoft and The National Center for Missing & Exploited Children to disrupt the proliferation of...
View ArticleWhy it pays to be secure – Chapter 3 – But how do I?
Our EMEA Security Program Manager, Henk van Roest, started this series internally and with his consent I am publishing it here in my blog as I think it contains a lot of great information for you to...
View ArticleSecure Virtual Coffee – Top of Mind?
< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, my family knows how to cope with it...
View Article
More Pages to Explore .....