Google criticizes Microsoft’s security practices in new report

May 21, 2024 Google has publicly criticized Microsoft for a series of security missteps, suggesting that organizations might consider more secure alternatives. This criticism follows a number of high-profile security incidents at Microsoft, including breaches that allowed unauthorized access to email accounts of high-level US government officials and Microsoft’s own corporate accounts.

According to a paper released by Google, these incidents demonstrate a “cascade of security failures” at Microsoft, undermining the tech giant’s security culture and governance. Google’s report leverages findings from the US Cyber Security Review Board (CSRB), which highlighted significant shortcomings in Microsoft’s response to the intrusions.

One notable breach involved Chinese-affiliated hackers known as Storm-0558, who exploited a stolen signing key to access Microsoft Exchange Online accounts globally. Another breach, attributed to the Russian-linked group Midnight Blizzard, involved the compromise of Microsoft’s internal email accounts, including those of its security and legal teams. Google’s report criticizes Microsoft for the ongoing nature of these breaches and for its delayed corrective actions.

In contrast, Google touts its own security measures, citing its transparent and proactive response to the 2009 Operation Aurora attack, which targeted Gmail accounts. Google is positioning its Workspace products as a more secure alternative, highlighting its commitment to security transparency and risk management.

Google’s new Secure Alternative Program offers discounted rates for its Google Workspace Enterprise Plus and Mandiant incident response services, directly challenging Microsoft’s Secure Future Initiative aimed at overhauling its security practices following these incidents.

Top Stories

Related Articles

January 15, 2026 Chinese customs authorities have effectively barred Nvidia’s H200 artificial intelligence chips from entering the country, according to more...

January 15, 2026 A new survey suggests much of the promised productivity is being quietly clawed back. While 92 per more...

January 15, 2026 For months, the U.S. Supreme Court poured extraordinary effort into finding the source of the leaked draft more...

January 14, 2026 Anthropic says that more than 90 per cent of the software powering new versions of Claude is more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn