6 Marzo 2025
Confidently adopt and administer Microsoft Copilot Studio with managed security and governance

In today’s rapidly evolving digital landscape, AI agents are leading the way for innovation across a range of industries. From enhancing customer experiences to streamlining internal processes, these intelligent agents are revolutionizing the way we work and interact. However, with the widespread adoption of AI agents comes the[…]

Read More
5 Marzo 2025
[Launched] Generally Available: Custom Secure Boot UEFI Keys for Azure Trusted Launch VM

Trusted Launch VM now supports customizing secure boot UEFI keys. One or more of the secure boot keys and/or databases (PK, KEK, DB, or DBX) can be fully replaced or updated. This allows additional flexibility to further secure workloads using Trusted Lau Source: Microsoft Azure – aggiornamenti

Read More
5 Marzo 2025
[Launched] Generally Available: Custom Secure Boot UEFI Keys for Azure Trusted Launch VM

Trusted Launch VM now supports customizing secure boot UEFI keys. One or more of the secure boot keys and/or databases (PK, KEK, DB, or DBX) can be fully replaced or updated. This allows additional flexibility to further secure workloads using Trusted Lau Source: Microsoft Azure – aggiornamenti

Read More
5 Marzo 2025
Silk Typhoon targeting IT supply chain

Executive summary:Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote management tools and cloud applications to gain initial access. While they haven’t been observed directly targeting Microsoft cloud services, they do exploit unpatched applications that[…]

Read More
5 Marzo 2025
Silk Typhoon targeting IT supply chain

Executive summary:Microsoft Threat Intelligence identified a shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions like remote management tools and cloud applications to gain initial access. While they haven’t been observed directly targeting Microsoft cloud services, they do exploit unpatched applications that[…]

Read More