Our Latest News
Defending against impersonator scams
Introduction to clustering models by using R and Tidymodels – part 4 of 4
In the previous episodes, we have journeyed through airports, real estate, and wine industry, gaining insight on the different industries, and utilizing the data in decision making. Alas, now we are in the final episode of a Four-part series - An introduction to...
Vulnerability Summary for the Week of June 27, 2022
admidio -- admidio Admidio 4.1.2 version is affected by stored cross-site scripting (XSS). 2022-06-28 not yet calculated CVE-2022-23896MISC aerogear -- aerogear The simplepush server iterates through the application installations and pushes a notification to the...
#JulyOT 2022 -31 days of IoT content for everyone starting 1st July
Animated July O T logo #JulyOT is back for 2022! Throughout the month of July, the IoT teams at Microsoft will be sharing content and events put together by IoT enthusiasts from around the world. ...
Recommendations for Oracle 19c Patches in Azure
Oracle 19c is the terminal release for Oracle 12c. If you aren’t familiar with that term, a terminal release is the last point release of the product. There were terminal releases for previous Oracle versions (10.2.0.4, 11.2.0.7.0) and after 19c, the next...
Row Level Security in Power BI Desktop
The Same KPIs, Different Department Scenario: You have different managers requesting to see the same KPIs (Customer Count, Revenue Generated, Products Performance, etc) for their different region. Data privacy requires that the various managers...
Streamline sales actions with Dynamics 365 sales accelerator
The sales accelerator in Dynamics 365 provides a tailored experience for sellers by minimizing the time spent searching for the best next customer to reach out to. It's a workspace optimized with AI and suggested activities that guide sellers through customer...
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise....
#StopRansomware: MedusaLocker
Summary Actions to take today to mitigate cyber threats from ransomware:• Prioritize remediating known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce multifactor authentication. Note: this joint Cybersecurity...
#StopRansomware: MedusaLocker
CISA, the Federal Bureau of Investigation (FBI), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) have released a joint Cybersecurity Advisory (CSA), #StopRansomware: MedusaLocker, to provide information on MedusaLocker...
Announcing the availability of Quick Access filters in Office app for Android
The Office Mobile team is excited to announce the availability of Quick Access filters in Office Mobile on Android phones and tablets! This feature can help you increase your productivity while customizing Office on your Android mobile device, so it works best for...
From Viva Sales to new Office experiences—here’s what’s new in Microsoft 365
The ways we work have changed dramatically over the past several years, and those changes go so much further than whether work happens at home, in an office, or somewhere in between. In this collaboration-first world, every organization needs a digital fabric that...

Recent Comments