뉴스

Earn rewards with Microsoft. Just by simply doing what you love to do. Sign in or create a Microsoft account and get points for gift cards, sweepstakes, and more.
Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a sophisticated modular macOS malware that infects Xcode projects, in the wild. Its first known variant since 2022, this latest ...
At Microsoft, we are committed to empowering every person and organization on the planet to achieve more. This commitment extends to ensuring our compliance with the European Union's Digital Markets ...
In this blog, you’ll learn more about how the Microsoft Secure Future Initiative (SFI)—a real-world case study on Zero Trust—aligns with Zero Trust strategies.We’ll share key updates from the April ...
Read Forrester Consulting Total Economic Impact studies commissioned by Microsoft on Cloud App Security and Zero Trust. Find value with Forrester TEI reports.
According to the Microsoft 2024 Data Security Index, organizations experience an average of 156 data security incidents annually, and this cyberthreat continues to be a top concern for data security ...
According to a recent white paper for CFOs (9 Emerging Trends for the Futurist CFO), more than 50% of the identified trends that will affect their departments and businesses over the next few years ...
As telecommunications operators grapple with exponential growth in data usage and the demands of modern consumers, the role of operations support systems (OSS) and business support systems (BSS) is ...
In this edition of our monthly roundup, we're recapping new features in Microsoft Copilot Studio for customers, released in February 2025. In this edition of our monthly roundup, we’re recapping new ...
Microsoft for Startup Founders Hub provides founders with free resources to help overcome the challenges startups face- including Azure credits, development and productivity tools, mentorship ...
Welcome to Microsoft’s Copilot Release Notes. Here we’ll provide regular updates on what’s happening with Copilot, from new features to firmware updates and more. Upgraded 4o image generation We’ve ...
In recent years, human-operated cyberattacks have undergone a dramatic transformation. These attacks, once characterized by sporadic and opportunistic attacks, have evolved into highly sophisticated, ...