Posted on Leave a comment

Meet the 2019 AI for Good Idea Challenge winners

Thanks to developers, the world runs on software!

Developers have played a strong role in many of the massive transformations and technology shifts of the past few decades. And now that AI is redefining how software is created with the capability to learn through data and experiences and to perceive the world around us through vision, speech and understanding, we’re excited to see a whole new level of transformation and innovation coming to the forefront. We love learning from and showcasing the cool developers behind these innovations.

To that end, in 2018 Microsoft created the initial AI Idea Challenge to explore how developers were applying AI in meaningful and fascinating ways. As we explored the projects that poured in, it was clear that developers were incredibly inspired by the ability to use AI to positively impact society. This desire is directly aligned with our vision to use AI to empower people to take on some of society’s toughest issues. Voilá, a new developer challenge called the AI for Good Idea Challenge was born!

This challenge is focused on using developer creativity and skills specifically around AI for Good scenarios. Great winning projects from our first AI Idea Challenge, like Angel Eyes and Clean Water AI, helped to inspire more developers than ever to get involved and think up new ways to leverage Microsoft AI to tackle societal issues. I have been amazed by the sheer numbers and pure creativity of the ideas from developers across the globe. Ready to be inspired? Take a look at the highlight video to get an idea of the breadth of ideas that came in.

YouTube Video

data-video-id=”c8l7AqTmLEw”>

To help us select winners of the AI for Good Idea Challenge, we brought together a team of judges to evaluate each entry against three criteria: originality of impact, complexity to implement and solution feasibility. With such passion and creativity represented in work of these talented developers, it was very hard to pick the winners. My deepest gratitude goes out to all who entered. Thank you!

And now, I’m thrilled to share the winners of the AI for Good Idea Challenge:

First place: CardioVision, by Bohdan Petryshak, is an AI solution that can help patients at risk of coronary artery disease live a better life. This non-invasive screening measures the stiffness of the brachial artery in your arm, which correlates to stiff and even clogged coronary arteries that can lead to heart disease. By detecting artery defects and disease up to three times faster, patients are equipped for better heart attack prevention.

Second place: LeafAI, by Maanasa Mendu, identifies 38 classes of biotic plant disease from a basic smartphone picture – with an astounding 90% accuracy rate. The homogeneity of the current agriculture system combined with the effects of climate change has led to a growing threat of plant disease, contributing to malnutrition in nearly 700,000 people around the world. LeafAI’s technology can help identify plant diseases and provide information about treatment, taking us one step closer to better economic and food security.

Third place: OrganSecure, by Pratik Mohapatra, is a sophisticated set of machine learning algorithms that can quickly match organ donors and provide real-time updates with people in need of a transplant. Using health parameters such as blood group and antigen type, it becomes possible to predict the match of an organ and estimate the rank and time required for an awaiting recipient. Not only would this help people waiting for organs, but it would also make the host-donor matching process more transparent.

You can learn more about the winning projects here.

We were incredibly fortunate to have four stellar judges for our first AI for Good Idea Challenge who evaluated the projects and had the tough job of selecting the winners. Thank you to our judges: Stephen Ibaraki, Wendy Chisholm, Alma Cardena and David Carmona.

CONGRATULATIONS to each of our winners! Thank you to all the developers who took the time to share and submit their great ideas for the challenge. We can’t wait to do it again!

Related:

Posted on Leave a comment

Microsoft acquires BlueTalon, simplifying data privacy and governance across modern data estates

The data landscape has changed rapidly over the past few years, enabling tremendous opportunity for enterprises to digitally transform. Data estates are increasingly diverse with fit-for-purpose systems (NoSQL, RDBMs, Data Lakes & Big Data, SaaS apps, etc.) spanning on-premises and cloud environments capable of processing data of all shapes and sizes. This rapid evolution has empowered data professionals including data engineers, data scientists and data analysts to do much more, but at the same time has vastly increased the size and diversity of data estates, making data management and governance harder than ever. In fact, 57 percent of Gartner survey respondents cited “supporting data governance and data security” as one of the biggest challenges for their data management practice.1

At the heart of any digital transformation is making data discovery, access and use simple, secure, compliant and trustworthy. Data privacy is one of the defining issues of our time, as evidenced by the introduction and evolution of privacy laws across the globe (e.g., GDPR, CCPA, etc.). As technology becomes more engrained in our lives and our work, it must be simple to understand and control what data is collected and easily manage who has access to that data and for what purpose.

Today we are excited to announce the acquisition of BlueTalon, a leading provider of Unified Data Access Control solutions for modern data platforms. BlueTalon works with leading Fortune 100 companies to eliminate data security blind spots and gain visibility and control of data. BlueTalon provides a customer-proven, data-centric solution for data access management and auditing across the diverse systems resident in modern data estates.

The IP and talent acquired through BlueTalon brings a unique expertise at the apex of big data, security and governance. This acquisition will enhance our ability to empower enterprises across industries to digitally transform while ensuring right use of data with centralized data governance at scale through Azure.

Together with BlueTalon, we are committed to help enterprises become data-driven companies in a secure and compliant manner. We’re excited to welcome the BlueTalon team to Microsoft and can’t wait to get started. For more information, please see BlueTalon CEO Eric Tilenius’ blog post.

¹ Gartner Survey Analysis: Data Management Is Pressed Between Support for Analytics — and Data Governance, Risk and Compliance, Figure 3, Roxane Edjlali, March 22, 2018

Tags:

Posted on Leave a comment

Ibrahima and Abdoulaye Barry: How a new alphabet is helping an ancient people write its own future

Deborah Bach

Written by Deborah Bach

Sara Lerner

Audio by Sara Lerner

How a new alphabet is helping an ancient people write its own future

When they were 10 and 14, brothers Abdoulaye and Ibrahima Barry set out to invent an alphabet for their native language, Fulfulde, which had been spoken by millions of people for centuries but never had its own writing system. While their friends were out playing in the neighborhood, Ibrahima, the older brother, and Abdoulaye would shut themselves in their room in the family’s house in Nzérékoré, Guinea, close their eyes and draw shapes on paper.

Loading Audio

9:28

When one of them called stop they’d open their eyes, choose the shapes they liked and decide what sound of the language they matched best. Before long, they’d created a writing system that eventually became known as ADLaM.

