Explore Microsoft’s AI innovations at RSA Conference 2024
Will you be at the RSA Conference? Join us for Microsoft Pre-Day, sessions, and other events for insights on leading in AI. Keep reading for what to expect at the event.
​Human-operated ransomware attacks are on the rise. See real-world examples of how Microsoft Copilot for Security helps SecOps teams defend their organizations against financial and reputational damage.
Microsoft Copilot for Security is the first generative AI security product that will help defend organizations at machine speed and scale. It combines the most advanced GPT4 model from OpenAI with a Microsoft-developed security model, powered by Microsoft Security’s unique expertise, global threat intelligence, and comprehensive security products.
Today, we are releasing an open automation framework, PyRIT (Python Risk Identification Toolkit for generative AI) to empower security professionals and machine learning engineers to proactively find risks in their generative AI systems.
Good prompt engineering can greatly improve generative AI outputs, which means more relevant and accurate results. Microsoft Copilot for Security includes featured prompts as well as promptbooks to help security teams better investigate, manage, and respond to cyberthreats.
​​NIS2 is the most comprehensive European cybersecurity directive yet, covering 18 sectors and 160,000+ companies. The Zero Trust principles addressed by Microsoft Security solutions can help you protect your organization and meet NIS2 requirements.
Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity includes prompt-injections, attempted misuse of large language models (LLM), and fraud.
Face Check is now in preview in Microsoft Entra Verified ID, unlocking high-assurance verifications for enterprises securely, simply, and at scale.
Cybersecurity professionals, business decision makers, and developers involved in cybersecurity have many industry events to choose from. But with all the possibilities, they may be unsure of which one is right for them. Read on for recommendations based on your role.
The main components of the Microsoft Intune Suite are now generally available. Read about how consolidated endpoint management adds value and functionality for security teams.
Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, […]