With an exponential increase in the number of data breaches and regulations such as EU-GDPR, we all feel the urgency to work towards a holistic information protection strategy. We’ve been on a journey with our information protection offerings and vision over the years. You may have noticed our focus broadening from just Azure
Saturday, 24 February 2018
The General Data Protection Regulation (GDPR), which began as a regulatory requirement, is increasingly seen as a long-term opportunity to establish greater trust with customers and further unlock employee collaboration and productivity in many businesses. The intelligent compliance solutions in Microsoft 365 help you assess and manage your compliance risks and leverage the cloud to identify, classify, protect, and monitor sensitive data residing in hybrid and heterogeneous environments to support GDPR compliance.
Updates in Microsoft 365—
currently rolling out— help protect sensitive data and include:
- Compliance Manager general availability for Azure, Dynamics 365, and Office 365 Business and Enterprise customers in public clouds.
- Compliance Score availability for Office 365.
- Azure Information Protection scanner general availability.
In addition to the updates announced today, capabilities in Microsoft 365 help to:
Tuesday, 20 February 2018
Exchange Server 2016 requires that you have specific software preinstalled prior to starting the deployment process. First, you should plan for the operating system platforms that you will be using for Exchange Server 2016. The following operating systems support the installation of Exchange Server 2016 roles:
- Windows Server 2012 Standard
- Windows Server 2012 Datacenter
- Windows Server 2012 R2 Standard
- Windows Server 2012 R2 Datacenter
- Windows Server 2016 Standard (Exchange Server 2016 Cumulative Update 3 and later)
- Windows Server 2016 Datacenter (Exchange Server 2016 Cumulative Update 3 and later)
Note: The Server Core installation option is not a supported operating system option for Exchange Server 2016 installation.
Sunday, 18 February 2018
Need funding to clear a hurdle in the final stages of your dissertation research? Microsoft Research is offering grants of up to US $25,000 to help a select group of doctoral students cross the finish line and enter the workforce.
The Microsoft Research Dissertation Grant is for PhD students at U.S. and Canadian universities from underrepresented groups in computing, including women, African-Americans/Blacks, Latinos, American Indians/Alaskan Natives, Native Hawaiians/Pacific Islanders and/or people with disabilities.
The program is rooted in organizational management research that shows diverse teams come up with ideas and solutions to problems that more homogenous teams miss, which translates to benefits for industry as well as society. In addition, the technology industry has a shortage of computer scientists. The dissertation grant aims to help deepen and diversify the technology talent pool.
The grant program targets doctoral students in at least the fourth year of their studies. Students at this later stage of their doctoral work have a sufficiently concrete research plan to articulate specific funding needs. Earlier stage doctoral students should consider the Microsoft Research PhD Fellowship Program. I’m also pleased to announced that Microsoft Research is increasing the amount of the research grants up to $25,000 (the limit was up to $20,000 per grant in the program’s first year). We hope that this increase allows the award to have a greater impact on recipients’ research and career development. Read More
Wednesday, 24 January 2018
A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017
Adopting reliable attack methods and techniques borrowed from more evolved threat types, ransomware attained new levels of reach and damage in 2017. The following trends characterize the ransomware narrative in the past year:
- Three global outbreaks showed the force of ransomware in making real-world impact, affecting corporate networks and bringing down critical services like hospitals, transportation, and traffic systems
- Three million unique computers encountered ransomware; millions more saw downloader trojans, exploits, emails, websites and other components of the ransomware kill chain
- New attack vectors, including compromised supply chain, exploits, phishing emails, and documents taking advantage of the DDE feature in Office were used to deliver ransomware
- More than 120 new ransomware families, plus countless variants of established families and less prevalent ransomware caught by heuristic and generic detections, emerged from a thriving cybercriminal enterprise powered by ransomware-as-a-service. ReadMore