Public Sector Blog

Options
801
justinO on Apr 22 2024 09:00 AM
2,933
RichardWakeman on Apr 11 2024 11:34 AM
909
RichardWakeman on Apr 11 2024 11:33 AM
2,601
Dean Halstead on Mar 27 2024 06:00 AM
1,800
Jesse_Tedoff on Mar 26 2024 09:00 AM
3,994
Dan Narloch on Mar 13 2024 03:21 PM
6,972
shawnrosco on Mar 05 2024 08:00 AM
2,132
Jesse_Tedoff on Mar 04 2024 12:50 PM
10.8K
ckahsen on Feb 21 2024 11:00 AM
2,964
jasonwpayne on Feb 08 2024 08:00 AM
2,845
Dave Jennings (TEAMS) on Feb 05 2024 01:44 PM
11K
Jesse_Tedoff on Jan 22 2024 02:04 PM
3,201
Callie_Davidson on Jan 12 2024 08:00 AM
10.1K
Jesse_Tedoff on Dec 19 2023 03:36 PM
5,840
justinO on Dec 07 2023 11:00 AM
13.2K
Jesse_Tedoff on Nov 22 2023 12:00 PM
11.8K
shawnrosco on Nov 16 2023 11:33 AM
12.2K
lili on Nov 14 2023 10:00 AM
4,850
RichardWakeman on Nov 08 2023 07:00 AM
6,182
RichardWakeman on Nov 03 2023 11:57 AM
13.5K
Dan Narloch on Nov 01 2023 08:00 AM
13.6K
Jesse_Tedoff on Oct 10 2023 07:30 AM
4,804
Rachelle_Cheung on Oct 02 2023 08:00 AM
5,949
Jesse_Tedoff on Sep 21 2023 10:00 AM
6,821
Leo_Ramirez on Sep 19 2023 10:00 AM
4,587
Mabel_Gomes on Sep 07 2023 09:00 AM
6,997
IrenaMroz on Sep 01 2023 09:30 AM
3,073
MicroStiles on Aug 31 2023 11:38 AM
17.7K
Jesse_Tedoff on Aug 21 2023 07:30 AM

Latest Comments

With Purview and information protection in place firms can be confident that they have limited the risks to opening up to Copilot. That is when the fun can begin working on the human side of when, where and how to leverage copilot. :)
1 Likes
Is this on roadmap for GCC - what is timeline??
0 Likes
Excellent update! 
0 Likes
Thanks @DanielBaloch for your affirmation and sharing how the blog was insightful. Will look to do more in the near future! Also, I appreciate calling out the confusing language @Dean Gross - I'll look to address this in a future edit. The sentence should be shortened/simplified to state "Security C...
0 Likes
Absolutely fascinating read, Shawn! Your detailed exploration of Microsoft Copilot for Security's role in assisting with NIST 800-171 Access Control requirements opened my eyes to the capabilities of AI in the cybersecurity realm. The practical applications for enhancing security measures, especiall...
1 Likes