12 Giugno 2025
Experience the redesigned Copilot hub

Unifying insights, governance, and AI-driven productivity for the modern enterprise We’re excited to announce the new Copilot Hub experience in the Power Platform Admin Center, unveiled at Microsoft Build, which brings a host of improvements based on your feedback. This updated experience provides Power Platform and environment admins[…]

Read More
12 Giugno 2025
Cyber resilience begins before the crisis

In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Customer Security, Ann Johnson, about the need for proactive planning in cyber incidents, particularly surrounding communications. This blog is part of a new, ongoing series where our Deputy CISOs share their thoughts[…]

Read More
11 Giugno 2025
Announcing the AI-Powered Search and Summary Components in Power Pages Component Library

We’re excited to announce the addition of AI-powered Search and Summary components to the Power Pages Component Library. These components are designed to significantly accelerate development by enabling makers to easily drag and drop pre-built Generative AI features directly onto their pages.  AI-Powered Search Component The new Search[…]

Read More
9 Giugno 2025
What’s new in Power Apps: May 2025 Feature Update

Summary Welcome to the Power Apps monthly feature update! We will use this blog to share what’s new in Power Apps. A summary of product, community, and learning updates from throughout the month so you can access it in one easy place. Get started with the latest updates[…]

Read More
5 Giugno 2025
Connect with us at the Gartner Security & Risk Management Summit

Security professionals visiting booths scattered around a hall, eager for solutions to today’s top cybersecurity challenges to protect their resources and people. The hum of hundreds of conversations. Presenters in packed sessions sharing expertise, trends, and stories to energize attendees. Few occasions are as thrilling as a cybersecurity[…]

Read More
5 Giugno 2025
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3

Microsoft launched its Cybersecurity Governance Council in 2024, and with it, named a group of deputy chief information security officers that ensure comprehensive oversight of the company’s cybersecurity risk, defense, and compliance. These leaders work in tandem with product and engineering leaders across the company to create accountability and[…]

Read More
3 Giugno 2025
How Microsoft Defender for Endpoint is redefining endpoint security

Securing your digital estate with endpoint detection and response (EDR) across all platforms, devices, and Internet of Things (IoT) has never been more challenging. A rapidly evolving cyberthreat landscape has seen cyberattacks grow in sophistication, evolving from randomized single domain cyberattacks to targeted and methodical multidomain cyberattacks tailored[…]

Read More
3 Giugno 2025
Dataverse at Build: The Agent Platform Powering the Future of Agentic AI

Here are some of the Dataverse announcements from Microsoft Build. With so many new capabilities, here are all our key sessions in one place. To learn more about these exciting updates, read the full Dataverse Build blog.  Microsoft Dataverse is the secure, scalable agent platform that extends agents[…]

Read More
2 Giugno 2025
Discover how automatic attack disruption protects critical assets while ensuring business continuity

Traditional security solutions often operate in a one-size-fits-all alert model that treats every detection equally, regardless of how important the asset is. But not all assets are equal. Critical assets are systems governing access, identity, or sensitive data. They are essential to an organization’s operations and security, for[…]

Read More
2 Giugno 2025
Announcing a new strategic collaboration to bring clarity to threat actor naming

In today’s cyberthreat landscape, even seconds of delay can mean the difference between stopping a cyberattack or falling victim to ransomware. One major cause of delayed response is understanding threat actor attribution, which is often slowed by inaccurate or incomplete data as well as inconsistencies in naming across[…]

Read More