Introducing Identity Theft Monitoring in Microsoft Defender for individuals

Attempting to impersonate someone is an activity as old as humanity, and has been used to great comedic effect by comedians and jesters throughout the ages.
 
Sadly, the crime of identity theft (in which a criminal uses someone’s identity details … Continue reading Introducing Identity Theft Monitoring in Microsoft Defender for individuals

Generating OCR Insight in Videos – the Story of a Successful Microsoft Collaboration

What is special about OCR for videos 
Detecting and recognizing text within images are important tasks that fortunately can be addressed with available models. Specifically, the Read OCR model that was developed by the Microsoft Cognitive Services… Continue reading Generating OCR Insight in Videos – the Story of a Successful Microsoft Collaboration

Upgrade Azure Database for MySQL – Single Server to Flexible Server using Azure DMS

Overview
Our flagship offering, Azure Database for MySQL – Flexible Server, is well-positioned to serve as the best platform for hosting your MySQL workloads, offering maximum control and flexibility to run your MySQL servers. We’re now directing all o… Continue reading Upgrade Azure Database for MySQL – Single Server to Flexible Server using Azure DMS

Apply Zero Trust Principles to Authentication Session Management with Continuous Access Evaluation

Hi everyone,
 
Today we’re sharing our thoughts around managing and securing cloud authentication sessions. In the past, “authentication session management” referred to static updates to the session duration. That approach no longer provides adequ… Continue reading Apply Zero Trust Principles to Authentication Session Management with Continuous Access Evaluation