Diamond Member Pelican Press 0 Posted May 6, 2024 Diamond Member Share Posted May 6, 2024 This is the hidden content, please Sign In or Sign Up beefs up cyber initiative after hard-hitting US report This is the hidden content, please Sign In or Sign Up is doubling down on its This is the hidden content, please Sign In or Sign Up (SFI), expanding the programme – which sets out to address the software and vulnerability issues frequently exploited by threat actors – in the wake of the ******* States government Cyber Safety Review Board (CSRB) report This is the hidden content, please Sign In or Sign Up and the January 2024 Midnight Blizzard (Cozy Bear) *******. Redmond said that the rapid evolution of the threat landscape underscored the severity of the threats that face both its own operations and those of its customers, and acknowledged that given its central role in the world’s IT ecosystem, it had a “critical responsibility” to earn and maintain trust. “We are making security our top priority at This is the hidden content, please Sign In or Sign Up , above all else – over all other features. We’re expanding the scope of SFI, integrating the recent recommendations from the CSRB as well as our learnings from Midnight Blizzard to ensure that our cyber security approach ******** robust and adaptive to the evolving threat landscape,” said Charlie Bell, executive vice president of This is the hidden content, please Sign In or Sign Up Security. “We will mobilise the expanded SFI pillars and goals across This is the hidden content, please Sign In or Sign Up and this will be a dimension in our hiring decisions. In addition, we will instil accountability by basing part of the compensation of the company’s Senior Leadership Team on our progress in meeting our security plans and milestones,” he said. The SFI, This is the hidden content, please Sign In or Sign Up by This is the hidden content, please Sign In or Sign Up vice chair and president Brad Smith in November 2023, centres three core pillars – developing and improving AI-based cyber defences, improving software engineering practice, and advocating for stronger application of international norms in cyber space. This is the hidden content, please Sign In or Sign Up , Bell explained that this approach would now evolve with the work to be guided by three new principles: Security by design, as a primary consideration in the design and development of any This is the hidden content, please Sign In or Sign Up product or service; Security by default, with protections enabled and enforced by default, requiring no extra effort from users, but equally with no opt-outs for them; Secure operations, with controls and monitoring continuously improving to meet changing threats head on. Added to this, This is the hidden content, please Sign In or Sign Up will now align a set of expanded goals and actions to six prioritised pillars, as follows: The protection of identities and secrets using best-in-class, quantum-ready standards; The protection and isolation of all This is the hidden content, please Sign In or Sign Up tenants and production systems; The protection of This is the hidden content, please Sign In or Sign Up production networks, and the isolation of This is the hidden content, please Sign In or Sign Up and customer resources; The protection of engineering systems, encompassing software assets, code security, and governance of the software supply chain; The monitoring and detection of threats, providing comprehensive coverage and automatic detection of threats to This is the hidden content, please Sign In or Sign Up production infrastructure; The acceleration of response and remediation to vulnerabilities, reducing time to mitigate for high-severity bugs and improving public messaging and transparency. “These goals directly align to our learnings from the Midnight Blizzard incident as well as all four CSRB recommendations to This is the hidden content, please Sign In or Sign Up and all 12 recommendations to cloud service providers (CSPs), across the areas of security culture, cyber security best practices, auditing logging norms, digital identity standards and guidance, and transparency,” said Bell. “We are delivering on these goals through a new level of coordination with a new operating model that aligns leaders and teams to the six SFI pillars, in order to drive security holistically and break down traditional silos,” he added. Internally, This is the hidden content, please Sign In or Sign Up is also taking steps to improve how its people respond as a collective, implementing new initiatives to help operationalise its learnings from incidents, and instituting a new governance framework overseen by its CISO Igor Tsyganskiy, which introduces a partnership between engineering teams and a newly-created group of deputy CISOs, and will be backed by the full breadth of This is the hidden content, please Sign In or Sign Up ’s existing nation state actor and threat hunting capabilities. It also plans to do more to instil a security-first culture, and will be starting broadscale weekly and monthly operational meetings to include all levels of management and senior- individual contributors working on detailed ********** and continuous improvement of security. “Ultimately, This is the hidden content, please Sign In or Sign Up runs on trust and this trust must be earned and maintained. As a global provider of software, infrastructure, and cloud services, we feel a deep responsibility to do our part to keep the world safe and secure. Our promise is to continually improve and adapt to the evolving needs of cyber security. This is job number one for us,” said Bell. “ This is the hidden content, please Sign In or Sign Up has some really ambitious goals in their Secure Future Initiative. Most organisations have neither the will nor the technical ability to achieve these goals, but any organisation that does will be in a prime position to repel most intrusions,” said Jake Williams, a faculty member at cyber research firm This is the hidden content, please Sign In or Sign Up and a former hacker for the NSA. “ This is the hidden content, please Sign In or Sign Up certainly has the technical ability to implement these, but that’s always been the case. It appears they now have the political will to do so as well. “There are plenty of details about significant technical security enhancements This is the hidden content, please Sign In or Sign Up is making. The hardest part of most of these is getting to 100%. Anything less than 100% leaves a residual ******* surface that threat actors will exploit. These efforts follow the old 80/20 rule where most of the effort is expended getting the last holdouts onboarded into the new security regime. The thing that gives me the most confidence that This is the hidden content, please Sign In or Sign Up will get there is the emphasis that engineer SVPs are holding regular operational meetings with all levels of management and senior ICs. That’s how you reinforce cultural change and make sure that it sticks,” he said. This is the hidden content, please Sign In or Sign Up # This is the hidden content, please Sign In or Sign Up #beefs #cyber #initiative #hardhitting #report This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/27371-microsoft-beefs-up-cyber-initiative-after-hard-hitting-us-report/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.