
How we interact with information: The new era of search
In today’s rapidly evolving technological landscape, generative AI, and especially Large Language Models (LLMs), are ushering in a significant inflection point. These models stand at the forefront of change, reshaping how we interact with information. The utilization of LLMs for ... continue reading
Automating Azure VM Deployment: The Power of PowerApps, SharePoint, Flow and Azure DevOps Pipe
Introduction Many of our customers are trying to balance the productivity vs security scale at this point in time. On the one end you can provide access to the Azure Portal but that could provide certain risks and requires an ... continue reading
Using Automation Runbook Webhooks To Alert on Databricks Status Updates
Description This guide walks you through the process of setting up and utilizing webhooks to receive Databricks status alerts, process them using Azure Automation Runbook, and trigger notifications to administrators about the status event. Prerequisites Before diving into the ... continue reading
Introducing a New Flexible Way of Bringing Identities from Any Source into Microsoft Entra ID!
Hello everyone, I'm thrilled to announce that Microsoft Entra API-driven provisioning is now in public preview! With today’s announcement, we’re expanding our support for HR-driven provisioning to address the most common customer asks, including: Automatically provisioning cloud-only users and hybrid users (users ... continue reading

Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS
Microsoft’s cyberphysical system researchers recently identified multiple high-severity vulnerabilities in the CODESYS V3 software development kit (SDK), a software development environment widely used to program and engineer programmable logic controllers (PLCs). Exploitation of the discovered vulnerabilities, which affect all versions ... continue reading
Adopting guidance from the US National Cybersecurity Strategy to secure the Internet of Things
The recently published United States National Cybersecurity Strategy warns that many popular Internet of Things (IoT) devices are not sufficiently secure to protect against many of today’s common cybersecurity threats.1 The strategy also cautions that many of these IoT devices ... continue reading
Scale generative AI with new Azure AI infrastructure advancements and availability
Generative AI is a powerful and transformational technology that has the potential to advance a wide range of industries from manufacturing to retail, and financial services to healthcare. Our early investments in hardware and AI infrastructure are helping customers to ... continue reading

Microsoft AI Red Team building future of safer AI
An essential part of shipping software securely is red teaming. It broadly refers to the practice of emulating real-world adversaries and their tools, tactics, and procedures to identify risks, uncover blind spots, validate assumptions, and improve the overall security posture ... continue reading
Desired State Configuration (DSC) Planning Update
Desired State Configuration (DSC) Planning Update – August 2023 Hey DSC enthusiasts! We’re bursting with excitement to share new information about the plans for Desired State Configuration (DSC). First off, we’d like to extend a massive thank you to our ... continue reading

Modernize and monetize your network investments with Microsoft Azure Operator Nexus
Azure Operator Nexus is now generally available Earlier this year at MWC Barcelona, Microsoft announced the public preview of Azure Operator Nexus, a carrier-grade and hybrid platform, built to empower telecom operators to modernize and transform their networks. Operator Nexus ... continue reading