The brothers couldn’t have known the challenges that lay ahead. They couldn’t have imagined the decades-long journey to bring their writing system into widespread use, one that would eventually lead them to Microsoft. They wouldn’t have dreamed that the script they invented would change lives and open the door to literacy for millions of people around the world.

They didn’t know any of that back in 1989. They were just two kids with a naïve sense of purpose.

“We just wanted people to be able to write correctly in their own language, but we didn’t know what that meant. We didn’t know how much work it would be,” said Abdoulaye Barry, now 39 and living in Portland, Oregon.

“If we knew everything we would have to go through, I don’t think we would have done it.”

ADLaM is an acronym that translates to ‘the alphabet that will prevent a people from being lost.’

A new writing system takes shape

The Fulbhe, or Fulani, people were originally nomadic pastoralists who dispersed across West Africa, settling in countries stretching from Sudan to Senegal and along the coast of the Red Sea. More than 40 million people speak Fulfulde — some estimates put the number at between 50 and 60 million — in around 20 African countries. But the Fulbhe people never developed a script for their language, instead using Arabic and sometimes Latin characters to write in their native tongue, also known as Fulani, Pular and Fula. Many sounds in Fulfulde can’t be represented by either alphabet, so Fulfulde speakers improvised as they wrote, with varying results that often led to muddled communications.

The Barry brothers’ father, Isshaga Barry, who knew Arabic, would decipher letters for friends and family who brought them to the house. When he was busy or tired, young Abdoulaye and Ibrahima would help out.

“They were very hard to read, those letters,” Abdoulaye recalled. “People would use the most approximate Arabic sound to represent a sound that doesn’t exist in Arabic. You had to be somebody who knows how to read Arabic letters well and also knows the Fulfulde language to be able to decipher those letters.”

Abdoulaye asked his father why their people didn’t have their own writing system. Isshaga replied that the only alphabet they had was Arabic, and Abdoulaye promised to create one for Fulfulde.

“At a basic level, that’s how the whole idea of ADLaM started,” Abdoulaye said. “We saw that there was a need for something and we thought maybe we could fix it.”

Loading Audio

3:44

The brothers developed an alphabet with 28 letters and 10 numerals written right to left, later adding six more letters for other African languages and borrowed words. They first taught it to their younger sister, then began teaching people at local markets, asking each student to teach at least three more people. They transcribed books and produced their own handwritten books and pamphlets in ADLaM, focusing on practical topics such as infant care and water filtration.

While attending university in Conakry, Guinea’s capital city, the brothers started a group called Winden Jangen — Fulfulde for “writing and reading” — and continued developing ADLaM. Abdoulaye left Guinea in 2003, moving to Portland with his wife and studying finance. Ibrahima stayed behind, completing a civil engineering degree, and continued working on ADLaM. He wrote more books and started a newspaper, translating news stories from the radio and television from French to Fulfulde. Isshaga, a shopkeeper, photocopied the newspapers and Ibrahima handed them out to Fulbhe people, who were so grateful they sometimes wept.

But not everyone was pleased by the brothers’ work. Some objected to their efforts to spread ADLaM, saying Fulbhe people should learn French, English or Arabic instead. In 2002, military officers raided a Winden Jangen meeting, arrested Ibrahima and imprisoned him for three months. He was not charged with anything or ever told why he was arrested, Abdoulaye said. Undeterred, Ibrahima moved to Portland in 2007 and continued writing books while studying civil engineering and mathematics.

ADLaM, meanwhile, was spreading beyond Guinea. A palm oil dealer, a woman the brothers’ mother knew, was teaching ADLaM to people in Senegal, Gambia and Sierra Leone. A man from Senegal told Ibrahima that after learning ADLaM, he felt so strongly about the need to share what he’d learned that he left his auto repair business behind and went to Nigeria and Ghana to teach others.

“He said, ‘This is changing people’s lives,’” said Ibrahima, now 43. “We realized this is something people want.”

ADLaM comes online

The brothers also understood that to fully tap ADLaM’s potential, they needed to get it onto computers. They made inquiries about getting ADLaM encoded in Unicode, the global computing industry standard for text, but got no response. After working and saving for close to a year, the brothers had enough money to hire a Seattle company to create a keyboard and font for ADLaM. Since their script wasn’t supported by Unicode, they layered it on top of the Arabic alphabet. But without the encoding, any text they typed just came through as random groupings of Arabic letters unless the recipients had the font installed on their computers.

Following that setback, Ibrahima made a fateful decision. Wanting to refine the letters the Seattle font designer developed, which he wasn’t happy with, he enrolled in a calligraphy class at Portland Community College. The instructor, Rebecca Wild, asked students at the start of each course why they were taking her class. Some needed an art credit; others wanted to decorate cakes or become tattoo artists. The explanation from the quiet African man with the French accent stunned Wild.

“It was mind-blowing when I heard the story of why he was doing this,” said Wild, who lives in Port Townsend, Washington. “It’s so remarkable. I think they deserve a Nobel Peace Prize for what they’re doing. What a difference they’ve made on this planet, and they’re these two humble brothers.”

Wild was struck by Ibrahima’s focus and assiduousness in class. “He was always a star student,” she said. “He had this skill set and unending patience. He worked and worked and worked in class on the assignments, but at the same time, he was taking all this stuff he was learning in class back to ADLaM.”

Hand-drawn letters of the ADLaM alphabet

Wild helped Ibrahima get a scholarship to a calligraphy conference at Reed College in Portland, where he met Randall Hasson, a calligraphy artist and painter. Hasson was seated at a table one afternoon, giving a lettering demonstration with another instructor, and Ibrahima came over. A book about African alphabets rested on the table. Ibrahima picked it up, commented that the scripts in the book weren’t the only African alphabets and offhandedly mentioned that he and his brother had invented an alphabet.

Hasson, who has extensively researched ancient alphabets, assumed Ibrahima meant that he and his brother had somehow modified an alphabet.

“I said, ‘You mean you adapted an alphabet?’” Hasson recalled. “I had to ask him three times to be sure he had actually invented one.”

After hearing Ibrahima’s story, Hasson suggested teaming up for a talk on ADLaM at a calligraphy conference in Colorado the following year. The audience sat rapt as Hasson told Ibrahima’s story, giving him a standing ovation as he walked to the stage. During a break earlier in the day, Ibrahima asked Hasson to come and meet a few people. They were four Fulbhe men who had driven almost 1,800 miles from New York just to hear Ibrahima’s talk, hoping it would finally help get ADLaM the connections they sought.

Hasson was so moved after speaking with them that he walked away, sat down in an empty stairwell and cried.

“At that moment,” he said, “I began to understand how important this talk was to these people.”

Ibrahima made connections at the conference that got him introduced to Michael Everson, one of the editors of the Unicode Standard. It was the break the brothers needed. With help from Everson, Ibrahima and Abdoulaye put together a proposal for ADLaM to be added to Unicode.

Andrew Glass is a senior program manager at Microsoft who works on font and keyboard technology and provides expertise to the Unicode Technical Committee. The ADLaM proposal and the Barry brothers’ pending visit to the Unicode Consortium generated much interest and excitement among Glass and other committee members, most of whom have linguistics backgrounds. Glass’s graduate studies focused on writing systems that are around 2,000 years old, and like other linguists he uses a methodological, technical approach to analyze and understand writing systems.

But here were two brothers with no training in linguistics, who developed an alphabet through a natural, organic approach — and when they were children, no less. New writing systems aren’t created very often, and the chance to actually talk with the inventors of one was rare.

“You come across things in these old writing systems and you wonder why it’s the way it is, and there’s nobody to ask,” Glass said. “This was a unique opportunity to say, ‘Why is it like this? Did they think about doing things differently? Why are the letters ordered this way?’ and things like that.”

Microsoft worked with designers to develop a font for Windows and Office called Ebrima that supports ADLaM and several other African writing systems.

It was during the Unicode process that ADLaM got its new name. The brothers originally called their alphabet Bindi Pular, meaning “Pular script,” but had always wanted a more meaningful name. Some people in Guinea who’d been teaching the script suggested ADLaM, an acronym using the first four letters of the script for a phrase that translates to “the alphabet that will prevent a people from being lost.” The Unicode Technical Committee approved ADLaM in 2014 and the alphabet was included in Unicode 9.0, released in June 2016. The brothers were elated.

“It was very exciting for us,” Abdoulaye said. “Once we got encoded, we thought, ‘This is it.’”

But they soon realized there were other, possibly even more challenging hurdles ahead. For ADLaM to be usable on computers, it had to be supported on desktop and mobile operating systems, and with fonts and keyboards. To make it broadly accessible, it also needed to be integrated on social networking sites.

The brothers’ script found a champion in Glass, who had developed Windows keyboards for several languages and worked on supporting various writing systems in Microsoft technology. Glass told others at Microsoft about ADLaM and helped connect the Barry brothers to the right people at the company. He developed keyboard layouts for ADLaM, initially as a project during Microsoft’s annual companywide employee hackathon.

Judy Safran-Aasen, a program manager for Microsoft’s Windows design group, also saw the importance of incorporating ADLaM into Microsoft products. Safran-Aasen wrote a business plan for adding ADLaM to Windows and pushed the work forward with various Microsoft teams.

“It was a shoestring collaboration of a few people who were really interested in seeing this happen,” she said. “It’s a powerful human interest story, and if you tell the story you can get people onboard.

“This is going to have an impact on literacy throughout that community and enable people to be part of the Windows ecosystem, where before that just wasn’t available to them,” Safran-Aasen said. “I’m really excited that we can make this happen.”

Photograph of brothers Ibrahima and Abdoulaye Barry in front of a bridge on the Willamette River in Portland, OregonADLaM creators Ibrahima and Abdoulaye Barry in Portland, Oregon.

Microsoft worked with two type designers in Maine, Mark Jamra and Neil Patel, to develop an ADLaM component for Windows and Office within Microsoft’s existing Ebrima font, which also supports other African writing systems. ADLaM support is included in the Windows 10 May 2019 update, allowing users to type and see ADLaM in Windows, including in Word and other Office apps.

Microsoft’s support for ADLaM, Abdoulaye said, “is going to be a huge jump for us.”

ADLaM is also supported by the Kigelia typeface system developed by Jamra and Patel, which includes eight African scripts and is being added to Office later this year. The designers wanted to create a type system for a region of the world lacking in typeface development, where they say existing fonts tend to be oversimplified and poorly researched. They consulted extensively with Ibrahima and Abdoulaye to refine ADLaM’s forms, painstakingly working to execute on the brothers’ vision within the boundaries of font technology.

“This was their life’s work that they started when they were kids,” Patel said. “To get it right is a big deal.”

And to many Africans, Jamra said, a script is more than just an alphabet. ”These writing systems are cultural icons,” he said. “It’s not like the Latin script. They really are symbols of ethnic identity for many of these communities.”

They’re also a means of preserving and advancing a culture. Without a writing system it’s difficult for people to record their history, to share perspective and knowledge across generations, even to engage in the basic communications that facilitate commerce and daily activities. There is greater interest in recent years in establishing writing systems for languages that didn’t have them, Glass said, to help ensure those languages remain relevant and don’t disappear. He pointed to the Osage script, created by an elder in 2006 to preserve and revitalize the language, as an example.

“There is a big push among language communities to develop writing systems,” Glass said. “And when they get them, they are such a powerful tool to put identity around that community, and also empower that community to learn and become educated.

“I think ADLaM has tremendous potential to change circumstances and improve people’s lives. That’s one of the things that’s really exciting about this.”

Keeping a culture alive

Ibrahima and Abdoulaye don’t know how many people around the world have learned ADLaM. It could be hundreds of thousands, maybe more. As many as 24 countries have been represented at ADLaM’s annual conference in Guinea, and there are ADLaM learning centers in Africa, Europe and the U.S. On a recent trip to Brussels, Ibrahima discovered that four learning centers had opened there and others have started in the Netherlands.

“I was really surprised. I couldn’t imagine that ADLaM has reached so many people outside of Africa,” he said.

Abdoulaye “Bobody” Barry (no relation to ADLaM’s creator) lives in Harlem, New York and is part of Winden Jangen, now a nonprofit organization based in New York City. He learned ADLaM a decade ago and has taught it to hundreds of people, first at mosques and then through messaging applications using an Android app. The script has enabled Fulbhe people, many of whom never learned to read and write in English or French, to connect around the world and has fostered a sense of sense of cultural pride, Barry said.

“This is part of our blood. It came from our culture,” he said. “This is not from the French people or the Arabic people. This is ours. This is our culture. That’s why people get so excited.”

Close-up photograph of a hand writing letters in the ADLaM alphabet with a felt-tip pen

Suwadu Jallow emigrated to the U.S. from Gambia in 2012 and took an ADLaM class the Barry brothers taught at Portland Community College. ADLaM is easy for Fulfulde speakers to learn, she said, and will help sustain the language, particularly among the African diaspora.

“Now I can teach this language to someone and have the sense of my tribe being here for years and years to come without the language dying off,” said Jallow, who lives in Seattle. “Having this writing system, you can teach kids how to speak (Fulfulde) just like you teach them to speak English. It will help preserve the language and let people be creative and innovative.”

Loading Audio

1:10

Jallow is pursuing a master’s in accounting at the University of Washington and hopes to develop an inventory-tracking system in ADLaM after she graduates. She got the idea after helping out in her mother’s baby clothing shop in Gambia as a child and seeing that her mother, who understood little English and Arabic, could not properly record and track expenses. ADLaM, she said, can empower people like her mother who are fluent in Fulfulde and just need a way to write it.

“It’s going to increase literacy,” she said. “I believe knowledge is power, and if you’re able to read and write, that’s a very powerful tool to have. You can do a lot of things that you weren’t able to do.”

The Fulbhe people in Guinea historically produced a considerable volume of books and manuscripts, Abdoulaye Barry said, using Arabic to write in their language. Most households traditionally had a handwritten personal book detailing the family’s ancestry and the history of the Fulbhe people. But the books weren’t shared outside the home, and Fulbhe people largely stopped writing during French colonization, when the government mandated teaching in French and the use of Arabic was limited primarily to learning the Koran.

“Everything else was basically discounted and no longer had the value that it had before the French came,” Abdoulaye said.

Having ADLaM on phones and computers creates infinite possibilities — Fulbhe people around the world will be able to text each other, surf the internet, produce written materials in their own language. But even before ADLaM’s entry into the digital world, Fulfulde speakers in numerous countries have been using the script to write books. Ibrahima mentions a man in Guinea who never went to school and has written more than 30 books in ADLaM, and a high school girl, also in Guinea, who wrote a book about geography and another about how to succeed on exams. The president of Winden Jangen, Abdoulaye Barry (also no relation to Ibrahima’s brother), said many older Fulbhe people who weren’t formally educated are now writing about Fulbhe history and traditions.

“Now, everybody can read that and understand the culture,” he said. “The only way to keep a culture alive is if you read and write in your own language.”

‘The kids are the future’

Though ADLaM has spread over several continents, Ibrahima and Abdoulaye aren’t slowing down their work. Both spend much of their spare time promoting the script, traveling to conferences and continuing to write. Ibrahima, who sleeps a maximum of four hours a night, recently finished the first book of ADLaM grammar and hopes to build a learning academy in Guinea.

On a chilly recent day in Abdoulaye’s home in Portland, the brothers offer tea and patiently answer questions about ADLaM. They are unfailingly gracious, gamely agreeing to drive to a scenic spot on the Willamette River for photos after a long day of talking. They’re also quick to deflect praise for what they have accomplished. Ibrahima, who sometimes wakes up to hundreds of email and text messages from grateful ADLaM learners, said simply that he’s “very happy” with how the script has progressed. For his brother, the response to ADLaM can be overwhelming.

Having this writing system, you can teach kids how to speak Fulani just like you teach them to speak English. It will help preserve the language and let people be creative and innovative.

“It’s very emotional sometimes,” Abdoulaye said. “I feel like people are grateful beyond what we deserve.”

The brothers want ADLaM to be a tool for combating illiteracy, one as lasting and important to their people as the world’s most well-known alphabets are to cultures that use them. They have a particular goal of ADLaM being used to educate African women, who they said are more impacted by illiteracy than men and are typically the parent who teaches children to read.

“If we educate women we can help a lot of people in the community, because they are the foundation of our community,” Abdoulaye said. “I think ADLaM is the best way to educate people because they don’t need to learn a whole new language that’s only used at school. If we switched to this, it would make education a lot easier.”

That hasn’t happened yet, but ADLaM has fostered a grassroots learning movement fueled largely through social media. There are several ADLaM pages on Facebook, and groups with hundreds of members are learning together on messaging apps. Abdoulaye said he and Ibrahima used to hear mostly about adults learning ADLaM, but increasingly it’s now children. Those children will grow up with ADLaM, using the script Abdoulaye and Ibrahima invented all those years ago in their bedroom.

“That makes us believe ADLaM is going to live,” Abdoulaye said. “It’s now settled into the community because it’s in the kids, and the kids are the future.”

Originally published on 7/29/2019 / Photos by Brian Smale / © Microsoft

Posted on Leave a comment

General availability for the Azure Security Center for IoT announced

As organizations pursue digital transformation by connecting vital equipment or creating new connected products, IoT deployments will get bigger and more common. In fact, IDC forecasts that IoT will continue to grow at double digit rates until IoT spending surpasses $1 trillion in 2022. As these IoT deployments come online, newly connected devices will expand the attack surface available to attackers, creating opportunities to target the valuable data generated by IoT.

Organizations understand the risks and are rightly worried about IoT. Bain’s research shows that security concerns are the top reason organizations have slowed or paused IoT rollouts*. Because IoT requires integrating many different technologies (heterogenous devices must be linked to IoT cloud services that connect to analytics services and business applications), organizations face the challenge of securing both the pieces of their IoT solution and the connections between those pieces. Attackers target weak spots; even one weak device configuration, cloud service, or admin account can provide a way into your solution. Your organization must monitor for threats and misconfigurations across all parts of your IoT solution: devices, cloud services, the supporting infrastructure, and the admin accounts who access them.

