Microsoft has over 6.5 trillion different security signals entering its ecosystem every day, so Microsoft knows a lot about keeping customer data safe, so what are the key security principles that guide us in today's evolving technology landscape?
Bret Arsenault, Vice President and Chief Information Security Officer, Microsoft
"Something has changed," said Bret Arsenault, Microsoft's vice president and chief information security officer. "It used to be great to have a network that managed everything within the perimeter. But today, in this client-to-cloud world, with the rapid growth of mobile devices, cloud services and the Internet of Things , that model no longer works."
So what works? In a recent interview, Arsenault discussed the development of security, key principles, and gaining customer trust.
Security built from the ground up
According to Arsenault, Microsoft did have a separate security division, but Microsoft changed its strategy and decided to build security into every product from scratch, making sure everything is security-centric. In fact, security should be fully embedded in the product, and it will appear as if the security component has disappeared.
"We thought the better way was to bake security into everything we do," Arsenault said. "Security is built into everything. So we took a step back and changed the way we look at security and made it easier for developers, end users and administrators to implement security, and it's just one component of the overall experience."
Making security part of the corporate culture and part of the product helps simplify the process of data protection and provides innovative methods. Arsenault said that abandoning passwords is actually a safer way in the long run, especially when people use biometric security modes (such as voice and fingerprint recognition) as passwords.
"The user experience is much better when using biometric mode. In biometric mode, disorder is more difficult, which makes it more difficult to hack. More importantly, this method is locally bound to the device and cannot be manipulated from elsewhere. I think this is a very important point that people misunderstand about biometric technology. Only when it is placed locally can this method really work."
It is also important to ensure that security is evolving as customer practices and issues change. Automation and diversification of data is critical to help understand customers and their behaviors. For example, authentication data should be mapped to email data, which is mapped to endpoint data, which is mapped to service data, and so on, Arsenault noted.
“For example, we update 1.2 billion devices every month, and we do 630 billion authentications every month. So the ability to correlate things in motion gives us a range of insights to protect in ways that we haven’t been able to before.”
Security is important, but building trust with customers is also essential—and it’s not easy to truly gain customer trust. Arsenault explained that transparency can help customers understand how their data is being used or at rest, which is key to helping them protect their data. Building a high level of trust helps maintain customer confidence, even when security issues arise.
“Little things add up, and that’s how you build trust. You should make sure you have strict operations and processes in place in this regard.”
Previous article:The high bandwidth and low latency brought by 5G is a huge development opportunity for the security industry
Next article:Necessity of liveness detection in face access control system
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- SinlinxA33 development board Linux kernel workqueue (with actual test code)
- (Extra 2) GD32L233 Evaluation-Development Environment Construction (Basic Framework + FreeRTOS + Compilation Passed)
- Hardware structure of TMS320C55x
- Experience sharing on software management in the field of engine control in the automotive industry
- Antenna Principles (Harbin Institute of Technology)
- Xunwei iMX6 development board-device tree kernel-register device routine
- [RPi PICO] Using inline assembly to implement trigger ADC sampling and register viewing
- Measuring remote controls with an oscilloscope
- "Play Board" + Shared Bicycle Control Board - GPRS Module SIM800C
- Quick, help me calculate the baud rate error problem, click here to see the picture and formula