![]() “Going forward, federal agencies should insist that software contracts include security logs and other cybersecurity features, so our national security is no longer compromised by a shoddy procurement process.” Ron Wyden of Oregon praised Microsoft for the idea, but warned about firms putting profit above security: “It shouldn’t have taken multiple disastrous hacks of federal systems for Microsoft to make essential security features standard for government customers, but better late than never,” Wyden said in a statement. Cybersecurity and Infrastructure Security Agency, told the Wall Street Journal. ![]() “This is a significant step forward to ensuring that every Microsoft customer has the right visibility to detect other threats that we know are targeting American organizations every day,” Eric Goldstein, executive assistant director for cybersecurity at the U.S. ![]() Other organizations, with lower-tier solutions, had no way of identifying the attack. In this particular case, the State Department used a tool that was only available to Microsoft customers using the company’s highest-tier Microsoft 365 cloud service, known as E5. The incident did speed up the process, though, with Jakkal noting that, “There was clearly an urgency to get this done, given the sophistication of the landscape." Analysis: Why does it matter?Įvent logs cannot prevent cyberattacks, but they are an essential tool in spotting unusual activity on the network, through which IT teams can identify and terminate malicious individuals. Vasu Jakkal, a vice president of security at Microsoft, told the Wall Street Journal that the change didn’t come as a result of the Chinese hack, and that it was in the works for quite some time now.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |