Build a low code conversational SMS bot with Azure Communication Services and Azure OpenAI

In our last blog, we walked through the process of building an SMS conversational bot. Today we want to showcase a similar bot, but this time built completely on top of low code connectors for Power Automate. It is incredibly easy and exciting to lever… Continue reading Build a low code conversational SMS bot with Azure Communication Services and Azure OpenAI

Azure Managed Lustre – Benchmarking our new Azure storage solution

Today we announced the limited public preview of our new Azure HPC + AI storage service – Azure Managed Lustre. I’m beyond humbled and honored to be writing our first HPC tech blog on this new first-party storage solution. 
 
In this fir… Continue reading Azure Managed Lustre – Benchmarking our new Azure storage solution

Voices of Healthcare Cloud: How Advocate Health embraced Virtual Conferences for Nursing Education

 
Voices of Healthcare Cloud is a webinar series hosted by myself, @Vasu Sharma, Aaron Porzondek & @Joshua Thompson. My name is Shelly Avery, I am currently a Dir, Healthcare Specialist for Health and Life Sciences foc… Continue reading Voices of Healthcare Cloud: How Advocate Health embraced Virtual Conferences for Nursing Education

Proacting Hunting with Cloud Security Explorer in Defender for Cloud

Introduction
In our previous blog “A Proactive Approach to Cloud Security Posture Management with Microsoft Defender for Cloud,” Yuri Diogenes emphasized the importance of proactive security posture management and outlined a successful organizational s… Continue reading Proacting Hunting with Cloud Security Explorer in Defender for Cloud

Automatic disruption of Ransomware and BEC attacks with Microsoft 365 Defender

The ever-growing volume of advanced cybersecurity attacks challenges even the most advanced Security Operations (SOC) teams. Image 1 shows a timeline of a typical human-operated ransomware attack where the attacker encrypted hundreds of devices in just… Continue reading Automatic disruption of Ransomware and BEC attacks with Microsoft 365 Defender