Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Microsoft Security Takes Another Beating as Google Cloud Showcases Microsoft’s Vulnerabilities
Cloud

Microsoft Security Takes Another Beating as Google Cloud Showcases Microsoft’s Vulnerabilities

Bob EvansBy Bob EvansMay 28, 20247 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

Microsoft’s deeply troubling cybersecurity shortcomings took a turn for the worse last week as archrival Google Cloud released a document chronicling Microsoft’s cybersecurity troubles in detail while also making the case for how and why Google Cloud offers a superior approach.

Cloud Wars // Acceleration Economy on Microsoft’s Security Challenges
April 8
Microsoft Cybersecurity Disaster Triggers Customer Doubt, Competitor Opportunity
WATCH: Can Satya Nadella Fix Microsoft’s Cybersecurity Disaster?
May 2
Dear Satya Nadella: Why Are You Whitewashing the Microsoft China Cybersecurity Crisis?
WATCH:
Satya Nadella: Why No Mention of China Cybersecurity Disaster?
May 6
WATCH:
Satya Nadella Addresses Microsoft China Security Disaster
May 9
Can Satya Nadella Repair Microsoft’s Badly Broken Security Culture?
WATCH:
Nadella Overhauls Microsoft Security: Plan Reveals Deep Flaws
May 10
Special Report: Cyber Safety Review Board Report on Microsoft
May 21
WATCH: Special Report: How Microsoft Plans to Regain Trust After Cybersecurity Disaster (by Acceleration Economy cybersecurity analyst Chris Hughes)

Called “A more secure alternative,” the 14-page PDF document from Google Cloud opens with this sledgehammer perspective:

“Microsoft’s ongoing security struggles recently came to a head with a series of high-profile incidents that put its customers at risk. One such incident in the summer of 2023 by the group known as Storm-0558 resulted in the compromise of senior US and U.K. government official accounts, including 22 organizations, over 500 individuals, and tens of thousands of emails.”

That bare-knuckles tone is maintained throughout the document, and while some people at Microsoft might think this approach is overly harsh, a low blow and unfair, I would offer two responses to those objections:

  1. Who’s to blame? Microsoft has no one but itself to blame. As I’ve chronicled in great detail over the past several weeks, the real trouble with Microsoft’s cybersecurity business is not that some cybercriminals were able to successfully execute the Storm-0558 attack — although that’s certainly an extremely serious problem — but rather the underlying corporate-culture failings within Microsoft that precipitated this disaster. (More on that below.)
  2. Who might gain? Google’s not airing Microsoft’s soiled laundry just for kicks — the very title of the document, “A more secure alternative,” represents a direct outreach to customers for whom cybersecurity has become an existential issue. If Google Cloud can indeed make the case that it truly does offer “a more secure alternative” to Microsoft, then it would be a grave disservice to business customers for Google Cloud not to tell the world about what it can do.

The Google Cloud document specifically touts the superior security capabilities of its Workspace productivity and collaboration applications, and does so from a high-level approach. From the opening page of the document, here’s an example of how Google Cloud frames its argument:

“We believe Google Workspace is a safer alternative, with a proven track record of engineering excellence, deep investment in cutting-edge defenses, and a transparent culture that treats providing security for our customers as a profound responsibility. This belief is rooted in battle-tested experience. We know that no organization is immune from highly sophisticated adversaries. In fact, these same nation state actors attacked Google in 2009, and those attacks led us to make far-reaching security improvements that were recognized in the CSRB report: “Google also undertook a comprehensive overhaul of its infrastructure security.”

The key point in this excerpt, I believe, is Google’s very precise reference to having “a transparent culture that treats providing security for our customers as a profound responsibility.” That’s because, as I’ve mentioned in my previous analyses of what must be regarded as a deeply troubling issue for Microsoft, the federal cybersecurity watchdog group — part of the US Department of Homeland Security — whose report enumerated the long list of Microsoft’s security shortcomings was particularly critical of the company’s cultural inadequacies.

In a May 9 analysis headlined “Can Satya Nadella Repair Microsoft’s Badly Broken Security Culture,” I offered this perspective on why the cultural challenge facing Microsoft is every bit as dangerous as the company’s technological shortcomings.

“But now Nadella must confront the enemy within: A massive and wildly successful global corporation that has lost its way so badly in the existential battle against cybercriminals that not only Nadella but also the worldwide head of Microsoft’s security business felt the need late last week to publish long, detailed, and bluntly worded statements designed to showcase Microsoft’s unconditional and unwavering commitment to cybersecurity.

“In a vacuum, those commentaries could be seen as commendable, and as a reaffirmation of an essential mission to ensure the safety and security Microsoft has promised, and of the trust on which Microsoft’s relationships with its largest customers has been built.

“But this most certainly did not happen in a vacuum: The May 3 memo to employees from Nadella and the contemporaneous public blog post from executive vice-president Charlie Bell were both triggered by coverage of a damning report issued by a cybersecurity watchdog team within the United States Department of Homeland Security.”

Ask Cloud Wars AI Agent about this analysis

Now, I’m sure a company as successful as Microsoft is constantly working to improve its processes and outcomes. But that clearly was not the case for its cybersecurity business, and the proof of that assertion can be found in the extensive overhauls outlined by both CEO Nadella and EVP Bell. Both executives outlined sweeping, dramatic, and fairly transformational changes that would result in a security operation and — more importantly — mindset that profoundly different from what they’d been in the past.

The steps each executive touched on are designed to break down internal politics and organizational silos, to establish security as the unconditional #1 priority for development resources and investments, to spread the responsibility to everyone across the vast Microsoft organization, and to directly tie some executive compensation to the enforcement and execution of these new security initiatives.

You can see the Nadella memo here and the Bell document here.

So when Google Cloud, in its “A more secure alternative” whitepaper, runs a headline across the top of page 4 blaring “Microsoft’s pattern of security issues” and then digs into those in detail, Google Cloud clearly has a lot of material with which to work.

Here’s a perfect example from the Google Cloud document, which appeared under a disturbing subhead that says, “Failure to correct inaccurate public statements”:

“The CSRB also noted significant concerns with Microsoft’s handling of the incident, including a ‘decision not to correct, in a timely manner, its inaccurate public statements about this incident’ until ‘the Board was concluding its review and only after the Board’s repeated questioning about Microsoft’s plans to issue a correction.’ As a result, ‘Microsoft’s customers did not have essential facts needed to make their own risk assessments about the security of Microsoft cloud environments in the wake of this intrusion.’ “

Final Thought

If it is indeed true that, as the Google Cloud document states, “Microsoft’s customers did not have essential facts needed to make their own risk assessments about the security of Microsoft cloud environments in the wake of” the China intrusion, then this problem is about as bad as it can possibly get for Microsoft.

Because while Microsoft has, over the past several months, been making lots of noise about its broad “Secure Future Initiative”, I believe many customers will sweep all that talk off the table and demand that before describing how Microsoft plans to secure the future, it had damn well better fix the present.


The AI Ecosystem Q1 2024 Report compiles the innovations, funding, and products highlighted in AI Ecosystem Reports from the first quarter of 2024. Download now for perspectives on the companies, investments, innovations, and solutions shaping the future of AI.

Cloud Wars Cloud Wars Archive collaboration featured Google Cloud Microsoft productivity
Share. Facebook Twitter LinkedIn Email
Founderuser

Bob Evans

Founder
Cloud Wars

Areas of Expertise
  • AI
  • Cloud
  • Digital Business
  • Innovation
  • Leadership
  • LinkedIn

Cloud Wars Founder Bob Evans actively analyzes the Cloud and AI categories through video reports, in-depth analyses, and interviews with the Cloud and AI market’s leaders and innovators. He’s also the creator of the Cloud Wars Top 10, a ranking and ongoing analysis of the world's most influential tech companies driving digital business and the digital economy. Bob is recognized as a world-class strategic communicator focused on emerging business strategy, disruptive innovation, and forward-looking leadership.

  Contact Bob Evans ...

Related Posts

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025

AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare

June 27, 2025

Workday Sets the Standard for Responsible AI with Dual Governance Accreditations

June 27, 2025

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization
  • Workday Sets the Standard for Responsible AI with Dual Governance Accreditations
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.