Select Page
Azure Backup Center – Your one-stop for all things backups.

Azure Backup Center – Your one-stop for all things backups.

Hello Folks, We live in a world where the only constant is change. Actually… There might be one thing that has not changed for IT pros and operation folks… The need for an appropriate backup strategy. Today, in this world ... continue reading
Demo of Microsoft Counterfit used to scan an AI model for model evasion vulnerability.

AI security risk assessment using Counterfit

Today, we are releasing Counterfit, an automation tool for security testing AI systems as an open-source project. Counterfit helps organizations conduct AI security risk assessments to ensure that the algorithms used in their businesses are robust, reliable, and trustworthy. AI ... continue reading

Afternoon Cyber Tea: Cybersecurity has become a pillar of the business

In a famous two-part episode of “Star Trek: The Next Generation,” Captain Jean-Luc Picard is captured by the Cardassians. During a pivotal scene, a Cardassian interrogator shows Picard four bright lights and demands that he “see” five lights. Picard resists, ... continue reading
Research prototype for high-level network deployment

Empowering operators on their cloud migration journey

For operators, many challenges can be involved in their journey to the cloud, some more complex than others. Here, it is important to note that when it comes to operators’ path to cloud migration, there is no such thing as ... continue reading
Hierarchy of IoT Edge devices to extract data from the automation pyramid

Build secure manufacturing operations with nesting capabilities for Azure IoT Edge

The manufacturing industry continues to rapidly adopt Internet of Things (IoT) technology to optimize productivity, gain efficiencies, increase uptime, and meet sustainability goals. As organizations look to harness IoT across their ecosystems of connected devices, security and compliance continue to ... continue reading
Investigating a unique “form” of email delivery for IcedID malware

Investigating a unique “form” of email delivery for IcedID malware

Microsoft threat analysts have been tracking activity where contact forms published on websites are abused to deliver malicious links to enterprises using emails with fake legal threats. The emails instruct recipients to click a link to review supposed evidence behind ... continue reading
Gamifying machine learning for stronger security and AI models

Gamifying machine learning for stronger security and AI models

To stay ahead of adversaries, who show no restraint in adopting tools and techniques that can help them attain their goals, Microsoft continues to harness AI and machine learning to solve security challenges. One area we’ve been experimenting on is ... continue reading
AI-powered interactive assistant in the Azure CLI

AI-powered interactive assistant in the Azure CLI

As you know, the Azure CLI already AI-build in with the az find command, and you might have seen the great feature like AI-powered PowerShell module called Az Predictor Module (Azure PowerShell Predictions), which does what the name says, predict ... continue reading
Maria Puertas Calvo leaning against a wall next to an open window.

How one data scientist is pioneering techniques to detect security threats

Data science is an increasingly popular field of study that’s relevant to every industry. When Maria Puertas Calvo was a student, she never imagined that one day she would pioneer data science techniques to detect security threats. She started her ... continue reading

Learn about the latest innovations: Inside Azure Datacenter Architecture

At Microsoft Ignite, I presented the “Inside Azure Datacenter Architecture” session to give a tour of the latest innovations around how Azure enables intelligent, modern, and innovative applications at scale in the cloud, on-premises, and on the edge. I start ... continue reading