Close

Login

Close

Register

Close

Lost Password

Trending

US Cyber Authority to Investigate Microsoft Breach Related to Cloud Computing & Authentication Infrastructure

Synopsis-

“The Department of Homeland Security (DHS) announced on Friday that a cyber safety organization in the United States will be examining concerns regarding cloud-based identification and authentication infrastructure.”

Recently, Microsoft has faced increased attention after reports revealed that hackers, suspected to be working on behalf of Beijing, obtained one of its cryptographic keys and exploited a coding vulnerability to gain extensive access to the company’s cloud email system.

What does cloud computing & authentication infrastructure do?

Cloud computing and authentication infrastructure have been two new-age technologies that companies are providing to people in America. These large server bases help to manage digitization with ease and allow people to access anything on their computer or mobile from anywhere and anytime. But sometimes, tech companies try to take advantage of these services, and this is what Microsoft has been accused of.

Following the above incident, the Department of Homeland Security (DHS) announced on Friday that a cyber safety organization in the United States will be examining concerns regarding cloud-based identification and authentication infrastructure. This review will also encompass an evaluation of the recent Microsoft breach, which resulted in the theft of emails belonging to US government agencies.

What DHS will Do Now?

According to a statement from the DHS, the Cyber Safety Review Board will investigate the intentional targeting of cloud computing systems.

This review is a response to the U.S. Senator Ron Wyden’s request in July for the Federal Trade Commission, the Cybersecurity and Infrastructure Security Agency, and the Justice Department to take action against Microsoft after the hack.

Alejandro Mayorkas, DHS Secretary, said, “Organizations of all kinds are increasingly reliant on cloud computing to deliver services to the American people, which makes it imperative that we understand the vulnerabilities of that technology,”.

According to the Department of Homeland Security, the Cyber Safety Review Board will offer suggestions to assist organizations in safeguarding their cloud-based accounts against unauthorized access.

Share This Post

Like This Post

0

Related Posts

0
0

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Thanks for submitting your comment!

    RELEATED POST

    EDITOR PICKS