Posted on Leave a comment

Game Developers Conference highlights: Phil Spencer and Sarah Bond fireside chat, lots of demo sessions and more

Twitter

Discord

YouTube

Ambassadors

Posted on Leave a comment

Closing the cybersecurity skills gap – Microsoft expands efforts to 23 countries

Cybersecurity continues to be a significant threat for governments, businesses and individuals around the world. From supply chain disruptions to ransomware attacks, cybercriminals have become increasingly sophisticated and the threat landscape more diverse. These cybersecurity challenges are compounded by a workforce shortage; there simply aren’t enough people with the cybersecurity skills needed to fill open jobs.

This is a global problem. By 2025, there will be 3.5 million cybersecurity jobs open globally, representing a 350% increase over an eight-year period. We recently announced a national skilling campaign in the United States, where for every two jobs in cybersecurity today, a third goes unfilled. We’re working with community colleges to help close the gap and increase diversity in the profession. Today, Microsoft is announcing the expansion of our cybersecurity skills campaign to an additional 23 countries.

The expansion will see new targeted investments in the following countries: Australia, Belgium, Brazil, Canada, Colombia, Denmark, France, Germany, India, Ireland, Israel, Italy, Japan, Korea, Mexico, New Zealand, Norway, Poland, Romania, South Africa, Sweden, Switzerland, and the United Kingdom. These countries have an elevated cyberthreat risk, coupled with a significant gap in their cybersecurity workforces both in terms of the number of professionals employed in cybersecurity vs. the demand, as well as a lack of diversity.

Based on our research, we’ve created a Power BI to shed light on the cybersecurity skills gap in these countries:

As with our U.S. program, one of our goals is to ensure traditionally excluded populations have opportunities to enter the cybersecurity workforce, including women. The global cybersecurity workforce is woefully lacking in diversity: in the countries where we are expanding our campaign, on average, only 17% of the cybersecurity workforce are female. Leaving women out of the cybersecurity workforce leaves talent on the table and will only hurt our ability to close the skills gap. This isn’t just about equality, there’s a business case too: gender-diverse businesses perform better.

Gender disparity chart
Gender disparity among cybersecurity professionals in 23 countries.

Global scale, meeting local needs
To address the cybersecurity skills gap, there are a few baseline elements that are needed around the world:

First, we need to better understand the skills gap and share best practices. As a broader community, we can’t solve a problem we don’t fully understand, which is why Microsoft is launching a new partnership with the Organization for Economic Cooperation and Development (OECD) to not only develop a detailed study on the skills gap in selected countries but also improve the ability to grow cybersecurity workforces through postsecondary education and training. Together with the OECD, we will make this data publicly available to allow both policymakers and businesses to make more informed decisions, and we will convene member countries to share learnings and best practices.

Second, anyone interested in pursuing cybersecurity as a career – whether students, people changing careers or current IT professionals – need access to industry-aligned skilling content so that they can train for these critical roles. That is why, as part of this expansion, we are offering free training for cybersecurity pathways through our LinkedIn Learning platform, including courses like “The Cybersecurity Threat Landscape” and “Cybersecurity Foundations.” Additionally, learners seeking more technical skilling opportunities can access free security courses through our Microsoft Learn platform with 47 Learning Paths and hundreds of hours of content.

Third, educational institutions need more teachers able and equipped to teach cybersecurity students, which is why we are partnering with educational institutions to provide curriculum. Through our Microsoft Learn for Educators program, we are providing all higher education institutions with access to free curriculum, educator training and tools for teaching, including coursework like Microsoft Security, Compliance and Identity Fundamentals, Microsoft Azure Security Technologies certification and more. We also provide faculty at all these institutions with access to additional resources including free practice and certification exams, curriculum integration support and more. To date, more than 1,000 institutions of higher education around the world have joined the program.

Fourth, we need to provide support to diverse and underserved job seekers. That’s why we are partnering with Ecole 42, a tuition-free global computer science training program with a mission to educate the next generation of software engineers, to make Microsoft cybersecurity content available to its 15,000 learners globally, using peer-to-peer learning and gamification. We’re also launching a partnership with Women in Cybersecurity, a nonprofit with the mission of recruiting, retaining and advancing women in cybersecurity, to expand their student chapters in these 23 countries, helping promote the retention and advancement of women in cybersecurity.

Finally, the cybersecurity skills gap will not be solved with a one-size-fits-all solution. In each of the countries where we are expanding our campaign, Microsoft will work with local education institutions, nonprofits, governments and businesses to develop a cybersecurity skills program that fits the unique needs of their own market – anchored in data about the cybersecurity skills gap in each country. That said, we are building the framework based on a common set of needs, and ensuring we expand access to tools we have available today.

Global expansion
Work is already underway. Here are just a few examples, and we’ll share more details about countries’ plans in the coming weeks and months:

In Colombia, the government has embarked on an initiative to increase its national cybersecurity capacity, including the implementation of professional training programs in areas such as digital security, information security, cybersecurity and critical infrastructure. Our cybersecurity skills work in Colombia will support this effort, helping people acquire cybersecurity and digital skills needed for in-demand jobs. That’s why we’re working with Servicio Nacional de Aprendizaje (SENA), a Colombian public institution that provides free vocational training to millions of Colombians, the Universidad de los Andes, a major private university in Colombia, and local nongovernmental organizations, to offer a “train the trainers” program to equip more than 68,000 Colombians, including 20,000 women, with the skills needed to help fill the many open cybersecurity jobs.

In India, we’re building off our existing CyberShikshaa program, which is helping break down the gender divide in the cybersecurity field. Since 2018, we have helped young women with technical training in cybersecurity with mentoring from industry experts, especially from women leaders in the field, followed by job placement assistance with leading companies. By 2025, the cybersecurity sector in India will have an estimated 1.5 million job vacancies. This represents a 42% talent shortage even as cybersecurity job growth is projected to grow by 32% by 2028, according to India’s Labor Bureau. The demand is there, but more must be done to meet it; most higher-education and technical institutes do not offer cybersecurity courses.

That’s why we have also partnered with ICT Academy, a nonprofit partner in India, to develop cybersecurity training programs for educators and higher-education students at 100 institutions in five states, with an emphasis on rural colleges. Through this initiative, CyberShikshaa for Educators, we’ll help more faculty become cybersecurity trainers, and then provide students cybersecurity training and job placement assistance to help them find new careers. In the first phase, we aim to train about 6,000 students and will then work with our partner network to connect students to job opportunities and internships.

A look at our U.S. progress – and a look to the future
In the five months since we announced our U.S. cybersecurity skills for jobs campaign, we are making progress. Today, we are working with 135 U.S. community colleges, providing access to free curriculum, educator training and tools for teaching. We’re sharing cybersecurity best practices with schools through the American Association of Community Colleges, the first of three cohorts we are providing grants for funding technical assistance to accelerate their cybersecurity programs. Finally, we’re granting scholarships to students seeking a degree or certification in a cybersecurity field. We are learning a lot and will share more in the months to come.

The number of cybersecurity attacks around the world is increasing every day, and increasing in complexity as cybercriminals continue to escalate their activity. People will be impacted no matter where they live. It’s critical that we invest in the cybersecurity workforce to ensure there are enough people with the skills needed to thwart these attacks and protect the digital ecosystem to keep organizations secure and people safe.

Tags: , ,

Posted on Leave a comment

New Microsoft Teams announcements for hybrid work at this week’s Enterprise Connect 2022 event

Five years ago, Microsoft Teams began its incredible journey. Today with over 270 million users, Teams is where hybrid work happens. Teams brings together everything you need to communicate, collaborate, and stay in the flow of your work. From connecting with those outside your organization, to giving you the flexibility to work where, when, and how you want, these improvements address the new expectations for today’s workplace.

A recent Morgan Stanley chief information officer (CIO) survey reports that over half of organizations have standardized on Teams.¹ Teams Phone alone counts nearly 80 million active users, placing over a billion calls monthly – including more than 90% of the Fortune 500 that used Teams Phone in the last quarter. Additionally, the number of active Teams Rooms devices more than doubled year-over-year.

But our work is far from over.

Since launch, we have added hundreds of Teams features that were directly influenced by your feedback. From Together Mode to 3-D emojis, we continue to integrate new ways for you to express yourself in Teams, celebrate wins together, and show appreciation for your co-workers. We have worked hard to help you connect and collaborate with colleagues, customers, and co-workers. You have shared your ideas, and we have listened. The continual improvement and reinvention you see in Teams is inspired by you.

At Enterprise Connect 2022, we’re showcasing the latest Microsoft Teams features – built for the ways you work.

Operator Connect Mobile: fixed-mobile convergence for flexible mobile communication and collaboration

As organizations experiment with flexible working models and reimagined physical spaces, a whole new set of workers are going “mobile”. This growing segment needs 24/7 mobility, not a 9-to-5 anchor. For many, the days of a fixed phone on a fixed desk in a fixed office are over, and Teams enables you to cut the cord.

This year, we’ll launch Operator Connect Mobile for Microsoft Teams Phone, enabling mobile-first calling experiences in partnership with some of the world’s largest telecom operators.

With Operator Connect Mobile, a single SIM-enabled number for Teams Phone serves as your desk phone number, your mobile number, and your Teams number. Seamlessly move calls across networks and devices with no call interruption. Transition calls from your cellular service while on-the-go to your office Wi-Fi to bring in rich video calling enabled by voice over IP. Make and receive calls on your phone’s native dialer and benefit from all the collaborative richness of Teams. Get call history, voicemail, and transcriptions in Teams and on your mobile device, while unified presence lets your colleagues see when you’re on a call – all automatically.

Setting up and managing Operator Connect Mobile is simple as well. It’s built upon the same framework and interface as the Operator Connect service we launched last year. Select from participating operators in the Teams Admin Center, purchase your license, and assign your operator-provided numbers. It’s that easy. Admins can also access call dashboards and advanced policy settings for additional insights and control.

Operator Connect Mobile leverages capabilities from the Azure for Operators product family, formerly Metaswitch Networks. Azure’s Mobile Control Point makes it easier for telecom operators to integrate with Operator Connect Mobile, enhancing their end users’ mobile experience with Teams.

Operator Connect Mobile for Teams Phone will be available through the following partners in a limited preview in the months ahead, with an expanded list of participating operators as the service becomes generally available later this year.

Mobile Operators.png

New Teams Phone features enable richer calling experiences

Teams Phone was built for you. Your input helps us bring innovative new features and capabilities to life.

End-to-end encryption – Some calling scenarios may require added privacy. Teams Phone now offers end-to-end encryption (E2EE) for all 1:1 VoIP calls on mobile as well as on the desktop client. E2EE means that no other party, including Microsoft, has access to the decrypted conversation, giving you confidence your communications remain private.

Common Area Phone enhancements – By early May, we are enhancing the Common Area Phone offering to serve a wider variety of scenarios for customers without increasing the price. Security, endpoint management, and cloud-based voicemail features will be available through the following service plans added to the Common Area Phone license:

  • Azure Active Directory Premium Plan 1
  • Microsoft Endpoint Manager
  • Exchange Online Plan 2

In addition, the following calling features will be available for Teams Phone devices enabled with a Common Area Phone license and the latest Teams app update (available by May 2022):

  • Call park and retrieve
  • Cloud-based voicemail through Exchange Online Plan 2
  • Call queues
  • Auto attendants
  • Group call pick-up
  • Forwarding rules

Within the Admin Center, a Common Area Phone license can be activated for Azure Active Directory Premium Plan 1, Microsoft Endpoint Manager and Exchange Online Plan 2.

DECT device integration with SIP Gateway – We are integrating digital enhanced cordless telecommunications (DECT) devices with SIP Gateway, allowing frontline workers to use Teams calling functionality on DECT devices to communicate with colleagues while on the go. DECT device integration with SIP Gateway will be available by the end of June on the following compatible handset models from Spectralink, Ascom and Poly:

  • Spectralink (IP-DECT 200/400/6500/Virtual IP-DECT, handsets 72xx/75xx/76xx/77xx)
  • Ascom (IP-DECT Access Points IPBSx, Gateway IPBL, Virtual Appliance IPVM, handsets d43/d63/d81/d83/Myco3)
  • Poly (base stations Rove B2/B4, handsets Rove 30/40, repeater Rove R8)

We have been working closely with these partners to create a seamlessly integrated experience, and we will add compatible DECT handset models from OEM partners Yealink and Gigaset by September. Learn more about planning for and configuring SIP Gateway in your organization.

Reimagined “office” communications

Even before the pandemic, organizations began to shift the ways they think about physical office spaces and the flow of work. Using a data-driven approach to product development helps us reimagine workplace experiences, to address the evolving needs and expectations of today’s workers.

Outlook RSVP – One of the challenges brought on by hybrid work is knowing who’s around—and in what form. Multiple schedules can make things messy for organizers. They need to know who is available, and whether they will attend online or in person. Outlook RSVP gives uses a richer set of options to respond to a meeting invite. Organizers and attendees can easily see who will participate online or in person in the response tracker in Outlook. Outlook RSVP will be in public preview for Outlook web access in April.

Enhancements for companion devices – New enhancements to the companion device experience make it easy to join a hybrid meeting from within a conference room. For example, when you bring your personal device into a Teams Room, your audio is automatically turned off to avoid feedback.

