8 Aprile 2025
[In preview] Private Preview: Threat Detection in Azure Backup Powered by MDC

We are excited to announce the Private Preview of an advanced Threat Detection capability in Azure Backup, now integrated with Microsoft Defender for Cloud (MDC). This new feature enables you to assess the health of their Azure VM backup RPs by identifyin Source: Microsoft Azure – aggiornamenti

Read More
8 Aprile 2025
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity

Microsoft launched its Cybersecurity Governance Council in 2024, and with it, named a group of deputy chief information security officers that ensure comprehensive oversight of the company’s cybersecurity risk, defense, and compliance. These leaders work in tandem with product and engineering leaders across the company to create accountability[…]

Read More
8 Aprile 2025
The transformative impact of AI and generative AI on OSS and BSS in telecommunications

As telecommunications operators grapple with exponential growth in data usage and the demands of modern consumers, the role of operations support systems (OSS) and business support systems (BSS) is being reimagined to address these pressures. Once defined by siloed architectures and manual processes, core systems are now evolving[…]

Read More
7 Aprile 2025
Tech Accelerator: Azure security and AI adoption

Are you looking for guidance on how to effectively integrate security best practices within your Azure and AI projects? We know the pace of technological innovation offers as many opportunities as it does challenges. However, security cannot be an afterthought as you create Azure deployments and accelerate AI[…]

Read More
3 Aprile 2025
Threat actors leverage tax season to deploy tax-themed phishing campaigns

As Tax Day approaches in the United States on April 15, Microsoft has observed several phishing campaigns using tax-related themes for social engineering to steal credentials and deploy malware. These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse[…]

Read More