Header image

Microsoft Makes Security Its 'Top Priority'

Its Secure Future Initiative is now the backbone of its cybersecurity approach.

Microsoft is making security its top priority to ensure that its cybersecurity approach remains robust and adaptive to the evolving threat landscape.

Following the launch of the Secure Future Initiative (SFI) last year, to prepare for the increasing scale and high stakes of cyberattacks by uniting every part of Microsoft to advance cybersecurity protection across our company and products, Charlie Bell, executive vice president of Microsoft Security said security is the top priority at Microsoft, above all else—over all other features.

In a blog post, Bell said the SFI will be a dimension in its hiring decisions, and its work will be guided by the following three security principles:

  1. Secure by design: Security comes first when designing any product or service.

  2. Secure by default: Security protections are enabled and enforced by default, require no extra effort, and are not optional.

  3. Secure operations: Security controls and monitoring will continuously be improved to meet current and future threats.

“Ultimately, Microsoft runs on trust and this trust must be earned and maintained,” Bell said. “As a global provider of software, infrastructure, and cloud services, we feel a deep responsibility to do our part to keep the world safe and secure. Our promise is to continually improve and adapt to the evolving needs of cybersecurity. This is job number one for us.”


Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image