In today’s evolving cyber threat landscape, threat actors are committed to advancing the sophistication of their attacks. The increasing adoption of essential security features like multifactor authentication (MFA), passwordless solutions, and robust email protections has changed many aspects of the phishing landscape, and threat actors are more motivated[…]
Read MoreIn this blog you will hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for AI, Yonatan Zunger, about how to build a plan to deploy AI safely. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts[…]
Read MoreWe’re excited to announce that Power Pages AI usage analytics and governance controls are now available in public preview through the Copilot Hub in the Power Platform admin center With AI capabilities becoming core to digital experiences, organizations need visibility and control over how these features are used.[…]
Read MoreI believe we’re at the beginning of something extraordinary. Today’s AI agents are already impressive—they’re helping software engineers write code, assisting site reliability teams in troubleshooting systems, and handling a variety of analytical tasks. Yet, as capable as these specialized agents are becoming, we’re just beginning to glimpse[…]
Read MoreThe Next Generation of Power Platform Adoption Guidance is here Successfully adopting Microsoft Power Platform is about more than just deploying tools. It’s about building a strategy that empowers people, ensures governance, and delivers lasting business value. And to support you on your successful adoption journey, we’re excited[…]
Read MoreExecutive summary: Void Blizzard is a new threat actor Microsoft Threat Intelligence has observed conducting espionage operations primarily targeting organizations that are important to Russian government objectives. These include organizations in government, defense, transportation, media, NGOs, and healthcare, especially in Europe and North America. They often use stolen[…]
Read MoreOver the past year, Microsoft observed the persistent growth and operational sophistication of Lumma Stealer, an infostealer malware used by multiple financially motivated threat actors to target various industries. Our investigation into Lumma Stealer’s distribution infrastructure reveals a dynamic and resilient ecosystem that spans phishing, malvertising, abuse of[…]
Read MoreGet ready for an incredible experience at Microsoft Build 2025. We’re pumped to showcase the latest advancements in Microsoft Power Pages, a platform that empowers enterprises to rapidly build secure, scalable business portals powered by agentic AI. This week at Microsoft Build 2025, explore how Power Pages enables global[…]
Read MoreMicrosoft’s 2025 Work Trend Index Read more ↗ Agentic AI transformation is giving rise to the Frontier Firm—a new type of organization characterized by on-demand intelligence and a workforce where humans and agents work in tandem. According to Microsoft’s 2025 Work Trend Index, we expect every organization will[…]
Read MoreMicrosoft’s 2025 Work Trend Index Read more ↗ Agentic AI transformation is giving rise to the Frontier Firm—a new type of organization characterized by on-demand intelligence and a workforce where humans and agents work in tandem. According to Microsoft’s 2025 Work Trend Index, we expect every organization will[…]
Read More