
Accelerate the in-vehicle digital experience with Azure Cognitive Services
Microsoft is helping to reshape the automotive industry in the way it serves its drivers with in-vehicle infotainment systems. As an example, Azure is partnering with XPeng to enable AI voice experiences for automotive brands and customers. The solution provides ... continue reading
How to build a privacy program the right way
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager Natalia Godyla talks with attorney Whitney Merrill, ... continue reading

Business email compromise campaign targets wide range of orgs with gift card scam
Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to ... continue reading

Automating and operationalizing data protection with Dataguise and Microsoft Information Protection
This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA. In technical literature, the terms data discovery, classification, and tagging are sometimes used interchangeably, but there are real differences in what they actually mean—and ... continue reading

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact
GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of customer or employee personal information, they must report it within the required time frame. The size and scope ... continue reading
Microsoft Secure Score Across the Microsoft Security Stack
Introduction This is John Barbare and I am a Sr. Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will walk you through various Microsoft products from the Microsoft Security Stack and explain ... continue reading
Protect your customer accounts with passwordless mobile authentication
Hello! In today’s ‘Voice of the ISV’ story, Jim Small and Milan Radojkovic at IPification describe how IPification mobile authentication and Azure Active Directory (Azure AD) B2C deliver improved security and a better user experience to our mutual customers. Don’t ... continue reading
A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 4 – Apps
For our third stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Application security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading

Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution
Technology continues to play a critical role in shaping the global risks landscape for individuals, governments, and businesses. According to the World Economic Forum’s Global Risks Report 2020, cyberattacks are ranked as the second risk of greatest concern for business ... continue reading
Data privacy is about more than compliance—it’s about being a good world citizen
Happy Data Privacy Day! Begun in 2007 in the European Union (E.U.) and adopted by the U.S. in 2008, Data Privacy Day is an international effort to encourage better protection of data and respect for privacy. It’s a timely topic ... continue reading