How user experience is shaping verifiable credentials and identity

Since 2017, Microsoft has been working with the identity community on two groundbreaking technologies designed from the ground up to make digital privacy convenient and practical: decentralized identifiers and verifiable credentials. We believe verifia… Continue reading How user experience is shaping verifiable credentials and identity

Powering critical infrastructure with Microsoft cloud technology

Last week, the government of France announced a trusted cloud doctrine that includes a cloud-first policy to enhance the protection and sovereignty of its critical infrastructure and public sector workloads. To support this important initiative, today, Orange and Capgemini announced they intend to establish a new company, “Bleu,” that will deliver a Microsoft-powered cloud and…

The post Powering critical infrastructure with Microsoft cloud technology appeared first on The Official Microsoft Blog.

Continue reading Powering critical infrastructure with Microsoft cloud technology

Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats

Learn how your infrastructure and security operations can make you vulnerable to insider threats, ransomware, weaponized AI, and more.
The post Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats appeared first on… Continue reading Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats

Creating the Future of Software Development

“If you think about the world that we’re in now, software plays a key role in our lives – in everything we do. And at the core of solving big problems and fundamental challenges is the ability to use software to attack the problem and make it better. I work in the field of programming […]

The post Creating the Future of Software Development appeared first on Microsoft Research.

Continue reading Creating the Future of Software Development

Video Tutorial: Endpoint Protection Part 6 – Windows Defender Exploit Guard

Hello everyone, here is part 6 of a series focusing on Endpoint Protection integration with Configuration Manager. This series is recorded by , a Microsoft principal premier field engineer.
 
This session focuses on how Configuration Manager integ… Continue reading Video Tutorial: Endpoint Protection Part 6 – Windows Defender Exploit Guard