Discover how Microsoft and NVIDIA use AI and digital twins to accelerate nuclear plant permitting, design, and operations.
Learn why we're committed to expanding our sovereign cloud continuum and strengthening cloud capabilities to navigate digital sovereignty.
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide. This analysis walks through the Trivy supply‑chain compromise, attacker ...
Microsoft Defender stopped a human-operated ransomware attack that abused Group Policy Objects (GPOs) to disable defenses and ...
Discover how to secure agentic AI and protect against threats with new capabilities across Microsoft Agent 365, Microsoft ...
During tax season, threat actors reliably take advantage of the urgency and familiarity of time-sensitive emails, including refund notices, payroll forms, filing reminders, and requests from tax ...
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...
Microsoft introduces Zero Trust for AI, adding a new AI pillar to its workshop, enhanced reference architecture, a new assessment tool, and practical guidance.
More than before, but different than expected. How Frontier Professionals turn domain expertise into AI-driven impact.
CTI-REALM is Microsoft’s open-source benchmark that evaluates AI agents on real-world detection engineering. It measures whether an agent can take cyber threat intelligence (CTI) and produce validated ...
The latest Microsoft benchmarking data reveals how Microsoft Defender mitigates modern email threats compared to SEG and ICES ...
As AI systems grow more autonomous, observability becomes essential. Learn how visibility into AI behavior helps detect risk and strengthen secure development.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results