To give your organization IoT threat protection and security posture management across your entire IoT solution, we’re announcing the general availability of Azure Security Center for IoT. Azure Security Center allows you to protect your end-to-end IoT deployment by identifying and responding to emerging threats, as well as finding issues in your configurations before attackers can use them to compromise your deployment. As organizations use Azure Security Center for IoT to manage their security roadblocks, they remove the barriers keeping them from business transformation:

“With Azure Security Center for IoT, we can both address very real IoT threat models with the velocity of Azure and gain management control over the fastest scaling part of our business, which allows me to focus on delivering outcomes rather than hot fixing devices.” – Alex Kreilein, CISO RapidDeploy

Building secure IoT solutions with Azure Security Center

Securing IoT is challenging for many reasons: IoT deployments are complicated, creating opportunity for integration errors that attackers can exploit; IoT devices are heterogenous and often lack proper security measures; organizations may not have the skillsets or SecOps headcount to take on a new IoT security workload; and IoT deployments are difficult to monitor using traditional IT security tools. When organizations choose Microsoft for their IoT deployments, however, they get secure-by-design devices and services such as Azure Sphere and IoT Hub, end-to-end integration and monitoring from device to cloud, and the expertise from Microsoft and our partners to build a secure solution that meets their exact use case.

Azure Security Center for IoT builds on Microsoft’s secure-by-design IoT services with threat protection and security posture management designed for securing entire IoT deployments, including Microsoft and 3rd party devices. Azure Security Center is the first IoT security service from a major cloud provider that enables organizations to prevent, detect, and help remediate potential attacks on all the different components that make up an IoT deployment: from small sensors, to edge computing devices and gateways, to Azure IoT Hub, and on to the compute, storage, databases, and AI/ML workloads that organizations connect to their IoT deployments. This end-to-end protection is vital to secure IoT deployments. Although devices may be a common target for attackers, the services that store your data and the admins who manage your IoT solution are also valuable targets.

An image showing the Overview tab in Azure Security Center.

As IoT threats evolve due to creative attackers analyzing the new devices, use cases, and applications the industry creates, Microsoft’s unique threat intelligence, sourced from the more than 6 trillion signals that Microsoft collects every day, keeps your organization ahead of attackers. Azure Security Center creates a list of potential threats, ranked by importance, so security pros and IoT admins can remediate problems across devices, IoT services, connected Azure services, and the admins who use them.

Azure Security Center also creates ranked lists of possible misconfigurations and insecure settings, allowing IoT admins and security pros to fix the most important issues in their IoT security posture first. To create these security posture suggestions, Azure Security Center draws from Microsoft’s unique threat intelligence, as well as the industry standards. Customers can also port their data into SIEMs such as Azure Sentinel, allowing security pros to combine IoT security data with data from across the organization for artificial intelligence or advanced analysis.

Organizations can monitor their entire IoT solution, stay ahead of evolving threats, and fix configuration issues before they become threats. When combined with Microsoft’s secure-by-design devices, services, and the expertise we share with you and your partners, Azure Security Center for IoT provides an important way to reduce the risk of IoT while achieving your business goals. 

Next steps

*Used with permission from Bain & Company

Posted on Leave a comment

How Microsoft 365 can help health providers adapt in an era of patient data protection and sharing

For years, patient data management meant one thing—secure the data. Now, healthcare leaders must protect and openly share the data with patients and with other healthcare organizations to support quality of care, patient safety, and cost reduction. As data flows more freely, following the patient, there’s less risk of redundant testing that increases cost and waste. Legacy infrastructure and cybersecurity concerns stand on the critical path to greater interoperability and patient record portability. Learn how Microsoft 365 can help.

Impact of regulatory changes and market forces

Regulatory changes are a big driver for this shift. Through regulations like the 21st Century Cures Act in the United States, healthcare organizations are required to improve their capabilities to protect and share patient data. The General Data Protection Regulation (GDPR) in the European Union expands the rights of data subjects over their data. Failing to share patient data in an effective, timely, and secure manner can result in significant penalties for providers and for healthcare payors.

Market forces are another driver of this shift as consumers’ expectations of omni-channel service and access spill over to healthcare. This augurs well for making the patient more central to data flows.

There are unintended consequences, however. The increasing need to openly share data creates new opportunities for hackers to explore, and new risks for health organizations to manage.

It’s more important than ever to have a data governance and proactive cybersecurity strategy that enables free data flow with an optimal security posture. In fact, government regulators will penalize healthcare organizations for non-compliance—and so will the marketplace.

How Microsoft 365 can prepare your organization for the journey ahead

Modernizing legacy systems and processes is a daunting, expensive task. Navigating a digitized but siloed information system is costly, impedes clinician workflow, and complicates patient safety goals.

To this end, Microsoft Teams enables the integration of electronic health record information and other health data, allowing care teams to communicate and collaborate about patient care in real-time. Leading interoperability partners continue to build the ability to integrate electronic health records into Teams through a FHIR interface. With Teams, clinical workers can securely access patient information, chat with other team members, and even have modern meeting experiences, all without having to switch between apps.

Incomplete data and documentation are among the biggest sources of provider and patient dissatisfaction. Clinicians value the ability to communicate with each other securely and swiftly to deliver the best informed care at point of care.

Teams now offers new secure messaging capabilities, including priority notifications and message delegation, as well as a smart camera with image annotation and secure sharing, so images stay in Teams and aren’t stored to the clinician’s device image gallery.

Image of phone screens showing priority notifications and message delegation.

What about cybersecurity and patient data? As legacy infrastructure gives way to more seamless data flow, it’s important to protect against a favorite tactic of cyber criminals—phishing.

Phishing emails—weaponized emails that appear to come from a reputable source or person—are increasingly difficult to detect. As regulatory pressure mounts within healthcare organizations to not “block” access to data, the risk of falling for such phishing attacks is expected to increase. To help mitigate this trend, Office 365 Advanced Threat Protection (ATP) has a cloud-based email filtering service with sophisticated anti-phishing capabilities.

For example, Office 365 ATP provides real-time detonation capabilities to find and block unknown threats, including malicious links and attachments. Links in email are continuously evaluated for user safety. Similarly, any attachments in email are tested for malware and unsafe attachments are removed.

Image of a message appearing on a tablet screen showing a website that has been classified as malicious.

For data to flow freely, it’s important to apply the right governance and protection to sensitive data. And that is premised on appropriate data classification. Microsoft 365 helps organizations find and classify sensitive data across a variety of locations, including devices, apps, and cloud services with Microsoft Information Protection. Administrators need to know that sensitive data is accessed by authorized personnel only. Microsoft 365, through Azure Active Directory (Azure AD), enables capabilities like Multi-Factor Authentication (MFA) and conditional access policies to minimize the risk of unauthorized access to sensitive patient information.

For example, if a user or device sign-in is tagged as high-risk, Azure AD can automatically enforce conditional access policies that can limit or block access or require the user to re-authenticate via MFA. Benefitting from the integrated signals of the Microsoft Intelligent Security Graph, Microsoft 365 solutions look holistically at the user sign-in behavior over time to assess risk and investigate anomalies where needed.

When faced with the prospect of internal leaks, Supervision in Microsoft 365 can help organizations monitor employees’ communications channels to manage compliance and reduce reputational risk from policy violations. As patient data is shared, tracking its flow is essential. Audit log and alerts in Microsoft 365 includes several auditing and reporting features that customers can use to track certain activity such as changes made to documents and other items.

Finally, as you conform with data governance regulatory obligations and audits, Microsoft 365 can assist you in responding to regulators. Advanced eDiscovery and Data Subject Requests (DSRs) capabilities offer the agility and efficiency you need when going through an audit, helping you find relevant patient data or respond to patient information requests.

Using the retention policies of Advanced Data Governance, you can retain core business records in unalterable, compliant formats. With records management capabilities, your core business records can be properly declared and stored with full audit visibility to meet regulatory obligations.

Learn more

Healthcare leaders must adapt quickly to market and regulatory expectations regarding data flows. Clinical and operations leaders depend on data flowing freely to make data-driven business and clinical decisions, to understand patterns in patient care and to constantly improve patient safety, quality of care, and cost management.

Microsoft 365 helps improve workflows through the integration power of Teams, moving the right data to the right place at the right time. Microsoft 365 also helps your security and compliance posture through advanced capabilities that help you manage and protect identity, data, and devices.

Microsoft 365 is the right cloud platform for you in this new era of patient data protection—and data sharing. Check out the Microsoft 365 for health page to learn more about how Microsoft 365 and Teams can empower your healthcare professionals in a modern workplace.

Posted on Leave a comment

New machine learning model sifts through the good to unearth the bad in evasive malware

We continuously harden machine learning protections against evasion and adversarial attacks. One of the latest innovations in our protection technology is the addition of a class of hardened malware detection machine learning models called monotonic models to Microsoft Defender ATP‘s Antivirus.

Historically, detection evasion has followed a common pattern: attackers would build new versions of their malware and test them offline against antivirus solutions. They’d keep making adjustments until the malware can evade antivirus products. Attackers then carry out their campaign knowing that the malware won’t initially be blocked by AV solutions, which are then forced to catch up by adding detections for the malware. In the cybercriminal underground, antivirus evasion services are available to make this process easier for attackers.

Microsoft Defender ATP’s Antivirus has significantly advanced in becoming resistant to attacker tactics like this. A sizeable portion of the protection we deliver are powered by machine learning models hosted in the cloud. The cloud protection service breaks attackers’ ability to test and adapt to our defenses in an offline environment, because attackers must either forgo testing, or test against our defenses in the cloud, where we can observe them and react even before they begin.

Hardening our defenses against adversarial attacks doesn’t end there. In this blog we’ll discuss a new class of cloud-based ML models that further harden our protections against detection evasion.

Most machine learning models are trained on a mix of malicious and clean features. Attackers routinely try to throw these models off balance by stuffing clean features into malware.

Monotonic models are resistant against adversarial attacks because they are trained differently: they only look for malicious features. The magic is this: Attackers can’t evade a monotonic model by adding clean features. To evade a monotonic model, an attacker would have to remove malicious features.

Monotonic models explained

Last summer, researchers from UC Berkeley (Incer, Inigo, et al, “Adversarially robust malware detection using monotonic classification”, Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, ACM, 2018) proposed applying a technique of adding monotonic constraints to malware detection machine learning models to make models robust against adversaries. Simply put, the said technique only allows the machine learning model to leverage malicious features when considering a file – it’s not allowed to use any clean features.

Figure 1. Features used by a baseline versus a monotonic constrained logistic regression classifier. The monotonic classifier does not use cleanly-weighted features so that it’s more robust to adversaries.

Inspired by the academic research, we deployed our first monotonic logistic regression models to Microsoft Defender ATP cloud protection service in late 2018. Since then, they’ve played an important part in protecting against attacks.

Figure 2 below illustrates the production performance of the monotonic classifiers versus the baseline unconstrained model. Monotonic-constrained models expectedly have lower outcome in detecting malware overall compared to classic models. However, they can detect malware attacks that otherwise would have been missed because of clean features.

Figure 2. Malware detection machine learning classifiers comparing the unconstrained baseline classifier versus the monotonic constrained classifier in customer protection.

The monotonic classifiers don’t replace baseline classifiers; they run in addition to the baseline and add additional protection. We combine all our classifiers using stacked classifier ensembles–monotonic classifiers add significant value because of the unique classification they provide.

How Microsoft Defender ATP uses monotonic models to stop adversarial attacks

One common way for attackers to add clean features to malware is to digitally code-sign malware with trusted certificates. Malware families like ShadowHammer, Kovter, and Balamid are known to abuse certificates to evade detection. In many of these cases, the attackers impersonate legitimate registered businesses to defraud certificate authorities into issuing them trusted code-signing certificates.

LockerGoga, a strain of ransomware that’s known for being used in targeted attacks, is another example of malware that uses digital certificates. LockerGoga emerged in early 2019 and has been used by attackers in high-profile campaigns that targeted organizations in the industrial sector. Once attackers are able breach a target network, they use LockerGoga to encrypt enterprise data en masse and demand ransom.

Figure 3. LockerGoga variant digitally code-signed with a trusted CA

When Microsoft Defender ATP encounters a new threat like LockerGoga, the client sends a featurized description of the file to the cloud protection service for real-time classification. An array of machine learning classifiers processes the features describing the content, including whether attackers had digitally code-signed the malware with a trusted code-signing certificate that chains to a trusted CA. By ignoring certificates and other clean features, monotonic models in Microsoft Defender ATP can correctly identify attacks that otherwise would have slipped through defenses.

