Microsoft is pivoting its company culture to make security a top priority, President Brad Smith testified to Congress on Thursday, promising that security will be “more important even than the company’s work on artificial intelligence.”

Satya Nadella, Microsoft’s CEO, “has taken on the responsibility personally to serve as the senior executive with overall accountability for Microsoft’s security,” Smith told Congress.

His testimony comes after Microsoft admitted that it could have taken steps to prevent two aggressive nation-state cyberattacks from China and Russia.

According to Microsoft whistleblower Andrew Harris, Microsoft spent years ignoring a vulnerability while he proposed fixes to the “security nightmare.” Instead, Microsoft feared it might lose its government contract by warning about the bug and allegedly downplayed the problem, choosing profits over security, ProPublica reported.

This apparent negligence led to one of the largest cyberattacks in US history, and officials’ sensitive data was compromised due to Microsoft’s security failures. The China-linked hackers stole 60,000 US State Department emails, Reuters reported. And several federal agencies were hit, giving attackers access to sensitive government information, including data from the National Nuclear Security Administration and the National Institutes of Health, ProPublica reported. Even Microsoft itself was breached, with a Russian group accessing senior staff emails this year, including their “correspondence with government officials,” Reuters reported.

  • @[email protected]
    link
    fedilink
    English
    1021 year ago

    This statement, from the company that looked at Recall and collectively said “yeah, this is a good idea”.

    • @[email protected]
      link
      fedilink
      English
      25
      edit-2
      1 year ago

      Well recall is why they’re so focused on security now. They want to host every detail of your life. They can’t do that now because their platform is a tire fire.

        • @[email protected]
          link
          fedilink
          English
          101 year ago

          Eh…Windows 3.1, 95, 98SE, XP, and 7 were all pretty great.

          They HAVE released some hot trash. I don’t even remember Vista. I just remember it’s trash.

          • Dave.
            link
            fedilink
            English
            171 year ago

            Eh…Windows 3.1, 95, 98SE, XP, and 7 were all pretty great.

            From a user interface perspective, they were okay, perhaps because by the time people got to XP they’d had a decade of a consistent interface and were just used to its quirks.

            From a security context they were not ok. Not ok at all.

            • @[email protected]
              link
              fedilink
              English
              61 year ago

              I genuinely don’t know if I left my firewall on or off the last time I fiddled with it, on my Windows 7 machine.

              That was like 10 years ago. It’s still my daily use pc. Zero antivirus. Just firefox which was installed 10 years ago. And ad block orgin which was also installed 10 years ago but updated over the years.

              Oddly enough, the only website I have issue with is lemmy.

          • @[email protected]
            link
            fedilink
            English
            31 year ago

            Was it 95 that you could hit cancel at the log in screen and it would let you skip putting in a password?

            Sure it looked pretty, but security was a disaster.

            • Joe Cool
              link
              fedilink
              English
              41 year ago

              Oh, lemmy has cakes. Happy cake day.

              That password was only for network shares/NT domains. 95 didn’t have any concept of users, like DOS.

            • @[email protected]
              link
              fedilink
              English
              31 year ago

              In 98 you could use the accessibility settings in the login page to bypass account password too!

              • Joe Cool
                link
                fedilink
                English
                51 year ago

                I just pressed cancel. Who needs network shares.
                On XP you could start the On Screen Keyboard, open the help for that and then open the explorer by browsing for a different help file.

                MS has a history of security first.

  • @[email protected]
    link
    fedilink
    English
    2261 year ago

    To reinforce the shift in company culture toward “empowering and rewarding every employee to find security issues, report them,” and “help fix them,” Smith said that Nadella sent an email out to all staff urging that security should always remain top of mind.

    Yeah that ought to do it.

    • @[email protected]
      link
      fedilink
      English
      231 year ago

      Same energy as “You have unlimited PTO here, but we also have this nifty little thing called performance metrics”

    • @[email protected]
      link
      fedilink
      English
      1711 year ago

      Lol. Considering it was senior management that ignored staff, this statement is even fucking dumber than it sounds.

    • @[email protected]
      link
      fedilink
      English
      911 year ago

      That’s just barely thoughts-and-prayers level. They could at least schedule a mandatory meeting that interrupts everyone’s day for half an hour.

        • @[email protected]
          link
          fedilink
          English
          491 year ago

          Using the hotline won’t get you fired, but somehow - for totally unrelated reasons - after using it you’ll end up on a PIP with untenable goals, and that will get you fired.

      • rem26_art
        link
        fedilink
        81 year ago

        they could throw a pizza party for their government clients. Less work than fixing the problem

    • Cosmo
      link
      fedilink
      English
      311 year ago

      "Of course, fixing these kinds of issues won’t push your product deadlines back at all. But we’ll be thankful to you! "

    • @[email protected]
      link
      fedilink
      English
      881 year ago

      you can have a propietary os thats secure, but the problem is once you get to the point where youre selling data and allow anything to be installed of course, its no longer secure.

