News

Microsoft Threat Intelligence has observed remote IT workers deployed by North Korea leveraging AI to improve the scale and ...
Explore how leading organizations are using AI to drive innovation and achieve tangible results in a transformative business ...
In this blog you will hear directly from Microsoft’s Deputy Chief Information Security Officer (CISO) for Customer Security, Ann Johnson, about the need for proactive planning in cyber incidents, ...
Features and app availability may vary by region. [**] Type Cover, Surface Dial, Microsoft Office, and some software and accessories sold separately. Surface Pen sold separately for Surface Pro, ...
As important as security is, productivity and user experience are also important. As tempting as it might be to implement a complicated security system to prevent breaches, having multiple barriers to ...
AI Frontiers: AI for health and the future of research with Peter Lee The second episode features Peter Lee, head of Microsoft Research. Lee was among a group within Microsoft to have early access to ...
(annual commitment) A cloud-based unified endpoint management solution included with subscriptions to Microsoft 365 E3, E5, F1, and F3, Enterprise Mobility + Security E3 and E5, and Business Premium ...
A data breach is a data security incident when private information or confidential data is stolen or taken from a system without knowledge or permission from the owner. It can happen to any size ...
Malware is malicious software designed to disrupt or steal sensitive data from devices, posing a threat to individuals and businesses alike. Types of malware include ransomware, adware, botnets, ...
Access the set of new tools to help you visualize and manage your school's storage, available in the Microsoft 365 Admin Center now. Beginning August 2024, all school tenants will receive 100TB of ...
If a cyberattack is detected, swift action is crucial to mitigate damage, contain the breach, and recover operations. After an attack, follow these key steps: Contain the damage. Remove compromised ...
Transform how you work with a step-by-step program designed to help you learn the ins-and-outs of Microsoft 365 Copilot. This guided Copilot training gives you fun and easy-to-follow prompts so you ...