security

Microsoft Vows to Revamp Security Products After Repeated Hacks – HT Tech


Microsoft Corp., battered for its role in several major hacks, said it’s revamping the way it provides cybersecurity protection, using artificial intelligence and other methods to speed the company’s response to vulnerabilities and better protect customers.

In a blog post, three Microsoft executives said they “have put significant thought into how we should anticipate and adapt to the increasingly more sophisticated cyberthreats.” The result is a commitment to three areas of engineering advancement: “transforming” software development, implementing new identity protections and driving faster vulnerability response, they wrote.

“In recent months, we’ve concluded within Microsoft that the increasing speed, scale, and sophistication of cyberattacks call for a new response,” President Brad Smith wrote in a separate posting. “This new initiative will bring together every part of Microsoft to advance cybersecurity protection.”

Also read: Looking for a smartphone? To check mobile finder

We are now on WhatsApp. Click to join.

While Microsoft is primarily known for its software products for corporations and consumers, the Redmond, Washington-based company has emerged as the biggest provider of cybersecurity products in recent years, a business that has grown to about $20 billion a year. At the same time, Microsoft remains a frequent target of critics, who complain that its software is prone to flaws, making it a frequent target for criminal and nation-state hackers.

Those problems resurfaced earlier this year, when hackers used a stolen consumer signing key to forge authentication tokens, which are meant to verify a user’s identity. They then accessed user email from about 25 organizations, including US government agencies. Among the victims was US Commerce Secretary Gina Raimondo and State Department officials, whose emails were accessed just ahead of a meeting between US Secretary of State Antony Blinken and Chinese President Xi Jinping. Microsoft tied the hackers to China.

Readers Also Like:  The future of IT: what we can learn from the mainframe - CIO

US Senator Ron Wyden wrote a blistering letter on July 27 about the lapse, calling for an investigation, and shortly thereafter, a government-led cybersecurity advisory panel opened a probe into the risks of cloud computing, which includes a look into Microsoft’s role in the email hack.

“Government emails were stolen because Microsoft committed another error,” Wyden, a Democrat from Oregon, said in his letter. “Microsoft should not have had a single skeleton key that, when inevitably stolen, could be used to forge access to different customers’ private communications.”

Amit Yoran, the chief executive officer of the cybersecurity company Tenable Holdings Inc., also criticized Microsoft, saying on LinkedIn in August that the company’s “lack of transparency applies to breaches, irresponsible security practices and to vulnerabilities, all of which expose their customers to risks they are deliberately kept in the dark about.”

Microsoft’s announcement, called the Secure Future Initiative, comes after the federal government has indicated that it expects software makers to take more responsibility for securing their products. In February, for instance, Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, said bad software and unsafe practices are facilitating ransomware attacks, and she said the adoption of some of Microsoft’s and Twitter’s security protocols such as two-factor authentication was disappointing.

And, on Monday, the US Securities and Exchange Commission filed a lawsuit against Texas-based SolarWinds Corp., alleging the company defrauded investors by downplaying security risks ahead of a hack of its software. In that cyberattack, which became public in December 2020, Russian state-sponsored hackers inserted malware into an update for a popular SolarWinds software product, creating a digital backdoor when customers downloaded it.

Readers Also Like:  Bethesda’s Brivo is partnering with Urban Outfitters for cloud security - Technical.ly

The hackers used that backdoor to further infiltrate about 100 organizations, including US government agencies, according to the SEC. The lesson of the SEC suit was that security professionals shouldn’t sugarcoat problems that they are seeing and be more transparent about them, Michael Coates, chief information security officer at CoinList and a former security head at Twitter, told Bloomberg News.

Microsoft’s Smith said the company is committed to building an AI-based cyber shield to protect customers and countries around the world. 

“One reason these AI advances are so important is because of their ability to address one of the world’s most pressing cybersecurity challenges,” he wrote. “Ubiquitous devices and constant internet connections have created a vast sea of digital data.”

“But AI is a game changer,” he said.

In addition, Microsoft said it will use AI-powered analysis and other measures to audit and secure code against advanced threats, and it vowed to strengthen identity protection at a time when password attacks have increased and hackers have developed more sophisticated methods to steal and use login credentials. As part of the latter initiative, Microsoft said it would migrate to a “new and fully automated consumer and enterprise key management system with an architecture designed to ensure that keys remain inaccessible even when underlying processes may be corrupted.”

In her criticism of Microsoft earlier this year, Easterly said that Microsoft needs to “recapture the ethos” of what company co-founder Bill Gates called “trustworthy computing” in 2002. At that time, Microsoft was reeling from computer worms, and Gates wrote a memo ordering software developers to prioritize security. “We can and must do better,” he wrote.

Readers Also Like:  Pentagon must act now on quantum computing or be eclipsed by rivals - C4ISRNET

One more thing! HT Tech is now on WhatsApp Channels! Follow us by clicking the link so you never miss any update from the world of technology. Click here to join now!



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.