Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Contributed Articles

This Cybersecurity Awareness Month, Let’s Focus on Improving our Cyber Defenses

by Roger Cressey
October 25, 2022
in Contributed Articles
Reading Time: 5 mins read
A A
Share on FacebookShare on Twitter

Since 2004, October has been Cybersecurity Awareness Month. The collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) is meant to bring government and industry together to raise awareness about cybersecurity issues at home and abroad. This year’s theme “See Yourself in Cyber” is an all-too-familiar one for a massive legacy technology company that has accounted for 30 percent of all vulnerabilities tracked by CISA this year yet accounts for 85 percent of U.S. government workplace collaboration systems: Microsoft. Several cybersecurity experts have spoken up and acknowledged Microsoft as the weakest link in the chain of defense against malicious threats. Even the CEOs of Tenable, SentinelOne, and CrowdStrike have come out in recent months to not just lament this legacy company’s issues but dissect the “crisis of trust” among its customers, who are increasingly at risk. 
 
Skeptics may argue that any code base as large and as old as Microsoft’s is at risk and that organizations using their products need to get more serious about their security practices. They have a point – innovation is difficult, and some companies are slower to move than others. However, recent developments demonstrate that Microsoft needs to improve to protect its customers. This past week, CISA, the FBI, and the NSA reported that multiple hacking groups exploited vulnerabilities in Microsoft Exchange – the tech giant’s email and calendar server product – to gain “long-term access” to the server of an unnamed defense company. 
 
You don’t have to be a cybersecurity expert to know this isn’t good news. Defense companies do everything from communicating with senior-ranking Pentagon officials to maintaining control facilities for our nation’s strategic deterrent infrastructure. In the wrong hands, data regarding these operations could undermine our defense posture and potentially put national security at risk. Even more alarming is the fact that the security agencies’ joint advisory came only days after Microsoft admitted a zero-day vulnerability in Exchange was being actively exploited by state-sponsored actors in China. The attack had the potential to impact over 200,000 servers globally, including those storing private healthcare records. 
 
This isn’t just to dump on Microsoft. However, Microsoft’s approach to not just defending against vulnerabilities, but resolving them once they’ve been identified, has put thousands of customers at risk reiterating the fact that we need widespread change. Case-in-point: Microsoft took two years to resolve a zero-day flaw it knew was being actively exploited by hackers, finally releasing its own patch long after third-party security companies had stepped in with their own solutions to protect users. We’re seeing the same trend play out regarding the Exchange vulnerabilities discussed above. It took only three days for security experts to discover that Microsoft’s “mitigation recommendations” for the vulnerability were insufficient and could be bypassed. Once again, third parties stepped in with their own fixes, forcing Microsoft to update its guidance. Yet again, the updated mitigations were almost immediately bypassed. Exchange customers are now left in limbo with no proper solution in sight. These are all fixable problems. 
 
There is palpable frustration in Washington and with owners and operators of our nation’s critical infrastructure that the monoculture of a Microsoft ecosystem has created an unacceptable security environment. 
 
So, what’s the solution? Microsoft and other legacy tech vendors must develop better, robust cyber practices at the outset, making DevSecOps a pillar of their software development process. We must also diversify our vendors in the federal government and rid ourselves of anti-competitive bundling and licensing practices that allow legacy tech companies to amass influence without doing the work of protecting our systems. 
 
Most importantly, we must demand change. This change comes from the way government agencies handle their procurement practices. Software products sold to the government must be as safe and secure as possible and if vendors are unwilling or unable to meet this requirement, there should be consequences. OMB’s recently published guidance on secure software development practices is a welcomed – albeit long overdue – first step in the right direction. Microsoft taking responsibility and overhauling the way they do business, and policymakers and leaders demand more from all our cloud providers – particularly those who already control massive amounts of workplace systems. If this change doesn’t happen voluntarily, government agencies must be willing to use their procurement power with legacy IT and cloud vendors to force change. 

The author, Roger W. Cressey is a cyber security and counter-terrorism expert. He has served in senior positions under presidents Bill Clinton and George W. Bush and is a former member of the United States National Security Council staff. He was a Senior Vice President at Booz Allen Hamilton and is currently a partner with Liberty Group Ventures.  

Tags: Contributed ContentCyber DefensescybersecurityNational Cybersecurity Awareness Month

RELATED POSTS

Contributed Articles

Next Generation of TV Providing Secure Public Safety Communications Over the Airwaves Through Advanced Datacasting Solutions

March 24, 2023
Contributed Articles

What’s Missing from the National Cyber Strategy? Speed, Funding, and Accountability

March 23, 2023
Contributed Articles

Automation Reduces Backlog, Gives U.S. Forest Service Tools to Fight Fires

March 16, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9333 shares
    Share 3733 Tweet 2333
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    13 shares
    Share 5 Tweet 3
  • The Five Pillars of Zero Trust Architecture

    430 shares
    Share 172 Tweet 108

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us