Select Page

Humana leverages Microsoft Cloud for Healthcare to develop advanced predictive models

​​This blog post has been co-authored by Slawek Kierner, SVP of Enterprise Data & Analytics, Humana and Tie-Yan Liu, Assistant Managing Director, Microsoft Research China. Using AI models to make real-world impact Trips to the hospital happen. And while everyone ... continue reading
Pie graph showing DART engagement metrics by industry spanning from July 2020-June 2021. According to the graph, Consumer/Retail industry holds the highest engagement rate with 13 percent and Energy industry ranks the lowest at just 4 percent.

How cyberattacks are changing according to new Microsoft Digital Defense Report

In 2021, cybercrime has become more sophisticated, widespread, and relentless. Criminals have targeted critical infrastructure—healthcare,1 information technology,2 financial services,3 energy sectors4—with headline-grabbing attacks that crippled businesses and harmed consumers. But there are positive trends—victims are coming forward, humanizing the toll ... continue reading
Image shows arrows in a circle with steps in the supply chain process including plan, source, make, deliver, manage, service and decom. In the center of the circle is the word “capacity,” since each activity supports delivering capacity to customers. Underneath the circle is a box that says “systems and data enable end-to-end value chain of activities.” Together each activity in the circle informs the next to deliver continuous improvement.

Advancing reliability through a resilient cloud supply chain

“My Advancing Reliability series has explored many initiatives we’ve put in place to improve the reliability of the Azure platform. Today, I’d like to explore our cloud supply chain, as a resilient hardware infrastructure is critical to provide reliable capacity ... continue reading
Table showing differences between phishing kits and phishing-as-a-service

Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

In researching phishing attacks, we came across a campaign that used a rather high volume of newly created and unique subdomains—over 300,000 in a single run. This investigation led us down a rabbit hole as we unearthed one of the ... continue reading
Graphic illustrates the steps, goals, and initial questions in DART’s ransomware investigation assistance.

A guide to combatting human-operated ransomware: Part 1

This blog is part one of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page ... continue reading
Screenshot of code showing the original exploit vector

Analyzing attacks that exploit the CVE-2021-40444 MSHTML vulnerability

In August, Microsoft Threat Intelligence Center (MSTIC) identified a small number of attacks (less than 10) that attempted to exploit a remote code execution vulnerability in MSHTML using specially crafted Microsoft Office documents. These attacks used the vulnerability, tracked as ... continue reading
Multi-zone Windows Server Failover Cluster with shared ZRS disk

Improve availability with zone-redundant storage for Azure Disk Storage

As organizations continue to accelerate their cloud adoption, the need for reliable infrastructure is critical to ensure business continuity and avoid costly disruptions. Azure Disk Storage provides maximum resiliency for all workloads with an industry-leading zero percent annual failure rate ... continue reading
An image in white text that reads deploy more intelligent solutions with AI and advanced technologies download the white paper

4 ways AI, computer vision, and related technologies expand IoT solutions

Inspecting five million vehicle welds every day requires the ability to check a weld’s quality every 17 milliseconds—an impossible challenge for a human. This type of quality control task is just one of many where the combined technologies of computer ... continue reading
The five levels of CMMC.

How to prepare for CMMC compliance as a defense industrial base supplier using the Microsoft cloud

In 2020, the US Department of Defense (DoD) began the phased rollout of a new framework for protecting their supply chain, known as the defense industrial base (DIB). This new Cybersecurity Maturity Model Certification1 (CMMC) system requires regular audits that ... continue reading
Diagram showing attack chain of phishing campaigns that use open redirect links

Widespread credential phishing campaign abuses open redirector links

Microsoft has been actively tracking a widespread credential phishing campaign using open redirector links. Attackers combine these links with social engineering baits that impersonate well-known productivity tools and services to lure users into clicking. Doing so leads to a series ... continue reading