Improved meetings gallery settings – Intelligent meetings gallery settings help ensure more inclusive experiences without added distraction. Participants for in-person meetings will be prompted to turn on their video, so remote participants can see everyone clearly. Video feeds for in-person attendees will be hidden from the front of the room, as well as the gallery of other in-person participants freeing up space in the meeting gallery so additional remote participants can be seen more clearly. The names of in-person attendees can now be found under the conference room name—making it easy to identify all participants.

Front row for Teams Rooms – This new meeting layout for Teams Rooms is designed to enhance hybrid meetings and provide in-room participants with greater context of what is happening across various aspects of the meeting. With front row, the gallery is displayed horizontally across the bottom of the screen, at eye level. This placement replicates the left-to-right view if people were seated across from you in the room, and delivers a more natural, face-to-face experience.

Meeting content is surrounded by chat – often the “meeting within the meeting” – so when you’re in a room you can easily see and engage in the conversation in real-time. It provides quick visibility for which participants raise their hands, and in what order. This layout is supported across both single- and dual-display configurations.

Surface Hub 2 Brice – Surface Hub enables colleagues not just to meet and present, but also to collaborate and co-create in the hybrid world. On Surface Hub, teams can whiteboard ideas, contribute to projects, and connect dynamically with a video conference experience that engages people wherever they work – whether remote, in the office, or a mix of work environments.

Next-generation Surface Hub 2 Brice delivers the first neural network, AI-powered camera from Microsoft enabling dynamic video of in-room interactions that creates an inclusive meeting environment for all participants. Auto-framing technology within the device dynamically adjusts your Teams video feed, re-framing the view when someone leaves, more people come in, or a person interacts with content on the display. People in the room can move freely, with confidence they’ll be seen clearly as they interact with remote team members, who appear on the Surface Hub in vibrant and clear video.

Microsoft Whiteboard updates – Collaboration gets a fresh, modern look with more than 50 new Whiteboard templates that help you quickly create structure for ideas and group problem-solving. Everyone in the Teams meeting can write simultaneously on the Whiteboard you’re sharing, whether from their own individual devices or on other Surface Hubs. And new emoji reactions within Whiteboard keep things fun.

New Teams devices from Neat and Yealink – Being seen is essential to an inclusive meeting environment. So is being heard. New meet and co-create solutions from Neat and Yealink are in the process of being certified for Microsoft Teams Rooms on Android, and will be available soon. These devices combine audio, video, touch display, and compute in a single unit—allowing for easy deployment and enhanced collaboration experiences.

Call controls with Bluetooth headsets and speakerphones – As hybrid work moves between the office and home, USB dongles can easily be lost or broken. By next quarter, you will be able to use the buttons on Bluetooth headsets and speakerphones to answer, hold, or end calls as well as toggle mute state without a USB dongle. To take advantage of this, pair your Bluetooth headset or speakerphone with your Windows PC running the Teams desktop client. Teams-certified headsets and speakerphones provide the richest and most complete Teams experience. Stay tuned for updates on Bluetooth headsets and speakerphones.

The new Teams device store within Teams Admin Center – Explore and purchase Teams-certified devices from the Teams Admin Center, There, you can also enable integrated remote provisioning for Teams devices through an authenticated experience. Stay tuned for general availability details.

Making meetings matter

Microsoft Teams gives organizations new ways to work, empowering presenters to be their best, and enabling asynchronous collaboration. New functionality in Teams and PowerPoint delivers inclusive and engaging experiences designed to make your meetings matter.

PowerPoint Recording Studio – You no longer need to appear in person to deliver your message effectively. With PowerPoint Recording Studio, you can create your own presentation, record it, and send it to your coworkers. Then they can catch up and absorb the material when the time is right for them.

Pre-recording with CameoCameo is the PowerPoint experience that seamlessly integrates your Teams video feed into your presentation. Customize how and where you want to appear on your slides. Designer in PowerPoint makes Cameo infinitely more powerful, offering layout recommendations to produce more engaging and impactful presentations.

Soon you’ll be able to pre-record presentation slides using Cameo and Recording Studio. When it comes time to present your slides, it will appear as though you are in the meeting – even if you’re unable to attend. This allows for asynchronous collaboration and co-presentations with others who are unavailable, or in a different time zone. Recording Studio + Cameo, presented with PowerPoint Live will be generally available in the coming months.

Speaker Coach for Teams – Even the most experienced speakers can use guidance on presenting with greater impact. Speaker Coach uses AI to nudge you if you’re speaking too fast, notify you if you are interrupting someone, and remind you to check in with your audience. Speaker Coach is your personal coach, giving you private suggestions that you can turn on or off as you please, and helping you succeed in hybrid or remote environments. Speaker Coach is generally available now.

Language Interpretation for Teams – This new feature enables interpreters to translate speakers in near real-time into a multitude of languages, removing language barriers for audio, video, and content sharing and creating more streamlined meeting experiences. Soon, customers will hold multilingual meetings in Teams, supported by professional interpreters, without having the start-and-stop experience of delayed interpretation. Language Interpretation will be available in the coming months.

Streamline how you plan, organize, and deliver webinars in Teams

Delivering a successful webinar involves creating an interactive digital experience where audiences are inspired and engaged. Often, it requires help to ensure things run smoothly.

Co-organizer – Assign multiple organizers for each event and designate up to 10 different co-organizers. Co-organizers will have the same capabilities and permissions as the organizer, enabling them take on tasks such as admit attendees waiting in the lobby, manage event options, create polls, control audio settings, share content, and spotlight attendees’ feeds throughout the event. In addition, co-organizers will be able to manage breakout rooms once they’ve been set up by the main organizer.

To assign co-organizers before the webinar begins, select the meeting options and click on the dropdown menu under ‘choose co-organizers’ and search and add the relevant people from the list of participants. Co-organizer capabilities will start rolling out at the end of this month.

Quality and performance optimizations for Teams calls and meetings

A key element of our commitment to launching innovative Teams features is making sure these experiences are optimized for all users, regardless of network or device.

Power consumption optimizations – Since 2020, we’ve continuously improved video streaming quality – all while reducing power consumption by half.

High-fidelity music mode – Now you can enable high-quality audio for applications such as music lessons, concerts, or even virtual medical appointments.

Screen-sharing optimization – Teams can now optimize sharing capabilities automatically based upon the type of content , resulting in improved readability and smooth playback.

These updates are generally available or rolling out now.

Flexible and expressive communications and collaboration

Meaningful collaboration involves creating and sustaining productive relationships with others, including those who may not work within your organization. Throughout our industry, there’s great interest in removing data silos created from closed productivity tools. Teams is enabling this change.

Teams Connect – Collaborate seamlessly in the same Teams digital workspace with customers, partners, suppliers, or anyone outside your organization. Teams Connect lets users share channels in Teams— helping to strengthen relationships, collaborate in real-time, and make decisions faster.

When creating a new channel, you will be able to select “Shared” as the channel type. Then you can invite individuals or entire teams from as many organizations as you need. Admins retain control over the process, ensuring security and compliance for data access. Shared channels allow you to create a workspace with no boundaries.

Teams Connect shared channels will go into public preview later this month.

Delivering more flexible and connected experiences

While so much has changed about work, one thing stays the same. People remain the focus of everything we do. With Microsoft Teams supporting your efforts, bringing everyone and everything together, we can make hybrid work more efficient, more productive, and more rewarding.

To everyone who joined us at Enterprise Connect, in person or virtually, thank you for being a part of our team, sharing your ideas and feedback. Your partnership helps us deliver innovative Teams experiences that help make work, really work.

¹Weiss, K., Baer, J., and Huang, B. (2021, October 5). CIO Survey Takeaways- Further Solidifying the Leadership Position. (p3). Morgan Stanley Research.

Posted on Leave a comment

DEV-0537 criminal actor targeting organizations for data exfiltration and destruction

In recent weeks, Microsoft Security teams have been actively tracking a large-scale social engineering and extortion campaign against multiple organizations with some seeing evidence of destructive elements. As this campaign has accelerated, our teams have been focused on detection, customer notifications, threat intelligence briefings, and sharing with our industry collaboration partners to understand the actor’s tactics and targets. Over time, we have improved our ability to track this actor and helped customers minimize the impact of active intrusions and in some cases worked with impacted organizations to stop attacks prior to data theft or destructive actions. Microsoft is committed to providing visibility into the malicious activity we’ve observed and sharing insights and knowledge of actor tactics that might be useful for other organizations to protect themselves. While our investigation into the most recent attacks is still in progress, we will continue to update this blog when we have more to share.

The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads. DEV-0537 started targeting organizations in the United Kingdom and South America but expanded to global targets, including organizations in government, technology, telecom, media, retail, and healthcare sectors. DEV-0537 is also known to take over individual user accounts at cryptocurrency exchanges to drain cryptocurrency holdings.

Unlike most activity groups that stay under the radar, DEV-0537 doesn’t seem to cover its tracks. They go as far as announcing their attacks on social media or advertising their intent to buy credentials from employees of target organizations. DEV-0537 also uses several tactics that are less frequently used by other threat actors tracked by Microsoft. Their tactics include phone-based social engineering; SIM-swapping to facilitate account takeover; accessing personal email accounts of employees at target organizations; paying employees, suppliers, or business partners of target organizations for access to credentials and multifactor authentication (MFA) approval; and intruding in the ongoing crisis-communication calls of their targets.

The social engineering and identity-centric tactics leveraged by DEV-0537 require detection and response processes that are similar to insider risk programs–but also involve short response timeframes needed to deal with malicious external threats. In this blog, we compile the tactics, techniques, and procedures (TTPs) we’ve observed across multiple attacks and compromises. We also provide baseline risk mitigation strategies and recommendations to help organizations harden their organization’s security against this unique blend of tradecraft.

Analysis

The actors behind DEV-0537 focused their social engineering efforts to gather knowledge about their target’s business operations. Such information includes intimate knowledge about employees, team structures, help desks, crisis response workflows, and supply chain relationships. Examples of these social engineering tactics include spamming a target user with multifactor authentication (MFA) prompts and calling the organization’s help desk to reset a target’s credentials.

Microsoft Threat Intelligence Center (MSTIC) assesses that the objective of DEV-0537 is to gain elevated access through stolen credentials that enable data theft and destructive attacks against a targeted organization, often resulting in extortion. Tactics and objectives indicate this is a cybercriminal actor motivated by theft and destruction.

While this actor’s TTPs and infrastructure are constantly changing and evolving, the following sections provide additional details on the very diverse set of TTPs we have observed that DEV-0537 is using.

Initial access

DEV-0537 uses a variety of methods that are typically focused on compromising user identities to gain initial access to an organization including:

  • Deploying the malicious Redline password stealer to obtain passwords and session tokens
  • Purchasing credentials and session tokens from criminal underground forums
  • Paying employees at targeted organizations (or suppliers/business partners) for access to credentials and MFA approval
  • Searching public code repositories for exposed credentials

Using the compromised credentials and/or session tokens, DEV-0537 accesses internet-facing systems and applications. These systems most commonly include virtual private network (VPN), remote desktop protocol (RDP), virtual desktop infrastructure (VDI) including Citrix, or Identity providers (including Azure Active Directory, Okta). For organizations using MFA security, DEV-0537 used two main techniques to satisfy MFA requirements–session token replay and using stolen passwords to trigger simple-approval MFA prompts hoping that the legitimate user of the compromised account eventually consents to the prompts and grants the necessary approval.

In some cases, DEV-0537 first targeted and compromised an individual’s personal or private (non-work-related) accounts giving them access to then look for additional credentials that could be used to gain access to corporate systems. Given that employees typically use these personal accounts or mobile phone numbers as their second-factor authentication or password recovery, the group would often use this access to reset passwords and complete account recovery actions.

Microsoft also found instances where the group successfully gained access to target organizations through recruited employees (or employees of their suppliers or business partners). DEV-0537 advertised that they wanted to buy credentials for their targets to entice employees or contractors to take part in its operation. For a fee, the willing accomplice must provide their credentials and approve the MFA prompt or have the user install AnyDesk or other remote management software on a corporate workstation allowing the actor to take control of an authenticated system. Such a tactic was just one of the ways DEV-0537 took advantage of the security access and business relationships their target organizations have with their service providers and supply chains. 

Partial screenshot of a messaging application showing a text message from LAPSUS$ with the following heading: We recruit employees/insider at the following!!!!
Figure 1. Screenshot of an ad recruiting employees to give out access to their employer’s network

In other observed activity, DEV-0537 actors performed a SIM-swapping attack to access a user’s phone number before signing into the corporate network. This method allows the actors to handle phone-based authentication prompts they need to gain access to a target.  

Once standard user credentials or access was obtained, DEV-0537 typically connected a system to an organization’s VPN. In some cases, to meet conditional access requirements, DEV-0537 registered or joined the system to the organization’s Azure Active Directory (Azure AD).

