Microsoft’s Tom Burt on geopolitics and cybersecurity in the age of AI … – Microsoft

As digital threats proliferate across the world, it’s getting harder to keep them at bay. Wars are now fought both on the ground and in cyberspace. New AI technologies can help ward off cyberattacks or could – in the absence of future regulation – help the bad actors.

These are some of the issues that keep Tom Burt, Microsoft’s corporate vice president of Customer Security and Trust, up at night. We caught up with him during his trip through Asia. He talked about emerging cybersecurity threats in the region and his experience at the IIS Shangri-La Dialogue in Singapore, where defense chiefs met in early June to talk about security challenges in Asia.

Here is an edited transcript.

Q: You were just at the IISS security conference in Singapore. What jumped out at you? Any surprises?

A: Last year, the hybrid war in Ukraine was new and the use of destructive malware by Russia as part of its invasion of Ukraine was new. This year, everyone remains very interested in what the threat environment is and what they can do to address that.

The one part that was surprising, which has gotten quite a bit of press, was the appearance by both the Secretary of Defense of the United States – and his speech – and then his analog, General Li from the People’s Republic of China and his somewhat fiery speech that I think took a number of us by surprise.

It made clear that the tensions between the two nations remain high.

It really reinforced the need for Microsoft to be great partners with the region’s governments and especially to help them have strong, resilient cybersecurity.

Q: You have touched on cybersecurity threats by nation states. How is that evolving and what’s been done since?

A: In terms of the nation state threat landscape, what we’re seeing with Russia is an ongoing effort for its cyber activity to support its invasion and war with Ukraine. What we’ve seen just in the last couple of months is a significant resurgence in cyber activity and most of it has been to gain information, intelligence and understanding of a wide range of targets within Ukraine as well as in the US, the UK and the EU, especially those that are supporting Ukraine’s defense, including private enterprise.

Iran has been stepping up its aggression. Other than Russia in Ukraine, it’s the only other nation state we see at this time utilizing any kind of destructive malware. We’ve seen Iran utilizing ransomware to actually steal money and engaging in a wider range of intelligence-gathering attacks.

Historically, they’ve largely worked in the Middle East and targeted the energy sector, but now we’ve seen them extending that much more broadly around the globe, especially targeting the US and a wider range of sectors.

North Korea has continued to engage in intelligence gathering especially in the region, particularly targeting Japan, but also in the US and other regional targets – especially in academia and think tanks as well as some military technology targets.

But the big development with North Korea is its great success in stealing cryptocurrency equivalent to hundreds of millions of dollars – enough so that their cyber operation has become an important funder of government operations.

And then there’s China.

We’ve seen China continuing and even expanding its cyber operations to gather intelligence and information globally but with a particular focus on the Asia Pacific region, Southeast Asian countries in particular.

The Microsoft Threat Intelligence team recently published a blog on this great work that they did tracking a Chinese actor called Volt Typhoon who engaged in some very creative attacks utilizing IoT devices as a means of gaining entry into networks at critical infrastructure targets in Guam and in the United States.

Q: You mentioned hybrid warfare in Ukraine continuing to be of interest. Are there implications or lessons here for Asia?

A: Maybe the most important lesson was the importance of the hyperscale cloud.

At the outset of the war, one of the first missiles launched by Russia targeted the Ukraine government datacenter. And Ukraine had just recently passed laws to allow them to move to the cloud.

We know it’s the case that security in the hyperscale cloud is much greater than you can ever provide on premise. We proved that in Ukraine, when Microsoft’s Defender for Endpoint used an AI algorithm to identify Russian wiper malware and stop it from being installed in the customer’s network.

With the 65 trillion signals that we get into Microsoft from our global ecosystem every day, we will be able to train ever more capable AI to identify code and systems that are up to no good and protect our customers.

The other lesson we learned was how the work that the Microsoft Threat Intelligence team does to track these nation state actors provides a great resource to help defend against these attacks.

There have been times when we’ve been able to provide that threat intelligence quickly enough to prevent an attack, and there are other times when that threat intelligence has helped them recover more quickly.

Continuing to build partnerships across governments and working together on how we can better defend against cyberthreats is the right solution. The hybrid war in Ukraine makes clear how the private and public sectors need to work together to achieve digital peace. So those are really the key lessons learned.

Source link

Source: News

Add a Comment

Your email address will not be published. Required fields are marked *