Microsoft’s cyber summit all talk, no transparency?

Click here to visit Original posting

On September 10, Microsoft hosted a Cyber Summit that could have far-reaching implications for the future of cybersecurity. Unfortunately, while this summit could be a game changer, it was behind closed doors—leaving many of us on the outside looking in. We’ve seen this pattern before: a breach happens, Microsoft apologizes, promises to do better, and then... not much changes. If the tech giant really wants to make meaningful strides, it’s going to have to change not just its security practices, but also how it engages with the broader community.

The transparency dilemma: come on, Microsoft—let us in!

First things first: Transparency. Microsoft’s refusal to invite both the press and the public to this Cyber Summit raises eyebrows, if not alarms. Sure, we can appreciate the need for candid discussions behind closed doors, but this summit wasn’t just a boardroom briefing—it’s a conversation that impacts millions of users. After all, breaches don’t discriminate between corporations, governments, or everyday consumers.

Microsoft has an enormous opportunity here, but it seems more interested in controlling the narrative than engaging in open dialogue. If the summit is all about polishing its image rather than tackling real issues, that’s a problem. Security isn’t something you sweep under the rug, especially not when your mistakes have affected millions of Windows devices, like the CrowdStrike update debacle earlier this year.

Bring in the experts: why diverse collaboration matters

In cybersecurity, diversity of thought is crucial. And no, I’m not talking about diversity in a corporate HR sense (though that’s important too). I’m talking about bringing together diverse security perspectives—white-hat hackers, pentesters, and researchers—who can test the strength of Microsoft’s systems in ways that in-house teams simply can’t. The more eyes on the problem, the better the chances of finding vulnerabilities before the bad guys do.

Microsoft should be actively collaborating with these experts, not just keeping them at arm’s length. Let’s be real here: The stakes are too high to let pride get in the way of progress. Closed-door summits limit the scope of collaboration, which is not what the cybersecurity community needs. Microsoft owes it to their user base, and to the entire tech world, to listen to those outside voices.

The kernel conundrum: explaining the tech in simple terms

Here’s where things get a little technical. But stay with me—I promise it’s worth it.

The kernel is like the beating heart of your computer’s operating system. It controls everything, from how apps interact with your hardware to how secure your system is. In essence, if the kernel is compromised, your entire system is vulnerable. And here’s the kicker: Microsoft currently allows third-party access to the kernel for certain applications (think of it like giving the keys to your house to the plumber). While this access can be necessary for security software, it also opens the door to a slew of potential security risks.

Just look at the CrowdStrike fiasco. A small error in a CrowdStrike update caused major outages across 8.5 million devices. Why? Because that update had kernel-level access, allowing it to affect fundamental parts of the Windows operating system.

The solution: restrict kernel access... but not completely

One obvious solution is for Microsoft to restrict kernel access altogether. But that’s not as simple as flipping a switch. Security software needs to access the kernel to monitor the system properly, and if Microsoft locks it down completely, third-party security vendors might lose the visibility they need to protect users effectively.

So what’s the middle ground? Other operating systems have found solutions that could serve as models. For instance, Apple’s System Integrity Protection (SIP) limits what can be done to the kernel by restricting root user access. This ensures that even if a hacker gains access to the system, they can’t make changes at the deepest level. Similarly, Linux has something called eBPF (Extended Berkeley Packet Filter), which allows for safe, controlled execution of programs within the kernel. Microsoft should explore implementing these kinds of technologies, or at least something similar.

This doesn’t mean shutting out third parties entirely. Instead, Microsoft could collaborate more closely with security vendors to give them safe, controlled access to the kernel, allowing them to continue protecting users without compromising the system’s integrity.

Potential solutions: Microsoft, here’s what you can do

1. Implement More Granular Kernel Controls: Microsoft could offer more restricted kernel access for trusted applications, much like Apple’s SIP. This would allow security vendors to do their jobs while keeping the system safe from rogue apps.

2. Adopt a More Open Collaborative Framework: It’s time for Microsoft to invite more diverse voices into the conversation. From pentesters to white-hat hackers, more eyes on the problem means a better chance of finding and fixing vulnerabilities before they’re exploited.

3. Transparency at Every Level: No more closed-door summits. Microsoft must foster open, ongoing dialogues with security experts and customers alike, keeping them informed not just about past failures, but about future solutions.

4. Adopt and Implement Best Practices from Competitors: Look to what Linux and Apple have done to enhance kernel security. These platforms offer valuable lessons that could easily be adapted to improve the security of Windows systems.

Microsoft must lead with openness

As the company with the largest market share in the computer security space, Microsoft has a responsibility to be more transparent and open about its plans. Cybersecurity is a community effort. It’s like a neighborhood watch—everyone needs to be in on the plan, and everyone needs to share information to keep the neighborhood safe. But if Microsoft keeps holding closed-door meetings, they’re cutting off valuable input from the people who know how to improve the security of their products.

The bottom line? Microsoft, it’s time to stop issuing apologies and playing the blame game and instead start collaborating with the broader security community. The more you open up, the stronger we’ll all be. And who knows? Maybe we can finally stop having to patch up Windows like it’s an old boat springing new leaks every few weeks.

We've featured the best customer experience (CX) tool.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro