Microsoft’s cyber summit all talk, no transparency?

Padlock against circuit board/cybersecurity background
(Image credit: Future)

On September 10, Microsoft hosted a Cyber Summit that could have far-reaching implications for the future of cybersecurity. Unfortunately, while this summit could be a game changer, it was behind closed doors—leaving many of us on the outside looking in. We’ve seen this pattern before: a breach happens, Microsoft apologizes, promises to do better, and then... not much changes. If the tech giant really wants to make meaningful strides, it’s going to have to change not just its security practices, but also how it engages with the broader community.

Eric O'Neill

Founder of The Georgetown Group and NeXasure AI.

The transparency dilemma: come on, Microsoft—let us in!

First things first: Transparency. Microsoft’s refusal to invite both the press and the public to this Cyber Summit raises eyebrows, if not alarms. Sure, we can appreciate the need for candid discussions behind closed doors, but this summit wasn’t just a boardroom briefing—it’s a conversation that impacts millions of users. After all, breaches don’t discriminate between corporations, governments, or everyday consumers.

Microsoft has an enormous opportunity here, but it seems more interested in controlling the narrative than engaging in open dialogue. If the summit is all about polishing its image rather than tackling real issues, that’s a problem. Security isn’t something you sweep under the rug, especially not when your mistakes have affected millions of Windows devices, like the CrowdStrike update debacle earlier this year.

Bring in the experts: why diverse collaboration matters

In cybersecurity, diversity of thought is crucial. And no, I’m not talking about diversity in a corporate HR sense (though that’s important too). I’m talking about bringing together diverse security perspectives—white-hat hackers, pentesters, and researchers—who can test the strength of Microsoft’s systems in ways that in-house teams simply can’t. The more eyes on the problem, the better the chances of finding vulnerabilities before the bad guys do.

Microsoft should be actively collaborating with these experts, not just keeping them at arm’s length. Let’s be real here: The stakes are too high to let pride get in the way of progress. Closed-door summits limit the scope of collaboration, which is not what the cybersecurity community needs. Microsoft owes it to their user base, and to the entire tech world, to listen to those outside voices.

The kernel conundrum: explaining the tech in simple terms

Here’s where things get a little technical. But stay with me—I promise it’s worth it.

The kernel is like the beating heart of your computer’s operating system. It controls everything, from how apps interact with your hardware to how secure your system is. In essence, if the kernel is compromised, your entire system is vulnerable. And here’s the kicker: Microsoft currently allows third-party access to the kernel for certain applications (think of it like giving the keys to your house to the plumber). While this access can be necessary for security software, it also opens the door to a slew of potential security risks.

Just look at the CrowdStrike fiasco. A small error in a CrowdStrike update caused major outages across 8.5 million devices. Why? Because that update had kernel-level access, allowing it to affect fundamental parts of the Windows operating system.

The solution: restrict kernel access... but not completely

One obvious solution is for Microsoft to restrict kernel access altogether. But that’s not as simple as flipping a switch. Security software needs to access the kernel to monitor the system properly, and if Microsoft locks it down completely, third-party security vendors might lose the visibility they need to protect users effectively.

So what’s the middle ground? Other operating systems have found solutions that could serve as models. For instance, Apple’s System Integrity Protection (SIP) limits what can be done to the kernel by restricting root user access. This ensures that even if a hacker gains access to the system, they can’t make changes at the deepest level. Similarly, Linux has something called eBPF (Extended Berkeley Packet Filter), which allows for safe, controlled execution of programs within the kernel. Microsoft should explore implementing these kinds of technologies, or at least something similar.

This doesn’t mean shutting out third parties entirely. Instead, Microsoft could collaborate more closely with security vendors to give them safe, controlled access to the kernel, allowing them to continue protecting users without compromising the system’s integrity.

Potential solutions: Microsoft, here’s what you can do

1. Implement More Granular Kernel Controls: Microsoft could offer more restricted kernel access for trusted applications, much like Apple’s SIP. This would allow security vendors to do their jobs while keeping the system safe from rogue apps.

2. Adopt a More Open Collaborative Framework: It’s time for Microsoft to invite more diverse voices into the conversation. From pentesters to white-hat hackers, more eyes on the problem means a better chance of finding and fixing vulnerabilities before they’re exploited.

3. Transparency at Every Level: No more closed-door summits. Microsoft must foster open, ongoing dialogues with security experts and customers alike, keeping them informed not just about past failures, but about future solutions.

4. Adopt and Implement Best Practices from Competitors: Look to what Linux and Apple have done to enhance kernel security. These platforms offer valuable lessons that could easily be adapted to improve the security of Windows systems.

Microsoft must lead with openness

As the company with the largest market share in the computer security space, Microsoft has a responsibility to be more transparent and open about its plans. Cybersecurity is a community effort. It’s like a neighborhood watch—everyone needs to be in on the plan, and everyone needs to share information to keep the neighborhood safe. But if Microsoft keeps holding closed-door meetings, they’re cutting off valuable input from the people who know how to improve the security of their products.

The bottom line? Microsoft, it’s time to stop issuing apologies and playing the blame game and instead start collaborating with the broader security community. The more you open up, the stronger we’ll all be. And who knows? Maybe we can finally stop having to patch up Windows like it’s an old boat springing new leaks every few weeks.

We've featured the best customer experience (CX) tool.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

TOPICS

Eric O'Neill is a former FBI counterintelligence operative, cybersecurity consultant, keynote speaker, bestselling author of “Gray Day,” and a founder of The Georgetown Group and NeXasure AI.

Read more
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
An abstract image of a lock against a digital background, denoting cybersecurity.
How cybersecurity jargon creates barriers and wastes resources
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Hands on a laptop with overlaid logos representing network security
Privacy must be a business priority: the urgent need for investment and action
Latest in Pro
Branch office chairs next to a TechRadar-branded badge that reads Big Savings.
This office chair deal wins the Amazon Spring Sale for me and it's so good I don't expect it to last
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
FlexiSpot office furniture next to a TechRadar-branded badge that reads Big Savings.
Upgrade your home office for under $500 in the Amazon Spring Sale: My top picks and biggest savings
Beelink EQi 12 mini PC
I’ve never seen a PC with an Intel Core i3 CPU, 24GB RAM, 500GB SSD and two Gb LAN ports sell for so cheap
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Latest in News
Open AI
OpenAI live stream - could we see a major ChatGPT upgrade?
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
Monster Hunter Wilds
Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection