Our Latest News
CISA Adds Twelve Known Exploited Vulnerabilities to Catalog
CISA has added twelve new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal...
Empower self-service by adding knowledge base search to your bots
Customers appreciate the quick access to help that self-service bots provide. They want to be empowered to research and solve issues on their own, which increases their brand loyalty. Knowledge management integration in Microsoft Power Virtual Agents enables customers...
#WeAreMEC: IN CASE YOU MISSED IT… MEC is back September 13-14!
It’s been a while since our last MEC, and a lot has changed since then. The MEC Technical Airlift is a free, digital event for IT professionals who work with Exchange Online and/or Exchange Server day-to-day, and ISVs and developers who make solutions that integrate...
CISA Releases Five Industrial Control Systems Advisories
Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure...
Digital event: Empowering Your Workforce in Economic Uncertainty
Join us for new insights on the employee experience Faced with a shifting economic landscape and increasingly tight labor market, today’s leaders are looking for new ways to balance organizational success with the wellbeing of their teams. Join Satya Nadella...
#StopRansomware: Vice Society
CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint Cybersecurity Advisory (CSA), #StopRansomware: Vice Society, to disseminate tactics, techniques, and procedures (TTPs) and...
Meet Microsoft Teams Rooms Pro
Now more than ever organizations need a single, integrated experience that makes working together easier and more engaging for their employees whether they are all in the same room, remote, or—for many of us—a mix of both. Because of this, Microsoft is happy to...
Vulnerability Summary for the Week of August 29, 2022
advancecomp -- advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated CVE-2022-35019MISCMISC advancecomp -- advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated...
Use preferred agent routing to create lifelong customer relationships
Organizations are looking for ways to offer hyper-personalized service and foster deeper relationships with their customers. Customers want to connect to agents who understand their needs. They feel more comfortable talking to an agent who has served them in the past,...
#StopRansomware: Vice Society
Summary Actions to take today to mitigate cyber threats from ransomware:• Prioritize and remediate known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce multifactor authentication. Note: This joint...
Concerned about deceptive ads and sales of autos? Last call for comments
Improved For-each loop performance in Stateless Workflows
Introduction For-each loop is a common construct in many languages, allowing collections of items to be processed the same way. Within Logic Apps, for-each loops offer a way to process each item of a collection in parallel – using a fan-out / fan-in approach that, in...


Recent Comments