Select Page
Connecting urban environments with IoT and Digital Twins

Connecting urban environments with IoT and Digital Twins

As urbanization continues to take hold and cities face challenges to become more sustainable and livable, urban planning and operations strategies must adapt. The current pandemic has changed the way we live, accelerating cities’ future vision as a necessity of ... continue reading
Microsoft_Learn_Banner.png

AzUpdate: Windows 10 version 20H2, Azure AD provisioning updates, Modular Datacenters and more

Another plethora of news stories to share on this week's AzUpdate show. News includes: What’s new for IT Pros in Windows 10 version 20H2, Designing Azure Modular Datacenters, Azure AD provisioning updates that include attribute mapping and improved performance, newly ... continue reading

Cyberattacks against machine learning systems are more common than you think

Machine learning (ML) is making incredible transformations in critical areas such as finance, healthcare, and defense, impacting nearly every aspect of our lives. Many businesses, eager to capitalize on advancements in ML, have not scrutinized the security of their ML ... continue reading
Edge Compute Node protection profile.

Solving IoT device security at scale through standards

Edge Compute Node protection profile (ECN PP)—now available—guides you to engineer, claim, evaluate, and consume device security for IoT. Internet of Things (IoT) solution builders these days are more likely to deploy IoT solutions with unsecured devices because they cannot ... continue reading
About Microsoft Endpoint Manager

Microsoft Endpoint Manager – Creating a MDAV Policy

  IntroductionThis is John Barbare and I am a Sr Premier Field Engineer at Microsoft focusing on all things in the Cybersecurity space. In this tutorial I will walk you through the steps of creating a Microsoft Defender Antivirus (MDAV) ... continue reading
Trickbot disrupted

Trickbot disrupted

As announced today, Microsoft took action against the Trickbot botnet, disrupting one of the world’s most persistent malware operations. Microsoft worked with telecommunications providers around the world to disrupt key Trickbot infrastructure. As a result, operators will no longer be ... continue reading
​Azure Machine Learning designer used for image classification.

Azure Machine Learning helps customers stay ahead of challenges

Organizations today are striving to build agility and resilience to the fast-changing environment we live in. AI and machine learning  innovation can help tackle these emerging challenges and enable cost efficiencies. However, organizations still encounter barriers to adopting and deploying ... continue reading
Azure Stack Hub Partner Solutions Series - Datacom

Azure Stack Hub Partner Solutions Series – Datacom

Together with the Azure Stack Hub team, we are starting a journey to explore the ways our customers and partners use, deploy, manage, and build solutions on the Azure Stack Hub platform. Together with the Tiberiu Radu (Azure Stack Hub ... continue reading

Microsoft Digital Defense Report 2020: Cyber Threat Sophistication on the Rise

Today, Microsoft is releasing a new annual report, called the Digital Defense Report, covering cybersecurity trends from the past year. This report makes it clear that threat actors have rapidly increased in sophistication over the past year, using techniques that ... continue reading
An image of a GADOLINIUM controlled Microsoft TechNet profile established in 2016.

Microsoft Security—detecting empires in the cloud

Microsoft consistently tracks the most advanced threat actors and evolving attack techniques. We use these findings to harden our products and platform and share them with the security community to help defenders everywhere better protect the planet. Recently, the Microsoft ... continue reading