The world of cybersecurity is undergoing a massive transformation. AI is at the forefront of this change, and has the potential to empower organizations to defeat cyberattacks at machine speed, address the cyber talent shortage, and drive innovation and efficiency in cybersecurity. However, adversaries can use AI as[…]
Read MoreOver the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. At[…]
Read MoreIndustry leading organizations across the globe are using Microsoft Power Platform to build applications, automate business processes, and drive innovation. In our recent earnings call, we highlighted that there are more than 10,000 organizations already utilizing Microsoft Copilot Studio to craft tailored copilots. With more than 230,000 organizations[…]
Read MoreOrganizations everywhere are on a lightning-fast learning trajectory to understand the potential of generative AI and its implications for their security, their workforce, and the industry at large. AI is quickly becoming a force multiplier—presenting significant opportunities for security teams to increase productivity, save time, upskill resources, and[…]
Read MoreToday, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include Face Check—a privacy-respecting facial matching feature for high-assurance verifications, which is now in preview. Watch the video to learn more and read on for how you can get started today. Try Face Check for yourself.[…]
Read MoreIn the cybersecurity industry, there are many events to choose from. You as a cybersecurity professional are left wondering which events are worth your time. Each year, Microsoft hosts and participates in numerous events focused on equipping security professionals of all levels with the knowledge, skills, and tools[…]
Read MoreThe power of endpoint management Learn how to empower your workforce Today, we are taking a significant step in completing the delivery of functionality we promised when we first unveiled the vision for the Microsoft Intune Suite.1 We are launching three new solutions: Microsoft Intune Enterprise Application Management,[…]
Read MoreJupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code,[…]
Read MoreThe post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog. Source: Microsoft Security
Read MoreThe Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight[…]
Read More