Reconnaissance and privilege escalation

Once DEV-0537 obtained access to the target network using the compromised account, they used multiple tactics to discover additional credentials or intrusion points to extend their access including:

  • Exploiting unpatched vulnerabilities on internally accessible servers including JIRA, Gitlab, and Confluence
  • Searching code repositories and collaboration platforms for exposed credentials and secrets

They have been consistently observed to use AD Explorer, a publicly available tool, to enumerate all users and groups in the said network. This allows them to understand which accounts might have higher privileges. They then proceeded to search collaboration platforms like SharePoint or Confluence, issue-tracking solutions like JIRA, code repositories like GitLab and GitHub, and organization collaboration channels like Teams or Slack to discover further high-privilege account credentials to access other sensitive information.

DEV-0537 is also known to exploit vulnerabilities in Confluence, JIRA, and GitLab for privilege escalation. The group compromised the servers running these applications to get the credentials of a privileged account or run in the context of the said account and dump credentials from there. The group used DCSync attacks and Mimikatz to perform privilege escalation routines. Once domain administrator access or its equivalent has been obtained, the group used the built-in ntdsutil utility to extract the AD database.

In some cases, DEV-0537 even called the organization’s help desk and attempted to convince the support personnel to reset a privileged account’s credentials. The group used the previously gathered information (for example, profile pictures) and had a native-English-sounding caller speak with the help desk personnel to enhance their social engineering lure. Observed actions have included DEV-0537 answering common recovery prompts such as “first street you lived on” or “mother’s maiden name” to convince help desk personnel of authenticity. Since many organizations outsource their help desk support, this tactic attempts to exploit those supply chain relationships, especially where organizations give their help desk personnel the ability to elevate privileges.

Exfiltration, destruction, and extortion

Based on our observation, DEV-0537 has dedicated infrastructure they operate in known virtual private server (VPS) providers and leverage NordVPN for its egress points. DEV-0537 is aware of detections such as impossible travel and thus picked VPN egress points that were geographically like their targets. DEV-0537 then downloaded sensitive data from the targeted organization for future extortion or public release to the system joined to the organization’s VPN and/or Azure AD-joined system.

DEV-0537 has been observed leveraging access to cloud assets to create new virtual machines within the target’s cloud environment, which they use as actor-controlled infrastructure to perform further attacks across the target organization.

If they successfully gain privileged access to an organization’s cloud tenant (either AWS or Azure), DEV-0537 creates global admin accounts in the organization’s cloud instances, sets an Office 365 tenant level mail transport rule to send all mail in and out of the organization to the newly created account, and then removes all other global admin accounts, so only the actor has sole control of the cloud resources, effectively locking the organization out of all access. After exfiltration, DEV-0537 often deletes the target’s systems and resources. We’ve observed deletion of resources both on-premises (for example, VMware vSphere/ESXi) and in the cloud to trigger the organization’s incident and crisis response process.

The actor has been observed then joining the organization’s crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow and their corresponding response. It is assessed this provides DEV-0537 insight into the victim’s state of mind, their knowledge of the intrusion, and a venue to initiate extortion demands. Notably, DEV-0537 has been observed joining incident response bridges within targeted organizations responding to destructive actions. In some cases, DEV-0537 has extorted victims to prevent the release of stolen data, and in others, no extortion attempt was made and DEV-0537 publicly leaked the data they stole.

Impact

Early observed attacks by DEV-0537 targeted cryptocurrency accounts resulting in compromise and theft of wallets and funds. As they expanded their attacks, the actors began targeting telecommunication, higher education, and government organizations in South America. More recent campaigns have expanded to include organizations globally spanning a variety of sectors. Based on observed activity, this group understands the interconnected nature of identities and trust relationships in modern technology ecosystems and targets telecommunications, technology, IT services and support companies–to leverage their access from one organization to access the partner or supplier organizations. They have also been observed targeting government entities, manufacturing, higher education, energy, retailers, and healthcare.

Microsoft will continue to monitor DEV-0537 activity and implement protections for our customers. The current detections and advanced detections in place across our security products are detailed in the following sections.

Actor actions targeting Microsoft

This week, the actor made public claims that they had gained access to Microsoft and exfiltrated portions of source code. No customer code or data was involved in the observed activities. Our investigation has found a single account had been compromised, granting limited access. Our cybersecurity response teams quickly engaged to remediate the compromised account and prevent further activity. Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk. The tactics DEV-0537 used in this intrusion reflect the tactics and techniques discussed in this blog. Our team was already investigating the compromised account based on threat intelligence when the actor publicly disclosed their intrusion. This public disclosure escalated our action allowing our team to intervene and interrupt the actor mid-operation, limiting broader impact.

Recommendations

Strengthen MFA implementation

Multifactor authentication (MFA) is one of the primary lines of defense against DEV-0537. While this group attempts to identify gaps in MFA, it remains a critical pillar in identity security for employees, vendors, and other personnel alike. See the following recommendations to implement MFA more securely:

Do:

  • Require Multifactor Authenticator for all users coming from all locations including perceived trusted environments, and all internet-facing infrastructure–even those coming from on-premises systems.
  • Leverage more secure implementations such as FIDO Tokens, or the Microsoft Authenticator with number matching. Avoid telephony-based MFA methods to avoid risks associated with SIM-jacking.
  • Use Azure AD Password Protection to ensure that users aren’t using easily-guessed passwords. Our blog about password spray attacks outlines additional recommendations.
  • Leverage passwordless authentication methods such as Windows Hello for Business, Microsoft Authenticator, or FIDO tokens to reduce risks and user experience issues associated with passwords.

Do NOT:

  • Use weak MFA factors such as text messages (susceptible to SIM swapping), simple voice approvals, simple push (instead, use number matching), or secondary email addresses.
  • Include location-based exclusions. MFA exclusions allow an actor with only one factor for a set of identities to bypass the MFA requirements if they can fully compromise a single identity.
  • Allow credential or MFA factor sharing between users.

Require healthy and trusted endpoints

  • Require trusted, compliant, and healthy devices for access to resources to prevent data theft.
  • Turn on cloud-delivered protection in Microsoft Defender Antivirus to cover rapidly evolving attacker tools and techniques, block new and unknown malware variants, and enhance attack surface reduction rules and tamper protection.

Leverage modern authentication options for VPNs

VPN authentication should leverage modern authentication options such as OAuth or SAML connected to Azure AD to enable risk-based sign-in detection. Modern authentication enables blocking authentication attempts based on sign-in risk, requiring compliant devices for sign in, and tighter integration with your authentication stack to provide more accurate risk detections. Implementation of modern authentication and tight conditional access policies on VPN has been shown to be effective against DEV-0537’s access tactics.

Strengthen and monitor your cloud security posture

DEV-0537 leverages legitimate credentials to perform malicious actions against customers. Since these credentials are legitimate, some activity performed might seem consistent with standard user behavior. Use the following recommendations to improve your cloud security posture:

Screenshot of Microsoft Azure AD Identity Protection
Figure 2. Using Azure AD Identity Protection to review risk detections

Improve awareness of social engineering attacks

Microsoft recommends raising and improving awareness of social engineering tactics to protect your organization. Educate members of your technical team to watch out for and report any unusual contacts with colleagues. IT help desks should be hypervigilant about suspicious users and ensure that they are tracked and reported immediately. We recommend reviewing help desk policies for password resets for highly privileged users and executives to take social engineering into consideration.

Embed a culture of security awareness in your organization by educating employees about help desk verification practices. Encourage them to report suspicious or unusual contacts from the help desk. Education is the number one defense against social engineering attacks such as this one and it is important to make sure that all employees are aware of the risks and known tactics.

Establish operational security processes in response to DEV-0537 intrusions

DEV-0537 is known to monitor and intrude in incident response communications. As such, these communication channels should be closely monitored for unauthorized attendees and verification of attendees should be performed visually or audibly.

We advise organizations to follow very tight operational security practices when responding to an intrusion believed to be DEV-0537. Organizations should develop an out-of-band communication plan for incident responders that is usable for multiple days while an investigation occurs. Documentation of this response plan should be closely held and not easily accessible.

Microsoft continues to track DEV-0537’s activities, tactics, malware, and tools. We will communicate any additional insights and recommendations as we investigate their actions against our customers.

Posted on Leave a comment

Powering the next generation of trustworthy AI in a confidential cloud using NVIDIA GPUs

Animation showing the process of how encrypted data is transferred between the GPU drive and the GPU through a secure channel. The GPU driver on the host CPU and the SEC2 microcontroller on the NVIDIA A100 Tensor Core GPU work together to achieve end-to-end encryption of data transfers

Cloud computing is powering a new age of data and AI by democratizing access to scalable compute, storage, and networking infrastructure and services. Thanks to the cloud, organizations can now collect data at an unprecedented scale and use it to train complex models and generate insights.  

While this increasing demand for data has unlocked new possibilities, it also raises concerns about privacy and security, especially in regulated industries such as government, finance, and healthcare. One area where data privacy is crucial is patient records, which are used to train models to aid clinicians in diagnosis. Another example is in banking, where models that evaluate borrower creditworthiness are built from increasingly rich datasets, such as bank statements, tax returns, and even social media profiles. This data contains very personal information, and to ensure that it’s kept private, governments and regulatory bodies are implementing strong privacy laws and regulations to govern the use and sharing of data for AI, such as the General Data Protection Regulation (GDPR) and the proposed EU AI Act. You can learn more about some of the industries where it’s imperative to protect sensitive data in this Microsoft Azure Blog post.

Commitment to a confidential cloud

Microsoft recognizes that trustworthy AI requires a trustworthy cloud—one in which security, privacy, and transparency are built into its core. A key component of this vision is confidential computing—a set of hardware and software capabilities that give data owners technical and verifiable control over how their data is shared and used. Confidential computing relies on a new hardware abstraction called trusted execution environments (TEEs). In TEEs, data remains encrypted not just at rest or during transit, but also during use. TEEs also support remote attestation, which enables data owners to remotely verify the configuration of the hardware and firmware supporting a TEE and grant specific algorithms access to their data.  

At Microsoft, we are committed to providing a confidential cloud, where confidential computing is the default for all cloud services. Today, Azure offers a rich confidential computing platform comprising different kinds of confidential computing hardware (Intel SGX, AMD SEV-SNP), core confidential computing services like Azure Attestation and Azure Key Vault managed HSM, and application-level services such as Azure SQL Always Encrypted, Azure confidential ledger, and confidential containers on Azure. However, these offerings are limited to using CPUs. This poses a challenge for AI workloads, which rely heavily on AI accelerators like GPUs to provide the performance needed to process large amounts of data and train complex models.  

The Confidential Computing group at Microsoft Research identified this problem and defined a vision for confidential AI powered by confidential GPUs, proposed in two papers, “Oblivious Multi-Party Machine Learning on Trusted Processors” and “Graviton: Trusted Execution Environments on GPUs.” In this post, we share this vision. We also take a deep dive into the NVIDIA GPU technology that’s helping us realize this vision, and we discuss the collaboration among NVIDIA, Microsoft Research, and Azure that enabled NVIDIA GPUs to become a part of the Azure confidential computing ecosystem.

Vision for confidential GPUs

Today, CPUs from companies like Intel and AMD allow the creation of TEEs, which can isolate a process or an entire guest virtual machine (VM), effectively eliminating the host operating system and the hypervisor from the trust boundary. Our vision is to extend this trust boundary to GPUs, allowing code running in the CPU TEE to securely offload computation and data to GPUs.  

Diagram showing the trust boundary extended from the host trusted execution environment of the CPU to the trusted execution environment of the GPU through a secure channel.
Figure 1: Vision for confidential computing with NVIDIA GPUs.

Unfortunately, extending the trust boundary is not straightforward. On the one hand, we must protect against a variety of attacks, such as man-in-the-middle attacks where the attacker can observe or tamper with traffic on the PCIe bus or on a NVIDIA NVLink connecting multiple GPUs, as well as impersonation attacks, where the host assigns an incorrectly configured GPU, a GPU running older versions or malicious firmware, or one without confidential computing support for the guest VM. At the same time, we must ensure that the Azure host operating system has enough control over the GPU to perform administrative tasks. Furthermore, the added protection must not introduce large performance overheads, increase thermal design power, or require significant changes to the GPU microarchitecture.  

Our research shows that this vision can be realized by extending the GPU with the following capabilities:

  • A new mode where all sensitive state on the GPU, including GPU memory, is isolated from the host
  • A hardware root-of-trust on the GPU chip that can generate verifiable attestations capturing all security sensitive state of the GPU, including all firmware and microcode 
  • Extensions to the GPU driver to verify GPU attestations, set up a secure communication channel with the GPU, and transparently encrypt all communications between the CPU and GPU 
  • Hardware support to transparently encrypt all GPU-GPU communications over NVLink  
  • Support in the guest operating system and hypervisor to securely attach GPUs to a CPU TEE, even if the contents of the CPU TEE are encrypted

Confidential computing with NVIDIA A100 Tensor Core GPUs

NVIDIA and Azure have taken a significant step toward realizing this vision with a new feature called Ampere Protected Memory (APM) in the NVIDIA A100 Tensor Core GPUs. In this section, we describe how APM supports confidential computing within the A100 GPU to achieve end-to-end data confidentiality.  

APM introduces a new confidential mode of execution in the A100 GPU. When the GPU is initialized in this mode, the GPU designates a region in high-bandwidth memory (HBM) as protected and helps prevent leaks through memory-mapped I/O (MMIO) access into this region from the host and peer GPUs. Only authenticated and encrypted traffic is permitted to and from the region.  

In confidential mode, the GPU can be paired with any external entity, such as a TEE on the host CPU. To enable this pairing, the GPU includes a hardware root-of-trust (HRoT). NVIDIA provisions the HRoT with a unique identity and a corresponding certificate created during manufacturing. The HRoT also implements authenticated and measured boot by measuring the firmware of the GPU as well as that of other microcontrollers on the GPU, including a security microcontroller called SEC2. SEC2, in turn, can generate attestation reports that include these measurements and that are signed by a fresh attestation key, which is endorsed by the unique device key. These reports can be used by any external entity to verify that the GPU is in confidential mode and running last known good firmware.  

When the NVIDIA GPU driver in the CPU TEE loads, it checks whether the GPU is in confidential mode. If so, the driver requests an attestation report and checks that the GPU is a genuine NVIDIA GPU running known good firmware. Once confirmed, the driver establishes a secure channel with the SEC2 microcontroller on the GPU using the Security Protocol and Data Model (SPDM)-backed Diffie-Hellman-based key exchange protocol to establish a fresh session key. When that exchange completes, both the GPU driver and SEC2 hold the same symmetric session key.  

The GPU driver uses the shared session key to encrypt all subsequent data transfers to and from the GPU. Because pages allocated to the CPU TEE are encrypted in memory and not readable by the GPU DMA engines, the GPU driver allocates pages outside the CPU TEE and writes encrypted data to those pages. On the GPU side, the SEC2 microcontroller is responsible for decrypting the encrypted data transferred from the CPU and copying it to the protected region. Once the data is in high bandwidth memory (HBM) in cleartext, the GPU kernels can freely use it for computation.

Diagram showing how the GPU driver on the host CPU and the SEC2 microcontroller on the NVIDIA Ampere GPU work together to achieve end-to-end encryption of data transfers.
Figure 2: The GPU driver on the host CPU and the SEC2 microcontroller on the NVIDIA A100 Tensor Core GPU work together to achieve end-to-end encryption of data transfers.

Accelerating innovation with confidential AI

The implementation of APM is an important milestone toward achieving broader adoption of confidential AI in the cloud and beyond. APM is the foundational building block of Azure Confidential GPU VMs, now in private preview. These VMs, designed in collaboration with NVIDIA, Azure, and Microsoft Research, feature up to four A100 GPUs with 80 GB of HBM and APM technology and enable users to host AI workloads on Azure with a new level of security.  

But this is just the beginning. We look forward to taking our collaboration with NVIDIA to the next level with NVIDIA’s Hopper architecture, which will enable customers to protect both the confidentiality and integrity of data and AI models in use. We believe that confidential GPUs can enable a confidential AI platform where multiple organizations can collaborate to train and deploy AI models by pooling together sensitive datasets while remaining in full control of their data and models. Such a platform can unlock the value of large amounts of data while preserving data privacy, giving organizations the opportunity to drive innovation.  

A real-world example involves Bosch Research, the research and advanced engineering division of Bosch, which is developing an AI pipeline to train models for autonomous driving. Much of the data it uses includes personal identifiable information (PII), such as license plate numbers and people’s faces. At the same time, it must comply with GDPR, which requires a legal basis for processing PII, namely, consent from data subjects or legitimate interest. The former is challenging because it is practically impossible to get consent from pedestrians and drivers recorded by test cars. Relying on legitimate interest is challenging too because, among other things, it requires showing that there is a no less privacy-intrusive way of achieving the same result. This is where confidential AI shines: Using confidential computing can help reduce risks for data subjects and data controllers by limiting exposure of data (for example, to specific algorithms), while enabling organizations to train more accurate models.   

At Microsoft Research, we are committed to working with the confidential computing ecosystem, including collaborators like NVIDIA and Bosch Research, to further strengthen security, enable seamless training and deployment of confidential AI models, and help power the next generation of technology.

About confidential computing at Microsoft Research  

The Confidential Computing team at Microsoft Research Cambridge conducts pioneering research in system design that aims to guarantee strong security and privacy properties to cloud users. We tackle problems around secure hardware design, cryptographic and security protocols, side channel resilience, and memory safety. We are also interested in new technologies and applications that security and privacy can uncover, such as blockchains and multiparty machine learning. Please visit our careers page to learn about opportunities for both researchers and engineers. We’re hiring.

Related GTC Conference sessions

Posted on Leave a comment

New Z-code Mixture of Experts models improve quality, efficiency in Translator and Azure AI

Microsoft is making upgrades to Translator and other Azure AI services powered by a new family of artificial intelligence models its researchers have developed called Z-code, which offer the kind of performance and quality benefits that other large-scale language models have but can be run much more efficiently.

“Our goal is to help everyone and every organization on the planet to communicate better, and to achieve that goal there are really two important dimensions — we want the quality of translations to be as good as possible and we want to support as many languages as possible,” said Xuedong Huang, Microsoft technical fellow and Azure AI chief technology officer.

Z-code takes advantage of shared linguistic elements across multiple languages via transfer learning —which applies knowledge from one task to another related task — to improve quality for machine translation and other language understanding tasks. It also helps extend those capabilities beyond the most common languages across the globe to underrepresented languages that have less available training data.

“With Z-code we are really making amazing progress because we are leveraging both transfer learning and multitask learning from monolingual and multilingual data to create a state-of-the-art language model that we believe has the best combination of quality, performance and efficiency that we can provide to our customers,” Huang said.

These models use a sparse “Mixture of Experts” approach that is more efficient to run because it only needs to engage a portion of the model to complete a task, as opposed to other architectures that have to activate an entire AI model to run every request. This architecture allows massive scale in the number of model parameters while keeping the amount of compute constant.

To put these models in production, Microsoft is using NVIDIA GPUs and Triton Inference Server to deploy and scale them efficiently for high-performance inference.

Microsoft has recently deployed Z-code models to improve common language understanding tasks such as name entity recognition, text summarization, custom text classification and key phrase extraction across its Azure AI services. But this is the first time a company has publicly demonstrated that it can use this new class of Mixture of Experts models to power machine translation products.

The new Z-code-based translation model is now available, by invitation initially, to customers using document translation in Translator, a Microsoft Azure Cognitive Service which is a part of Azure AI.

Microsoft’s Z-code models consistently improved translation quality over current production models, according to common industry metrics. In contrast with typical multilingual transfer learning approaches, which typically show AI quality gains in languages that have fewer direct translation examples available for training, the Z-code Mixture of Experts models show consistent gains even in the largest languages.

