Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include Face Check—a privacy-respecting facial matching feature[…]
Leggi di piùIn the cybersecurity industry, there are many events to choose from. You as a cybersecurity professional are left wondering which[…]
Leggi di piùThe power of endpoint management Learn how to empower your workforce Today, we are taking a significant step in completing[…]
Leggi di piùJupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations[…]
Leggi di piùThe post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog. Source: Microsoft[…]
Leggi di piùThe Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our[…]
Leggi di piùOn January 25, 2024, we published the 2024 release wave 1 plans for Microsoft Dynamics 365 and Microsoft Power Platform, a compilation of new capabilities[…]
Leggi di piùThis blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In a scenario familiar[…]
Leggi di piùThe legal profession is known for being cautious or hesitant to adopt new technologies. However, when it comes to AI,[…]
Leggi di piùToday Microsoft Incident Response are proud to introduce two one-page guides to help security teams investigate suspicious activity in Microsoft[…]
Leggi di piùSince November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern[…]
Leggi di piùNumerous cybersecurity tools exist to help organizations protect their data, people, and systems. There are different tools that check emails[…]
Leggi di più