Posted on May 8, 2019
The announcement by Microsoft that the Edge web browser is moving to the Chromium engine is quite significant, and indicates that Microsoft has embraced the concept of open source software and will likely leverage open source code in the future for additional major development projects. The shift also indicates the full retirement of the antiquated and vulnerable Internet Explorer web browser. The use of Internet Explorer by the average personal computer user has pretty much vanished, as Microsoft no longer includes the software within new versions of Windows. However, the use of Internet Explorer legacy software is still quite common within the enterprise environment as there are many older applications that require the use of IE or related plugins.
In these latest releases, Microsoft appears to have created an 'IE View Mode' whereby users of the Edge browser can interface with legacy applications that require IE browsers. This appears to be available in order to provide backwards compatibility to enterprise customers - the documentation released by Microsoft last month talks about the 'Enterprise Mode': https://docs.microsoft.com/en-us/microsoft-edge/deploy/emie-to-improve-compatibility
It will be interesting to see how the backwards comparability features play out in the wild as they relate to the use of client side browser exploits and other legacy/enterprise software client side attack vectors. While it can be presumed that many of the common exploitable vectors in IE are now gone due to the use of the Chromium engine - it is always possible (and likely) that new vulnerabilities will emerge that did not previously exist, and attack methods will evolve to make use of these new features in ways that were not intended or anticipated during development. Backwards compatibility is oftentimes a vector that allows for exploitation of 'updated' software.
For more on the topic: https://www.verdict.co.uk/microsoft-build-internet-explorer-edge/
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 9 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.