      • @[email protected]
        cake
        link
        fedilink
        English
        35
        edit-2
        1 year ago

        You can’t verify it’s secure if it’s proprietary, so it’s never secure? Having control over other people’s computing creates bad incentives to gain at your user’s expense, so it’s day 1 you should lose trust.

        • @[email protected]
          link
          fedilink
          English
          10
          edit-2
          1 year ago

          id argue arguing the unknown can’t be used to say if its technically secure, nor insecure. If that kind of coding is brought into place, then say any OS using non open source hardware is insecure because the VHDL/Verilog code is not verifiable.

          Unless everyone running an open source version of RISC-V code or a FPGA for their hardware, its a game of goalposts on where someone puts said flag.

          • @[email protected]
            link
            fedilink
            English
            11 year ago

            Security is in degrees. The highest level would indeed use open-source hardware. I hope to build a rig like that someday.

          • @[email protected]
            cake
            link
            fedilink
            English
            2
            edit-2
            1 year ago

            Consider people counting paper votes in an election. Multiple political parties are motivated by their own self interests to watch the counting to prevent each other faking votes. That is a security feature and without it then the validity of the election has a critical unknown making it very sussy.

            An OS using proprietary software is like as an electronic voting machine, we pretend it’s secure to feel better about a failing we can’t change.

            • @[email protected]
              link
              fedilink
              English
              2
              edit-2
              1 year ago

              the problem is the bad actors have direct access to said voting machines. in the case of security, the people creating the OS is not the bad actor typically in question when you think of bad actors, which kind of goes back to the goalpost situation. Unless you knew how everything is designed from the ground up (including the hardware code in whatever language it is) then thats just setting an arbitrary goalpost. basically typical NSA backdoor, or foreign backdoor via hardware situation, independent of the OS. To bluntly place it only at the OS stage is setting said goalpost there when you can really apply it to any part of the line (the chip design, the hardware assembler, the os designer, the software maker). Setting it at the OS level fundamentally means all OS’ are insecure by nature unless you’re actively running it on a FPGA thats constantly getting updates.

              For instance, any CPU with speculative programming fundamentally is insecure and is virtually in all modern processors. never even mind the CPU when the door is already open regardless of the OS.

              • @[email protected]
                cake
                link
                fedilink
                English
                31 year ago

                When I think of bad actors and software I think of security from 3rd parties after the intentions of the authors. Not just security but also privacy and any other anti-features users wouldn’t want. That applies to the OS, apps or drivers. Hardware indeed has concerns like software, which is just a wider conversation about security, which is just part of user/consumer rights.

        • @[email protected]
          link
          fedilink
          English
          441 year ago

          You can have audits done on proprietary software. Just because the public can’t see it doesn’t mean nobody else can.

          • @[email protected]
            cake
            link
            fedilink
            English
            121 year ago

            That just moves requiring trust from the 1st party to 2nd or 3rd party. Unreasonable trust.

            • @[email protected]
              link
              fedilink
              English
              351 year ago

              Do you yourself actually audit the software you use, or do you just trust what others say?

              • @[email protected]
                cake
                link
                fedilink
                English
                6
                edit-2
                1 year ago

                This is like asking if you do scientific experiments yourself or do you trust others’ results. I distrust private prejudice and trust public, verifiable evidence that’s survived peer review.

                • @[email protected]
                  link
                  fedilink
                  English
                  19
                  edit-2
                  1 year ago

                  Scientists in the room who have to base their experiments off other peoples data and results:

                  Tongue in cheek but this is actually giving me particular headache because of some results (not mine) that should have never been published.

                • @[email protected]
                  link
                  fedilink
                  English
                  111 year ago

                  If you’re a big enough organization (like the US government) you can pay anyone you want (or even your own people) to audit Microsoft’s code.

              • circuscritic
                link
                fedilink
                English
                21
                edit-2
                1 year ago

                Wait…you don’t audit every package and dependency before you compile and install?

                That’s crazy risky my man.

                Me? I know security and take it seriously, unlike some people here. I’m actually almost done with my audit and should be ready to finally boot Fedora 8 within the next 6-8 months.

      • TWeaK
        link
        fedilink
        English
        31 year ago

        That’s the crux of it here. Microsoft wanted to get into the data game they saw Facebook and Google reaping. However, Microsoft still charge you for the software they use to harvest your data.

        • @[email protected]
          link
          fedilink
          English
          71 year ago

          I mean you can provide audit findings and results and it’s a pretty big part of vendor management and due diligence but at some point you have to accept risk in using open source software that can be susceptible to supply chain hacks, might be poorly maintained, etc or accept the risk of taking the closed source company’s documentation at face value (and that can also be poorly maintained and susceptible to supply chain attacks)

          There’s got to be some level of risk tolerance to do business and open source doesn’t actually reduce risk. But it can at least reduce enshittification

          • @[email protected]
            link
            fedilink
            English
            101 year ago

            It’s pretty hilarious when people act like being open source means it’s “more secure”. It can be, but it’s absolutely not guaranteed. The xz debacle comes to mind.

            There are tons of bugs in open source software. Linux has had its fair share.

