Recent Blogs
Why Agent Security Alone Is Not Enough?
Foundry‑level controls are designed to prevent unsafe behavior and bound autonomy at runtime. But even the strongest preventive controls cannot answer key go...
Apr 02, 202628Views
0likes
0Comments
5 MIN READ
Every agent abuse pattern we’ve explored points to a specific control gap, not a theoretical flaw. Across all patterns, one theme consistently emerges: agents behave logically according to how they a...
Apr 02, 202632Views
0likes
0Comments
What Is Agent Abuse?
Agent abuse is not about “bad models” or simple prompt hacking. It’s about how autonomy, tools, memory, identity, and data access interact—and how those interactions can be exp...
Apr 02, 202637Views
0likes
0Comments
Microsoft appreciates the opportunity to participate in the National Institute of Standards and Technology’s (NIST) effort to evolve the Live Guidelines for Secure Software Development, Security, and...
Apr 01, 2026157Views
0likes
0Comments
Security attacks span identities, devices, resources, and activity, making it critical to understand how these elements connect to expose real risk. In November, we shared how Sentinel graph brings t...
Apr 01, 2026442Views
0likes
1Comment
The Microsoft Purview product team is constantly listening to customer feedback about the data governance challenges that slow teams down. One of the most persistent pain points — understanding the t...
Apr 01, 2026181Views
1like
1Comment
Last week, March 24 to 26, 2026, Microsoft headquarters in Redmond played host to the annual Microsoft MVP Summit. What an incredible few days it was. As someone fortunate enough to be part of this c...
Mar 31, 2026182Views
3likes
2Comments
What Are Data Quality Thresholds?
A data quality threshold defines the minimum acceptable score for a rule to pass. Instead of applying a single fixed standard across all data, organizations can no...
Mar 31, 2026139Views
0likes
0Comments
Today, we’re excited to announce the public preview of a Sentinel connector builder agent, via VS code extension, that helps developers build Microsoft Sentinel codeless connectors faster with low-co...
Mar 30, 2026437Views
1like
0Comments
Service-hosting machines are typically highly managed and more controlled than end-user devices. Deployments and updates are closely monitored, changes are tested, releases are staged, and change-man...
Mar 30, 2026174Views
2likes
0Comments
Tags
- security409 Topics
- microsoft information protection287 Topics
- microsoft purview287 Topics
- compliance245 Topics
- information protection and governance208 Topics
- microsoft 365167 Topics
- data loss prevention149 Topics
- cloud security139 Topics
- insider risk management118 Topics
- threat protection99 Topics