Encryption

Running Open AI Whisper Model on Azure

Whisper is an advanced automatic speech recognition (ASR) system, developed using 680,000 hours of supervised multilingual and multitask data from the web. This extensive and diverse data set enhances its ability to handle various accents, background noise, and technical jargon. Whisper not only transcribes multiple languages but also translates them into English. We are making […]

Running Open AI Whisper Model on Azure Continue Reading

Vulnerabilities in PanelView Plus devices could lead to remote code execution

Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell Automation PanelView Plus that could be remotely exploited by unauthenticated attackers, allowing them to perform remote code execution (RCE) and denial-of-service (DoS). The RCE vulnerability in PanelView Plus involves two custom classes that can be abused to upload and load a malicious DLL into the device.

Vulnerabilities in PanelView Plus devices could lead to remote code execution Continue Reading

Consolidating Windows Active Directory Domain Controller Certificates

Hey, Brent here from the Windows Directory Services team! So, I wanted to share with you some interesting stuff about using one PKI (Public Key Infrastructure) certificate for your Windows Active Directory Domain Controller. It’s simple and can save you many headaches in the long run.   Let me explain what a Windows domain controller

Consolidating Windows Active Directory Domain Controller Certificates Continue Reading

Working with a cybersecurity committee of the board

I serve on the board of a publicly traded company. I fostered the creation of the board’s cybersecurity committee and I co-lead it. I’ve reflected on my work as a Global Black Belt, an advisor to chief information security officers (CISOs) and IT security and compliance teams, and studied best practices to set up a

Working with a cybersecurity committee of the board Continue Reading

What’s New: Create your own codeless data connector

Today we’re announcing the general availability of the Codeless Connectors Platform (CCP) in Microsoft Sentinel that provides partners, advanced users, and developers the ability to create custom connectors for ingesting data to Microsoft Sentinel. How is this CCP different from the previous version? The initial version of the CCP was announced in January of 2022.

What’s New: Create your own codeless data connector Continue Reading

How to boost your incident response readiness

Cyberthreats are evolving with alarming sophistication, making it crucial for organizations to react swiftly to incidents and prepare for potential threats. Preparing your organization’s incident response readiness falls broadly into three categories: the process, the people, and the technologies. Often with cybersecurity, more focus is on the technology aspect. Although there is no question that

How to boost your incident response readiness Continue Reading

Get more device control flexibility with BitLocker settings in Defender for Endpoint

With hybrid work here to stay and data-centric cyberattacks on the rise, safeguarding sensitive information is critical to every security strategy. While data loss prevention (DLP) is often considered for cloud storage locations, the management of removable storage devices such as USBs is equally important, to help ensure that data-at-rest is encrypted and integrity and

Get more device control flexibility with BitLocker settings in Defender for Endpoint Continue Reading

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services

Microsoft Defender Experts for XDR demonstrated excellent managed extended detection and response (MXDR) by unifying our human-driven services and Microsoft Defender XDR in the MITRE Engenuity ATT&CK® Evaluations: Managed Services menuPass + ALPHV BlackCat.    Defender Experts for XDR offers a range of capabilities:  Managed detection and response: Let our expert analysts manage your Microsoft Defender

Microsoft Defender Experts for XDR recognized in the latest MITRE Engenuity ATT&CK® Evaluation for Managed Services Continue Reading

Azure OpenAI Best Practices Insights from Customer Journeys

Introduction When integrating Azure OpenAI’s powerful models into your production environment, it’s essential to follow best practices to ensure security, reliability, and scalability. Azure provides a robust platform with enterprise capabilities that, when leveraged with OpenAI models like GPT-4, DALL-E 3, and various embedding models, can revolutionize how businesses interact with AI. This guidance document

Azure OpenAI Best Practices Insights from Customer Journeys Continue Reading

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy

Multicloud computing has become the foundation for digital businesses, with 86% of organizations having already adopted a multicloud approach.1 However, for all its benefits around increased agility, flexibility, and choice, we also see unique challenges with multicloud—including the need to manage security, identity, and compliance across different cloud service providers (CSPs), ensure data portability, and

6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy Continue Reading