
Cyber Signals: Shifting tactics fuel surge in business email compromise
Today we released the fourth edition of Cyber Signals highlighting a surge in cybercriminal activity around business email compromise (BEC). Microsoft has observed a 38 percent increase in cybercrime as a service (CaaS) targeting business email between 2019 and 2022.1 ... continue reading
Establish digital trust in your data with ledger in SQL Server 2022
Part of the SQL Server 2022 blog series.We are pleased to introduce you to ledger, a new technology that uses the power of blockchain to offer a tamper-proof record of data modifications. Currently in Azure SQL, this feature is also ... continue reading

Introducing the Microsoft Intelligent Data Platform
We are moving to a world where every application needs to be intelligent and adaptive to real-time model learning. As businesses build modern data capabilities, they must make decisions at the speed of human thought. Developers are challenged by this, ... continue reading

The anatomy of a datacenter—how Microsoft's datacenter hardware powers the Microsoft Cloud
Leading hardware engineering at a company known for its vast portfolio of software applications and systems is not as strange as it sounds, as the Microsoft Cloud depends on hardware as the foundation of trust, reliability, capacity, and performance, to ... continue reading

‘Ice phishing’ on the blockchain
The technologies that connect us are continually advancing, and while this brings tremendous new capabilities to users, it also opens new attack surfaces for adversaries and abusers. Social engineering represents a class of threats that has extended to virtually every ... continue reading
What you need to know about how cryptography impacts your security strategy
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post of our Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla ... continue reading

How cyberattacks are changing according to new Microsoft Digital Defense Report
In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading

How user experience is shaping verifiable credentials and identity
Since 2017, Microsoft has been working with the identity community on two groundbreaking technologies designed from the ground up to make digital privacy convenient and practical: decentralized identifiers and verifiable credentials. We believe verifiable credentials will revolutionize the way we ... continue reading
Importance of Browser Updates and Browser Based Security Controls
Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. It has been a while since I have had time to sit down and write a security blog due to studying and making sure I ... continue reading

Azure and Intel commit to delivering next generation confidential computing
In Azure, your data is your data. Not only is it protected at rest and in transit, but Microsoft Azure extends that protection while in use with confidential computing. Azure was the first major public cloud to deliver confidential computing ... continue reading