            • @[email protected]
              cake
              link
              fedilink
              English
              3
              edit-2
              1 year ago

              Proprietary software has to be caught being insecure to be “guilty of” being insecure. Free software can be publically verified, effectively “proven innocent” - a much higher standard.

            • @[email protected]
              link
              fedilink
              English
              121 year ago

              The XZ thing is actually a great point to open source’s favor. All it took was some dude to figure it out.

              If you try to inject maligned code, you will be found out. That can’t happen with proprietary software.

              • @[email protected]
                link
                fedilink
                English
                2
                edit-2
                1 year ago

                It highlighted some pretty glaring weaknesses in OSS as well. Over worked maintainers, unvetted contributers, etc etc.

                The XZ thing seems like we got “lucky” more than anything. But that type of attack may have been successful already or in progress elsewhere. It’s not like people are auditing every line of every open source tool/library. It takes really talented devs and researchers to truly audit code.

                I mean, I certainly couldn’t do it for anything semi advanced, super clever, or obfuscated the way the XZ thing was.

                But I agree, that the fact we could audit it at all is a plus. The flip side is: an unvetted bad actor was able to publish these changes because of the nature of open source. I’m not saying bad actors can’t weasel their way into Microsoft, but that’s a much higher bar in terms of vetting.

    • Cosmo
      link
      fedilink
      English
      141 year ago

      I mean what they have to do is obvious, right? Only one of these two options can help increase ad revenue.

  • Bone
    link
    fedilink
    English
    181 year ago

    Oh no. How will I know where I’m going without copilot?!

  • @[email protected]
    link
    fedilink
    English
    31
    edit-2
    1 year ago

    the funniest part of the fall of MS for me has been the cunts getting so excited about fucking off the home users they forgot one vital thing: C-suite and beancounters run at a home user level. And most infrastructure techs will happily flick to a linux distro come server build time.

    Their current direction has also pretty much killed their use in anything related to media distribution, it’s virtually a detailed list of TPN violations

    • deweydecibel
      link
      fedilink
      English
      3
      edit-2
      1 year ago

      a detailed list of TPN violations

      Eh, that’s actually kind of a selling point. I’ve got no interest in an OS on my personal PC that focuses on being made more friendly to the MPA.

  • @[email protected]
    link
    fedilink
    English
    58
    edit-2
    1 year ago

    “Microsoft is pivoting its company culture to make security a top priority…”

    The fact that this had to be stated is a testament to garbage leadership. Notice it’s not even the top priority, just a top priority. These guys will still get bonuses of course.

    • deweydecibel
      link
      fedilink
      English
      131 year ago

      The security will definitely also take a very profitable shape. I.e. further locking the OS away from the user, more black box software, etc.

  • RickRussell_CA
    link
    fedilink
    English
    211 year ago

    Satya Nadella, Microsoft’s CEO, “has taken on the responsibility personally to serve as the senior executive with overall accountability for Microsoft’s security,”

    Err. Wasn’t that already true? He’s chief executive officer, not chief some shit that doesn’t include security officer.

  • @[email protected]
    link
    fedilink
    English
    701 year ago

    My suggestion, based on more than three decades of observing and interacting with this company: don’t believe a fucking thing they say, ever.

  • @[email protected]
    link
    fedilink
    English
    41 year ago

    Rough month for reflection at M$. Possibly finally took it too far with users via Recall and - quite a feat here - showed Microsoft in a negative light for another big solidified base in government.

  • @[email protected]
    link
    fedilink
    English
    30
    edit-2
    1 year ago

    Microsoft focused on security at this point is like a builder focusing on building strong foundations now that the house is built on top.

    It’s a little too late my dudes.

    • @[email protected]
      link
      fedilink
      English
      161 year ago

      I remember them saying all the same exact things in the early 2000s after a slew of widespread disasters. Security will never be a higher priority than whatever cool new thing they want to sell.

    • @[email protected]
      link
      fedilink
      English
      51 year ago

      It would take ripping apart and rewriting hundreds of thousands of lines of source code, if not millions. Not just bloat from one off bright ideas, that led to the next bright ideas, but the deliberate obsfucation to protect proprietary code, in more instances than I can imagine. I’m not a programmer, so I could be wrong, obviously, but from my admittedly limited perspective, they’d be better off writing a whole new OS without all the built-in garbage nobody wants.

      • @[email protected]
        link
        fedilink
        English
        41 year ago

        I think Windows 11 was supposed to be that clean break. They’ve reimplemented a lot of core functionality compared to XP & 7. If they’re still getting breached then they obviously aren’t serious about security.

  • @[email protected]
    link
    fedilink
    English
    101 year ago

    Look at this smug assholes face. He knows damn well they won’t be doing anything of the sort unless it increases their profit margins. And he also knows damn well the government won’t do anything to seriously hinder their margins.

    Bread and circuses. This is just another show. You want change? Stop using Microsoft. Period.

    • @[email protected]
      link
      fedilink
      English
      21 year ago

      That’s all week and good for the minority of jobs that didn’t cling to it like a codependent partner.