Very recently, researchers demonstrated an adversarial attack that appends a large volume of clean strings from a computer game executable to several well-known malware and credential dumping tools – essentially adding clean features to the malicious files – to evade detection. The researchers showed how this technique can successfully impact machine learning prediction scores so that the malware files are not classified as malware. The monotonic model hardening that we’ve deployed in Microsoft Defender ATP is key to preventing this type of attack, because, for a monotonic classifier, adding features to a file can only increase the malicious score.

Given how they significantly harden defenses, monotonic models are now standard components of machine learning protections in Microsoft Defender ATP‘s Antivirus. One of our monotonic models uniquely blocks malware on an average of 200,000 distinct devices every month. We now have three different monotonic classifiers deployed, protecting against different attack scenarios.

Monotonic models are just the latest enhancements to Microsoft Defender ATP’s Antivirus. We continue to evolve machine learning-based protections to be more resilient to adversarial attacks. More effective protections against malware and other threats on endpoints increases defense across the entire Microsoft Threat Protection. By unifying and enabling signal-sharing across Microsoft’s security services, Microsoft Threat Protection secures identities, endpoints, email and data, apps, and infrastructure.

Geoff McDonald (@glmcdona),Microsoft Defender ATP Research team
with Taylor Spangler, Windows Data Science team


Talk to us

Questions, concerns, or insights on this story? Join discussions at the Microsoft Defender ATP community.

Follow us on Twitter @MsftSecIntel.

Posted on Leave a comment

Co-hosts revealed for Sept. 28 MINECON Live event

Got any plans on September 28th? Meeting friends? Getting married? Watching paint dry? Well, CANCEL THEM ALL (unless it’s the marriage one) because September 28th is the date of MINECON Live, our epic livestream celebration of all things Minecraft! It’ll be easy to stream  LIVE all over the world, including at that aforementioned wedding. Don’t forget to scowl at anyone who objects and to tell the bride and groom to keep the volume down with those vows — you’re trying to enjoy all the new Minecraft announcements.

This handy page has loads of info about MINECON Live, but the page you’re currently on is no MINECON Live dunce either. Because today, we’re revealing the co-hosts, for the very first time! (Unless you follow us on Twitter!). Let’s meet the fabulous foursome who’ll be co-hosting with Lydia Winters:

MASUO

Japanese Influencer and a strong contender for ‘smiliest man ever filmed’, Masuo will be co-hosting MINECON Live! But what’s his favourite skill in Minecraft? What block would he like to see added to the game? What’s the meaning of life? Watch Masuo answer two-thirds of those questions in the video below!

Posted on Leave a comment

The stories behind Microsoft’s affordable housing initiative

The Puget Sound region has been home to Microsoft for more than 30 years. As the company has grown, the area has changed. New industries have brought more jobs, fresh opportunities and greater prosperity. 

But new housing has not kept up with job growth, and the Greater Seattle area has become the sixth most expensive place to live in the United States.  

That means many of the workers who make a community function – such as nurses, police officers, teachers and firefighters – can no longer afford to live in the cities or suburbs where they work. 

Chart showing Job growth compared to housing growth

The problem is particularly acute in the suburban cities around Seattle. Low- and middle-income workers often face long commutes.

[Subscribe to Microsoft on the Issues for more on the topics that matter most.]

Microsoft is committed to helping kick-start solutions to this crisis, and is  investing $500 million to advance affordable housing solutions. Microsoft is also advocating for changes in public policy at city and state levels to address the long-term factors affecting housing affordability.

This commitment is about more than housing. It is about the people who make our communities places we all want to live in.

For more on Microsoft’s initiatives in the Puget Sound region follow @MSFTIssues on Twitter.  

Posted on Leave a comment

At global Hackathon, customers break something to make something

Summer is a time for growth. Whether you’re traveling to an historical destination or picking out a book for the beach, the season is ripe for taking a break from the grind to focus on introspection and renewal, to make new friends, re-connect with old ones, and create shared experiences together. With any luck, come autumn you have a sharpened mind and a greater sense of where you want to go next.

Which is why summer is the ideal time for the Microsoft global Hackathon. Minds will be sharpened, advancement made tangible, and friends with diverse backgrounds will be brought together to create shared experiences.

By now you’re probably aware of the 27,000 employees who gather at Microsoft’s Redmond, Washington campus and 45 venues around the world, embracing the event (part of One Week – a series celebrating the company’s people, products and ideas) as a platform for innovation. But at the 6th annual installment, there’s another rapidly growing segment that deserves its own spotlight: customer collaborations.

Two participants wave
More than 30 customer teams join 27,000 Microsoft employees at the 2019 Microsoft global Hackathon. (Photo by Scott Eklund, Red Box Pictures)

“We started inviting customers two years ago,” explains Susie Kandzor, group program manager at The Garage, an experimentation and growth program at Microsoft that produces the Hackathon to further its mission of encouraging collaboration, creativity and experimentation. “In 2017, we only had four customers join us. Last year we had 10 customers join us, and the feedback from executive leadership was that they loved it and wanted more.”

For the 2019 installment, the largest private hackathon on the planet welcomes some 30 companies (a dozen more will participate around the globe). Each sends three to five representatives, cross-functionality encouraged, arriving with wildly diverse business hurdles they hope to jump – and confidence that the latest technological breakthroughs can get them there.

“This is how we channel innovation into a focused effort,” says Angela Yochem, executive vice president/chief digital and technology officer for Novant Health, a network of healthcare providers that attended the global Hackathon in 2018 and is sending two teams this year from their offices in North Carolina.

“Remember in the movie ‘Apollo 13,’ where there’s something wrong with the spacecraft and all the engineers get together, spill parts all over a table, and using their past experiences and backgrounds, solve the problem? A Hackathon is that, on steroids.”

A doctor uses a touch-screen device to consult with a patient.
By leveraging technology, Novant Health is improving the health of its community. (Photo courtesy of Novant Health)

“We’re going to talk about the art of the possible,” agrees Kirk Windisch, Novant Health’s vice president of Digital Products and Services. “I’m excited to find solutions that we haven’t even thought of yet.”

