20 Febbraio 2024
Navigating NIS2 requirements with Microsoft Security solutions

The Network and Information Security Directive 2 (NIS2) is a continuation and expansion of the previous European Union (EU) cybersecurity directive introduced back in 2016. With NIS2, the EU expands the original baseline of cybersecurity risk management measures and reporting obligations to include more sectors and critical organizations.[…]

Read More
14 Febbraio 2024
Cyber Signals: Navigating cyberthreats and strengthening defenses in the era of AI

The world of cybersecurity is undergoing a massive transformation. AI is at the forefront of this change, and has the potential to empower organizations to defeat cyberattacks at machine speed, address the cyber talent shortage, and drive  innovation and efficiency in cybersecurity. However, adversaries can use AI as[…]

Read More
14 Febbraio 2024
Staying ahead of threat actors in the age of AI

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. At[…]

Read More
12 Febbraio 2024
How Microsoft Power Platform is driving real-world impact—January customer success stories

Industry leading organizations across the globe are using Microsoft Power Platform to build applications, automate business processes, and drive innovation. In our recent earnings call, we highlighted that there are more than 10,000 organizations already utilizing Microsoft Copilot Studio to craft tailored copilots. With more than 230,000 organizations[…]

Read More
8 Febbraio 2024
Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team

Organizations everywhere are on a lightning-fast learning trajectory to understand the potential of generative AI and its implications for their security, their workforce, and the industry at large. AI is quickly becoming a force multiplier—presenting significant opportunities for security teams to increase productivity, save time, upskill resources, and[…]

Read More
6 Febbraio 2024
Microsoft Entra Verified ID introduces Face Check in preview

Today, I’m thrilled to announce the expansion of Microsoft Entra Verified ID to include Face Check—a privacy-respecting facial matching feature for high-assurance verifications, which is now in preview. Watch the video to learn more and read on for how you can get started today. Try Face Check for yourself.[…]

Read More
1 Febbraio 2024
Connect with Microsoft at these cybersecurity events in 2024

In the cybersecurity industry, there are many events to choose from. You as a cybersecurity professional are left wondering which events are worth your time. Each year, Microsoft hosts and participates in numerous events focused on equipping security professionals of all levels with the knowledge, skills, and tools[…]

Read More
1 Febbraio 2024
3 new ways the Microsoft Intune Suite offers security, simplification, and savings

The power of endpoint management Learn how to empower your workforce  Today, we are taking a significant step in completing the delivery of functionality we promised when we first unveiled the vision for the Microsoft Intune Suite.1 We are launching three new solutions: Microsoft Intune Enterprise Application Management,[…]

Read More
29 Gennaio 2024
Join us at InfoSec Jupyterthon 2024

Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code,[…]

Read More
29 Gennaio 2024
Best practices in moving to cloud native endpoint management

The post Best practices in moving to cloud native endpoint management appeared first on Microsoft Security Blog. Source: Microsoft Security

Read More