Recent Blogs
We are excited to announce the Public Preview of IP Network Firewalls for Azure Key Vault Managed HSM in East US, West US, West US 2, West Central US, UK South, and West Europe.
The feature allow...
Jan 13, 202664Views
1like
0Comments
Trusted Signing is now Artifact Signing—and it’s officially Generally Available!
Artifact Signing is a fully managed, end-to-end code signing service that makes it easier than ever for Windows app...
Jan 12, 2026486Views
6likes
1Comment
The Security Copilot Technical Customer Readiness team is delivering free, virtual hands-on workshops year-round, available across multiple time zones to fit global schedules. These sessions are desi...
Jan 07, 2026517Views
4likes
0Comments
3 MIN READ
Historically, some security teams have struggled with the challenge of troubleshooting issues with endpoint DLP. Investigations can often slow down because reproducing issues, collecting traces, and ...
Jan 07, 2026304Views
0likes
0Comments
In our first post, we established why securing AI workloads is mission-critical for the enterprise. Now, we turn to the AI pipeline—the end-to-end journey from raw data to deployed models—and explore...
Jan 06, 2026536Views
0likes
0Comments
6 MIN READ
The cost of poor-quality data runs into millions of dollars in direct losses. When indirect costs—such as missed opportunities—are included, the total impact is many times higher. Poor data quality a...
Jan 06, 2026230Views
0likes
0Comments
5 MIN READ
Understanding Artificial Intelligence
Artificial intelligence (AI) is a computational system that perform human‑intelligence tasks, learning, reasoning, problem‑solving, perception, and language un...
Jan 06, 2026292Views
1like
0Comments
In recent months, cybersecurity experts have sounded the alarm on a surge of fake “employees” – job candidates who are not who they claim to be.
These fraudsters use everything from fabricated CVs ...
Jan 06, 2026759Views
2likes
0Comments
Microsoft Copilot Studio and Microsoft Foundry (often referred to as Azure AI Foundry) are two key platforms in Microsoft’s AI ecosystem that allow organizations to create custom AI agents and AI-ena...
Jan 05, 20262.9KViews
6likes
2Comments
The CAF 4.0 update reframes C2 (Threat Hunting) as a cornerstone of proactive cyber resilience. According to the NCSC CAF 4.0, this principle is no longer about occasional investigations or manual lo...
Dec 17, 2025351Views
0likes
0Comments
Resources
Tags
- security386 Topics
- microsoft information protection280 Topics
- microsoft purview268 Topics
- compliance238 Topics
- information protection and governance201 Topics
- microsoft 365159 Topics
- data loss prevention141 Topics
- cloud security132 Topics
- insider risk management111 Topics
- microsoft defender for cloud apps92 Topics