16 Aprile 2025
The face of government service delivery is changing as AI and cloud capabilities continue to expand

In Burlington, Ontario, life has gotten just a little easier for building contractors—and measurably more efficient for the city government.   With a growing demand for housing in this municipality of 200,000 people, the City wanted to ease the burden of obtaining a building permit. As with many government[…]

Read More
16 Aprile 2025
Preview upcoming Dynamics 365 features at the Microsoft Business Applications Launch Event

Adaptation and change are the only constants in business—and the pace is accelerating. To thrive, your business needs the right tools, from AI-powered insights to low-code solutions, designed to help you adapt faster, enhance customer experiences, and boost efficiency. Register for the Microsoft Business Applications Launch Event Join[…]

Read More
16 Aprile 2025
[Launched] Generally Available: Microsoft Azure Available from New Azure for U.S. Government Secret Cloud Region in the US

A new Azure for U.S. Government Secret cloud region is now generally available. With multiple geographically separate regions, Azure for U.S. Government Secret provides customers with multiple options for data residency, continuity of operations, and res Source: Microsoft Azure – aggiornamenti

Read More
16 Aprile 2025
Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Microsoft maintains a continuous effort to protect its platforms and customers from fraud and abuse. From blocking imposters on Microsoft Azure and adding anti-scam features to Microsoft Edge, to fighting tech support fraud with new features[…]

Read More
15 Aprile 2025
Threat actors misuse Node.js to deliver malware and other malicious payloads

Since October 2024, Microsoft Defender Experts (DEX) has observed and helped multiple customers address campaigns leveraging Node.js to deliver malware and other payloads that ultimately lead to information theft and data exfiltration. While traditional scripting languages like Python, PHP, and AutoIT remain widely used in threats, threat actors[…]

Read More