29 Agosto 2024
How energy firms power the world with secure Microsoft technologies

In 2023, the Microsoft Digital Defense Report revealed that critical infrastructure remained a persistent target for cyberthreats, increasing again from the previous year.1 The interconnectivity of the power industry with global commerce makes its infrastructure both essential and vulnerable. Without it, we can no longer power hospitals, heat[…]

Read More
29 Agosto 2024
New Translation Functions in Excel: TRANSLATE and DETECTLANGUAGE

(Originally published on June 27. 2024 by Gedion Alemayehu)   Hey, Microsoft 365 Insiders! I’m Gedion Alemayehu, a Product Manager on the Excel team. I’m very excited to announce the availability of two new functions in Excel for Windows and Excel for Mac: TRANSLATE and DETECTLANGUAGE.   NOTE: These[…]

Read More
29 Agosto 2024
Catch up on changes and comments from others

(Originally published on December 14, 2023 by Rubba Ashwas, Scott McFadden, and Manon Knoertzer)   Hi, Microsoft 365 Insiders! Our names are Rubba, Scott, and Manon, and we’re Product Managers focused on collaborative experiences on web apps. We’re thrilled to announce that, based on your feedback, we have[…]

Read More
28 Agosto 2024
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches that are used while performing a cyberthreat hunt in both pre- and post-compromised environments. This chapter outlines how Microsoft Incident Response, in collaboration with partner security teams, leverages[…]

Read More
28 Agosto 2024
The art and science behind Microsoft threat hunting: Part 3

Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined the strategies, methodologies, and approaches that are used while performing a cyberthreat hunt in both pre- and post-compromised environments. This chapter outlines how Microsoft Incident Response, in collaboration with partner security teams, leverages[…]

Read More