The 2019 list of customer attendees is as diverse as it is impressive. Where else could you find 3M, Starbucks, Mastercard and Blackbaud under one roof? From meals (Nestle) to electricity (Chesapeake Energy) to investments (Vanguard), you’d be hard-pressed to find a greater range of industries innovating alongside one another.

“In the past we’ve seen a lot of instances where companies talk between themselves, and the Microsoft Hackathon has introduced different companies to one another. We’re just humbled by the enthusiasm our customers have toward hacking, and honored that these customers have given us the opportunity to help develop their growth ideas,” Kandzor says of the Hackathon’s unique atmosphere.

One customer attending Hackathon 2019 is Bellevue, Washington-based T-Mobile – a company with over 80 million customers and annual revenues of $43 billion – wearing their self-proclaimed moniker of “The Un-carrier” with disruptive pride. Principal analyst Sarah O’Brien says T-Mobile is perfectly positioned for the Hackathon experience.

Two T-Mobile employees collaborate at a workstation.
T-Mobile employees, who proudly sport their branded black and magenta, are encouraged to share ideas that lead to new technology solutions. (Photo courtesy of T-Mobile)

“I was at a conference not long ago, and my takeaway was the sheer volume of publishing, whitepapers and patents around machine learning and AI coming out of Microsoft ­– the true investment in it – and the notion that rather than treating it like a buzzword, there is thought leadership and movement to drive it forward for everyone,” she says.

“Our companies have a lot of shared experience and recognition that what made you successful in the past does not guarantee success in the future, so I’m excited that we can put these great teams together and build something impactful.”

Novant Health has over 650 locations in five states, and provides increased access to care through digital channels, and through advanced tech in their hospitals and physician centers. “We just deployed an AI-based system for treating stroke patients faster than ever before,” says Yochem, citing one exciting example. “With a stroke victim, every minute matters, and now we are able to save many more lives. It’s an example of how leveraging technology can impact the health of our community.”

Two Novant Health employees consult monitors at a nursing station.
Novant Health team members train on new technology at patient check-in. (Photo courtesy of Novant Health)

And while Novant Health’s goal is nothing short of saving lives, other companies may simply seek to improve the quality of life.

“We’re empowered to achieve more, simply by combining forces,” says Jan-Jaap Oosterwijk, global head of innovation for digital platform security firm Irdeto, who is flying in with his team from The Netherlands. “I love the diversity of the event. I also really like that in the invitation, it was specified that the team doesn’t need to consist of engineers only. The Hackathon is open to people from any background, which will provide a wide range of perspectives.”

There are a lot of great brains working together at the global Hackathon, using a variety of technologies (last year, efforts focused on everything from artificial technology to sustainable farming). Much like a summer cookout, each customer brings their own specialty – in this case, a hack.

Posted on Leave a comment

Office 365 now available from new South Africa cloud datacenters

As Microsoft strives to support the digital transformation of organizations and enterprises around the world, we continue to drive innovation and expand into new geographies to empower more customers with Office 365, the world’s leading cloud-based productivity solution, with more than 180 million commercial monthly active users. Today, we’re taking another step in our ongoing investment to help enable digital transformation and societal impact across Africa with the general availability of Office 365 services from our new cloud datacenters in South Africa.

Office 365, delivered from local datacenters in South Africa, helps our customers enable the modern workplace and empower their employees with real-time collaboration and cloud-powered intelligence while maintaining security, compliance, and in-country customer data residency. The addition of South Africa as a new geography for Office 365 increases the options for secure, cloud productivity services combined with customer data residency in 16 geographies across the globe along with three additional geographies also announced.

In-country data residency for core customer data helps Office 365 customers meet regulatory requirements, which is particularly important and relevant in industries such as healthcare, financial services, and government—where organizations need to keep specific data in-country to comply with local requirements. Customer data residency provides additional assurances regarding data privacy and reliability for organizations and enterprises. Core customer data is stored only in their datacenter geography (Geo)—in this case, the cloud datacenters within South Africa.

Customers like Altron and the Gauteng Provincial Government have used Office 365 to transform their workplaces. This latest development will enable them—and other organizations and enterprises adopting Office 365—to ramp up their digital transformation journey.

“Altron is committed to improving our infrastructure and embracing a strategy to become a cloud-first company to better serve our customers and empower our employees through modern collaboration. We’ve noticed a tangible difference since making the move to Office 365.”
—Debra Marais, Lead, IT Shared Services at Altron

“Office 365 is driving our modernization journey of Government ICT infrastructure and services by allowing us to develop pioneering solutions at manageable costs and create overall improvements in operations management, all while improving transparency and accountability.”
—David Kramer, Deputy Director General, ICT at Gauteng Provincial Government

Microsoft recently became the first global provider to deliver cloud services from the African continent with the opening of our new cloud datacenter regions. Office 365 joins Azure to expand the intelligent cloud service available from Africa. Dynamics 365 and Power Platform, the next generation of intelligent business applications, are anticipated to be available in the fourth quarter of 2019.

By delivering the comprehensive Microsoft cloud—which includes Azure, Office 365, and Dynamics 365—from datacenters in a given geography, we offer scalable, available, and resilient cloud services to companies and organizations while meeting customer data residency, security, and compliance needs. We have deep expertise in protecting data and empowering customers around the globe to meet extensive security and privacy requirements, including offering the broadest set of compliance certifications and attestations in the industry.

The new cloud regions in South Africa are connected to Microsoft’s other regions via our global network, one of the largest and most innovative on the planet—spanning more than 100,000 miles (161,000 kilometers) of terrestrial fiber and subsea cable systems to deliver services to customers. Microsoft is bringing the global cloud closer to home for African organizations and citizens through our trans-Arabian paths between India and Europe, as well as our trans-Atlantic systems, including Marea, the highest capacity cable to ever cross the Atlantic.

We’re committed to accelerating digital transformation across the continent through numerous initiatives and also recently announced Microsoft’s first Africa Development Centre (ADC), with two initial sites in Nairobi, Kenya and Lagos, Nigeria. The ADC will serve as a premier center of engineering for Microsoft, where world-class African talent can create solutions for local and global impact. With our new cloud datacenter regions, the ADC, and programs like 4Afrika, we believe Africa is poised to develop locally and scale for global impact better than ever before.

Learn more about Office 365 and Microsoft in the Middle East and Africa.