By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
FinOracle
  • Finance
  • Crypto
  • Technology
  • More
    • CivitasAI Readiness Index
    • Tech Sovereignty Index
    • CivitasAI Health Index
    • Predictions
    • Financial reports
    • Opinion
    • SWOT
Notification
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Personalize
FinOracleFinOracle
Font ResizerAa
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Search
  • Quick Access
    • Home
    • Contact Us
    • Blog Index
    • History
    • My Saves
    • My Interests
    • My Feed
  • Categories
    • Economy
    • Travel
    • Gossip
    • Business
    • Fashion
    • Health

Top Stories

Explore the latest updated news!
Christmas Tree Shortages Loom Amid Trade Tariffs and Supply Chain Challenges | FinOracle

Christmas Tree Shortages Loom Amid Trade Tariffs and Supply Chain Challenges

Zendesk Unveils AI Agent Capable of Resolving 80% of Customer Support Issues | FinOracle

Zendesk Unveils AI Agent Capable of Resolving 80% of Customer Support Issues

Bill Gates-Backed Startup Savor Raises M to Reinvent Butter Without Cows | FinOracle

Bill Gates-Backed Startup Savor Raises $33M to Reinvent Butter Without Cows

Stay Connected

Find us on socials
248.1kFollowersLike
61.1kFollowersFollow
165kSubscribersSubscribe
Made by ThemeRuby using the Foxiz theme. Powered by WordPress
Technology

Microsoft Boosts Security by Eliminating Unused Apps

Lilu Anderson
Last updated: 24.09.2024 8:40 pm
By Lilu Anderson
Share
Microsoft Boosts Security by Eliminating Unused Apps | FinOracle
Photo: Finoracle.net
SHARE

Reducing Attack Surface Area
As part of its ambitious Secure Future Initiative (SFI), Microsoft has taken significant steps to enhance its cloud security by eliminating 730,000 unused applications and 5.75 million inactive tenants. This move is aimed at reducing the potential areas where cybercriminals can exploit vulnerabilities.

To put it simply, think of these applications and tenants like rooms in a hotel. If too many rooms are left open and unattended, they can become easy targets for intruders. By closing these unused rooms, Microsoft is making its 'hotel'—or cloud environment—much safer.

Strengthening Identity Verification
Microsoft has introduced more stringent identity verification processes, such as video-based verification for 95% of its production staff. They've also updated their Entra ID and Microsoft Account (MSA) systems to better handle the creation, storage, and rotation of access keys in the cloud. This is similar to changing your locks regularly to ensure that only authorized people have access.

Enhancements in Device Security
Deploying 15,000 new, locked-down devices for software production teams is another critical step. These devices are like secure safes that are hard to break into, ensuring that sensitive operations are conducted in a controlled environment.

Network and System Security
To boost network security, Microsoft now maintains a comprehensive inventory of over 99% of physical assets. This means they have a detailed list of all equipment in their network, helping to prevent unauthorized access. Additionally, virtual networks are isolated from the corporate network, much like keeping a visitor's area separate from private offices.

Engineering Systems Protection
Microsoft has streamlined its software development process by using centrally managed pipeline templates. This means 85% of its production builds for the commercial cloud now follow a standard, secure method. It's akin to using a trusted recipe for cooking to ensure the same high-quality outcome every time.

Organizational Changes for Security
In efforts to hold top executives accountable for security, Microsoft has tied their compensation to achieving specific security goals. This creates an environment where everyone from the top down is focused on maintaining secure systems.

Response to Previous Breaches
These enhancements follow major breaches in Microsoft's network by groups like China’s Storm-0558 and Russia’s Midnight Blizzard. The attacks exposed vulnerabilities, prompting Microsoft to revamp its security culture and strategies.

The U.S. Department of Homeland Security's Cyber Safety Review Board gave recommendations on improving identity and authentication methods, which Microsoft has acted upon. By addressing these areas, Microsoft aims to build a robust defense against future threats.

Microsoft's dedication is further highlighted by allocating resources equivalent to 34,000 full-time engineers towards this initiative, marking it as one of the largest cybersecurity efforts in history.

Overall, Microsoft's comprehensive measures under the SFI reflect its commitment to reducing vulnerabilities and enhancing security to protect its cloud environment and user data.

TAGGED:AIARAssetAttack surfaceAuthenticationBETCementCESChinaCloudCultureCyber Safety Review BoardCybersecurityDataEngineerengineeringETHFutureGoalHistoryInfrastructureInventoryIonIronLightMicrosoftMicrosoft accountOrganizationPipelinePotentialResourceRussiaRustSECSecuritySecurity cultureSoftwareSoftware developmentSoftware development processSystemTeaThreatsTimeUSWar
Share This Article
Facebook Copy Link Print
Lilu Anderson
ByLilu Anderson
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.

Related Stories

Uncover the stories that related to the post!
Bitcoin Falls to Two-Month Lows as GBTC Bleeding Continues | FinOracle
Bitcoin

Bitcoin Falls to Two-Month Lows as GBTC Bleeding Continues

Warren Buffett Trims Apple Stake, Portfolio Shake-up | FinOracle
Business

Warren Buffett Trims Apple Stake, Portfolio Shake-up

CFTC declares Ethereum & Litecoin commodities in KuCoin case | FinOracle
Ethereum

CFTC declares Ethereum & Litecoin commodities in KuCoin case

Ethereum L2s Lead in Total Value Locked: Exceeding Other Blockchains | FinOracle
Ethereum

Ethereum L2s Lead in Total Value Locked: Exceeding Other Blockchains

Regeneron Pharmaceuticals: Biotech Darling Rising | FinOracle
Business

Regeneron Pharmaceuticals: Biotech Darling Rising

DSM-Firmenich's Profit Surge: What's Next? | FinOracle
Business

DSM-Firmenich’s Profit Surge: What’s Next?

Two Charged in 0M Cryptocurrency Heist | FinOracle
Crypto

Two Charged in $230M Cryptocurrency Heist

Should You Invest in Nvidia or Bitcoin? An Analysis | FinOracle
Business

Should You Invest in Nvidia or Bitcoin? An Analysis

Show More
FinOracle

Ready for Core Web Vitals, Support for Elementor, With 1000+ Options Allows to Create Any Imaginable Website. It is the Perfect Choice for Professional Publishers.

  • Quick Links
  • AI
  • AR
  • US
  • Market
  • CES
  • Ion
  • Potential
  • SEC
  • Port
  • War

Quick Links

  • My Feed
  • My Interests
  • History
  • My Saves

About US

  • Adverts
  • Our Jobs
  • Term of Use

© 2025 All Rights Reserved. Design & Developed By Selentium Group AG

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Continue with Google
Continue with Microsoft
Not a member? Sign Up