16 Settembre 2025
Microsoft Purview innovations for your Fabric data: Unify data security and governance for the AI era

The Microsoft Fabric and Purview teams are thrilled to participate in the European Microsoft Fabric Community Conference September 15-18, 2025, in Vienna, Austria. This event is Microsoft’s largest tech conference in Europe, where data professionals gather to connect and share insights on data, security, governance, and AI transformation.[…]

Read More
11 Settembre 2025
Dataverse Auditing: Enhancing Trust and Transparency in the Age of AI 

As organizations advance in the digital era, strong data governance is essential. With AI-driven operations and growing business demands, greater transparency and oversight are required. Microsoft Dataverse, central to Power Platform solutions, now offers enhanced auditing features—including AI-assisted agent events, user label tracking, privacy compliance, retention policies, and[…]

Read More
11 Settembre 2025
Announcing General Availability of Power Pages Search with Generative AI Summarization

We are pleased to announce the General Availability (GA) of Power Pages Search with Generative AI Summarization. This capability enhances the search experience on Power Pages sites by combining traditional search with AI-generated summaries, helping site visitors find information more efficiently and in the language that they are[…]

Read More
5 Settembre 2025
Azure mandatory multifactor authentication: Phase 2 starting in October 2025

As cyberattacks become increasingly frequent, sophisticated, and damaging, safeguarding your digital assets has never been more critical, and at Microsoft, your security is our top priority. Microsoft research shows that multi-factor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security[…]

Read More
2 Settembre 2025
Power Apps’ User defined functions GA

We are thrilled to announce that User defined functions (UDFs) in Power Apps have reached general availability! They are now ready for your production workloads. Thank you to everyone who provided valuable feedback on this feature and helped us reach this milestone! With version 2508.3 the UDF preview[…]

Read More
27 Agosto 2025
Storm-0501’s evolving techniques lead to cloud-based ransomware

Microsoft Threat Intelligence has observed financially motivated threat actor Storm-0501 continuously evolving their campaigns to achieve sharpened focus on cloud-based tactics, techniques, and procedures (TTPs). While the threat actor has been known for targeting hybrid cloud environments, their primary objective has shifted from deploying on-premises endpoint ransomware to[…]

Read More
27 Agosto 2025
Microsoft ranked number one in modern endpoint security market share third year in a row

Amidst the backdrop of a surging number of ransomware campaigns worldwide, organizations have increasingly chosen Microsoft Defender’s endpoint security as their preferred solution. It’s engineered to disrupt cyberattacks and not business continuity. As a result, for a third year a row, Microsoft has been ranked number one for[…]

Read More
26 Agosto 2025
Securing and governing the rise of autonomous agents​​

In this blog, you will hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what[…]

Read More
21 Agosto 2025
Think before you Click(Fix): Analyzing the ClickFix social engineering technique

Over the past year, Microsoft Threat Intelligence and Microsoft Defender Experts have observed the ClickFix social engineering technique growing in popularity, with campaigns targeting thousands of enterprise and end-user devices globally every day. Since early 2024, we’ve helped multiple customers across various industries address such campaigns attempting to[…]

Read More
20 Agosto 2025
Quantum-safe security: Progress towards next-generation cryptography

Quantum computing promises transformative advancements, yet it also poses a very real risk to today’s cryptographic security. In the future scalable quantum computing could break public-key cryptography methods currently in use and undermine digital signatures, resulting in compromised authentication systems and identity verification. Starting your journey to become[…]

Read More