By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
FinOracle
  • Finance
  • Crypto
  • Technology
  • More
    • CivitasAI Readiness Index
    • Tech Sovereignty Index
    • CivitasAI Health Index
    • Predictions
    • Financial reports
    • Opinion
    • SWOT
Notification
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Personalize
FinOracleFinOracle
Font ResizerAa
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Search
  • Quick Access
    • Home
    • Contact Us
    • Blog Index
    • History
    • My Saves
    • My Interests
    • My Feed
  • Categories
    • Economy
    • Travel
    • Gossip
    • Business
    • Fashion
    • Health

Top Stories

Explore the latest updated news!
Why Investing Your Health Savings Account Is a Retirement Planning Game-Changer | FinOracle

Why Investing Your Health Savings Account Is a Retirement Planning Game-Changer

CyDeploy Develops Digital Twin for Safe Software Update Testing | FinOracle

CyDeploy Develops Digital Twin for Safe Software Update Testing

Charter Space Revolutionizes Spacecraft Insurance with Fintech Innovation | FinOracle

Charter Space Revolutionizes Spacecraft Insurance with Fintech Innovation

Stay Connected

Find us on socials
248.1kFollowersLike
61.1kFollowersFollow
165kSubscribersSubscribe
Made by ThemeRuby using the Foxiz theme. Powered by WordPress
Technology

Microsoft Boosts Security by Eliminating Unused Apps

Lilu Anderson
Last updated: 24.09.2024 8:40 pm
By Lilu Anderson
Share
Microsoft Boosts Security by Eliminating Unused Apps | FinOracle
Photo: Finoracle.net
SHARE

Reducing Attack Surface Area
As part of its ambitious Secure Future Initiative (SFI), Microsoft has taken significant steps to enhance its cloud security by eliminating 730,000 unused applications and 5.75 million inactive tenants. This move is aimed at reducing the potential areas where cybercriminals can exploit vulnerabilities.

To put it simply, think of these applications and tenants like rooms in a hotel. If too many rooms are left open and unattended, they can become easy targets for intruders. By closing these unused rooms, Microsoft is making its 'hotel'—or cloud environment—much safer.

Strengthening Identity Verification
Microsoft has introduced more stringent identity verification processes, such as video-based verification for 95% of its production staff. They've also updated their Entra ID and Microsoft Account (MSA) systems to better handle the creation, storage, and rotation of access keys in the cloud. This is similar to changing your locks regularly to ensure that only authorized people have access.

Enhancements in Device Security
Deploying 15,000 new, locked-down devices for software production teams is another critical step. These devices are like secure safes that are hard to break into, ensuring that sensitive operations are conducted in a controlled environment.

Network and System Security
To boost network security, Microsoft now maintains a comprehensive inventory of over 99% of physical assets. This means they have a detailed list of all equipment in their network, helping to prevent unauthorized access. Additionally, virtual networks are isolated from the corporate network, much like keeping a visitor's area separate from private offices.

Engineering Systems Protection
Microsoft has streamlined its software development process by using centrally managed pipeline templates. This means 85% of its production builds for the commercial cloud now follow a standard, secure method. It's akin to using a trusted recipe for cooking to ensure the same high-quality outcome every time.

Organizational Changes for Security
In efforts to hold top executives accountable for security, Microsoft has tied their compensation to achieving specific security goals. This creates an environment where everyone from the top down is focused on maintaining secure systems.

Response to Previous Breaches
These enhancements follow major breaches in Microsoft's network by groups like China’s Storm-0558 and Russia’s Midnight Blizzard. The attacks exposed vulnerabilities, prompting Microsoft to revamp its security culture and strategies.

The U.S. Department of Homeland Security's Cyber Safety Review Board gave recommendations on improving identity and authentication methods, which Microsoft has acted upon. By addressing these areas, Microsoft aims to build a robust defense against future threats.

Microsoft's dedication is further highlighted by allocating resources equivalent to 34,000 full-time engineers towards this initiative, marking it as one of the largest cybersecurity efforts in history.

Overall, Microsoft's comprehensive measures under the SFI reflect its commitment to reducing vulnerabilities and enhancing security to protect its cloud environment and user data.

TAGGED:AIARAssetAttack surfaceAuthenticationBETCementCESChinaCloudCultureCyber Safety Review BoardCybersecurityDataEngineerengineeringETHFutureGoalHistoryInfrastructureInventoryIonIronLightMicrosoftMicrosoft accountOrganizationPipelinePotentialResourceRussiaRustSECSecuritySecurity cultureSoftwareSoftware developmentSoftware development processSystemTeaThreatsTimeUSWar
Share This Article
Facebook Copy Link Print
Lilu Anderson
ByLilu Anderson
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.

Related Stories

Uncover the stories that related to the post!
Capital Small Finance Bank IPO Frenzy: Allotment Insights | FinOracle
Business

Capital Small Finance Bank IPO Frenzy: Allotment Insights

Cryptocurrency Market Turbulence: Satoshi VM & Dogecoin Decline, BlockDAG Rises | FinOracle
Crypto

Cryptocurrency Market Turbulence: Satoshi VM & Dogecoin Decline, BlockDAG Rises

DOJ explores equity and civil rights in AI | FinOracle
Artificial Intelligence

DOJ explores equity and civil rights in AI

7 Money Habits That Help Clients Build Wealth | FinOracle
Finance

7 Money Habits That Help Clients Build Wealth

T-Mobile's Innovative App: A Sneak Peek for Deal Lovers | FinOracle
Apps

T-Mobile’s Innovative App: A Sneak Peek for Deal Lovers

Take That's VR Tour: A Concert Revolution | FinOracle
Virtual Reality

Take That’s VR Tour: A Concert Revolution

IBM SWOT Analysis: Technology Company's Strategic Evaluation | FinOracle
SWOT

IBM SWOT Analysis: Technology Company’s Strategic Evaluation

Spectral AI: Surgeon Appointment Boosts Board | FinOracle
Technology

Spectral AI: Surgeon Appointment Boosts Board

Show More
FinOracle

Ready for Core Web Vitals, Support for Elementor, With 1000+ Options Allows to Create Any Imaginable Website. It is the Perfect Choice for Professional Publishers.

  • Quick Links
  • AI
  • AR
  • US
  • Market
  • CES
  • Ion
  • Potential
  • SEC
  • Port
  • War

Quick Links

  • My Feed
  • My Interests
  • History
  • My Saves

About US

  • Adverts
  • Our Jobs
  • Term of Use

© 2025 All Rights Reserved. Design & Developed By Selentium Group AG

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Continue with Google
Continue with Microsoft
Not a member? Sign Up