This is the Trace Id: 9fbd8bdea31b77e2018fb6883f0cb7e8

Emerging trends

Stay ahead of new technologies, like generative AI, with actionable insights and guidance from security experts.
A woman looking at a computer screen.
5 minutes

Microsoft guide for securing the AI-powered enterprise: Getting started

The first in a new series: Build a secure foundation for AI applications with a phased approach.
5 minutes

Microsoft Guide for Securing the AI-Powered Enterprise: Strategies for Governing AI

5 minutes

Microsoft Guide for Securing the AI-Powered Enterprise: Strategies for AI Compliance

9 minutes

How to responsibly integrate AI in security operations

40 minutes

What role data and AI play in modern cybersecurity

3 minutes

Reap the business benefits of AI. Minimize security concerns.

A group of people gathered around a computer screen on a table.

AI threat landscape

Graphical words about Microsoft threat intelligence podcast
39 minutes

Red teaming generative AI with Microsoft CVP of AI Safety and Security

A close-up of hands typing on a laptop keyboard.
4 minutes

How threat actors are using AI now—and what’s next

A group of people and colorful blocks scattered in the scene.
13 minutes

Navigate AI-driven cyberthreats and strengthen defenses

Securing AI

Two people is working in a laptop
11 minutes

AI Safety first: Protecting your business and empowering your people

A woman with curly hair wearing a pink and brown jacket.
1 minute

How we're building trustworthy AI at Microsoft

Two men in suits are talking with various text including GOV and TODAY visible in the background.
6 minutes

Innovation in government: Developing responsible AI systems

A women explaining and one laptop is open.
13 minutes

Securing your data for AI: Insights for CISOs

Reports and guides

28 minutes

CISO Executive Summary: Microsoft Digital Defense Report 2024

A group of people sitting at a table.
7 minutes

3 takeaways from red teaming 100 generative AI products

A diagram shows interconnected roles labeled as Regulated Actors, Provider, Deployer, Distributor, and Importer.
13 minutes

The European Union AI Act: An overview

Connect with us

Follow Microsoft Security