A chart shows percentage improvements in translation quality across 37 different language pairs from Translator’s old AI models to a new class of models called Z-code.
New Z-code Mixture of Experts AI models are powering improvements and efficiencies in Translator and other Azure AI services.

Human evaluators in a blind test commissioned by Microsoft found that the Z-code Mixture of Experts models improved translations across languages, with an average gain of 4%. For instance, the models improved English to French translations by 3.2 %, English to Turkish by 5.8 %, Japanese to English by 7.6%, English to Arabic by 9.3% and English to Slovenian by 15%.

Creating more powerful and integrative AI systems

Z-code is part of Microsoft’s larger XYZ-code initiative that seeks to combine models for text, vision, audio and multiple languages to create more powerful and integrative AI systems that can speak, hear, see and understand people better.

Over the past five years, Microsoft has developed models that have matched human performance in conversational speech recognition, machine translation, image captioning, SuperGLUE natural language understanding and commonsense question answering. These breakthroughs provide the foundation to realize more ambitious AI systems that can achieve multisensory and multilingual learning that is closer to how people learn and understand, Huang said.

“Those are the pieces, the building blocks that we are using to build a truly differentiated intelligence…and to form production systems that are cost efficient,” Huang said.

Z-code models were developed as part of Microsoft’s AI at Scale and Turing initiatives, which seek to develop large models that are pretrained on vast amounts of textual data to understand nuances of language — which can be integrated in multiple Microsoft products and also made available to customers for their own uses.

The same underlying model can be fine-tuned to perform different language understanding tasks such as translating between languages, summarizing a speech, offering ways to complete a sentence or generating suggested tweets, instead of having to develop separate models for each of those narrow purposes.

Posted on Leave a comment

Xbox and Paramount Pictures team up for ‘Sonic the Hedgehog 2’ custom controllers

To catch these controllers, you better be faster than Sonic and more powerful than Knuckles! Xbox and Paramount Pictures have teamed up to celebrate the upcoming film “Sonic the Hedgehog 2” to release a limited time only, custom Xbox Series S console and Xbox Wireless Controllers through two enter–to-win sweepstakes, (see rules) inspired by Sonic, voiced by Ben Schwartz, and Knuckles, voiced by Idris Elba.

The customized black Xbox Series S console features a golden portal ring shining on its surface alongside an embossed Sonic the Hedgehog 2 logo. With textured coatings reminiscent of the “bristly” texture of hedgehogs in the wild, the new Xbox Wireless Controllers come in Sonic Blue and Knuckles Red.

Together over the past 20 years, Xbox and Sonic have been a storied part of how gaming has evolved into the most popular form of entertainment – a beloved and nostalgic character across generations and among families. Sonic fans can explore some of the iconic zones of the franchise, like the Green Hills Zone, with the Sonic the Hedgehog Minecraft DLC available for download in the Minecraft Marketplace. With 24 themed Minecraft skins to try out, achievements to unlock, and characters to meet, players can collect rings and speed toward a high score as their favorite hedgehog. On April 5, be sure to check out the Minecraft Marketplace for an exciting update to the DLC, with six new skins and a new challenge in the Labyrinth Zone, to celebrate the release of “Sonic the Hedgehog 2.” For even more Sonic games, including your favorite classics, check out the Microsoft Store on Xbox.

“Sonic the Hedgehog 2” Custom Xbox Controllers

Fans can enter two sweepstakes for a chance to win the exclusive custom Xbox Series S and both the Sonic Blue and Knuckles Red Xbox Wireless Controllers by either (1) retweeting the official Xbox sweepstakes tweet and including the hashtag #XboxSonic2Sweepstakes, or (2) for fans in the US, by redeeming Microsoft Rewards points. Visit the official terms and conditions for more information on both the Twitter and Microsoft Rewards sweepstakes.

Don’t forget to check out “Sonic the Hedgehog 2” in theatres in the United States on April 8, 2022. For more information and to watch the trailer, visit sonicthehedgehogmovie.com.

Posted on Leave a comment

Introducing the Designed for Xbox Spring Collection 2022

At Xbox, we are always looking for new ways to surprise and delight our gamers. From new product categories to finding new ways to play your favorite games, we strive to offer our gamers choice.

The Designed for Xbox team has been collaborating closely with our partners at PowerA, OtterBox, and 8BitDo to create a unique selection of pastel products that embody the playfulness and whimsy that Springtime brings. Sit back, relax, and jump into your favorite game with these soft, soothing pastel accessories with next-gen gaming features perfect for gaming on Xbox or PC.

PowerA Enhanced Wired Controllers for Xbox Series X|S

PowerA Enhanced Wired Controllers for Xbox Series X|S

Reach new heights with the PowerA Enhanced Wired Controllers for Xbox Series X|S. These beautifully designed controllers bring a soft pastel touch to up your gaming setup. Brilliantly engineered, they feature two fully mappable Advanced Gaming Buttons on the back that allow you to program your essential in-game actions at any time, even in the middle of the game. The ergonomic design, intuitive-feel button layout and silky-smooth anti-friction rings around each thumbstick let you game in comfort during those long gaming sessions. You’ll feel your favorite games come to life with the hyper-realistic dual rumble motors in each grip. Whether it’s a pounding, pulsating vibrations or a subtle quiver, you’ll feel as if you’ve stepped into an entirely new world every time you play. Plug your favorite wired headset into the 3.5mm stereo headset jack and enjoy an easily accessible volume dial with one-touch mic mute to control the audio of your wired headset without the need to take your hands off the controller. No next-gen controller is complete without the intuitive Xbox Share Button to capture and share your most epic screenshots and clips. A high-quality, detachable 10-foot cable gives you the freedom to play from your favorite spot in the room, then wrap it up with an attached hook-and-loop strap until the next time you play.

The PowerA Enhanced Wired Controllers for Xbox Series X|S are compatible with Xbox One, Xbox Series X|S and Windows PCs and are available in five new playful pastel colors:

  • Lavender Swirl – mesmerizing, swirly, psychedelic goodness.
  • Cotton Candy Blue – sugary sensation inspired by the sweetest of childhood treats.
  • Pink Lemonade – icy cold and refreshing design to brighten up any gaming session.
  • Purple Camo – pastel purple meets rough-and-tumble camo.
  • Pastel Dream – soothing fades that turn even the most stressful session into a smooth symphony of gaming prowess.

The PowerA Enhanced Wired Controllers for Xbox Series X|S in their new pastel colors are available for pre-order today in the US and CA for $37.99 USD from Microsoft Store and other retailers.

Visit PowerA.com or your local retailers for additional information.

OtterBox Easy Grip Controller Shell for Xbox Series X|S Controllers

OtterBox Easy Grip Controller Shell for Xbox Series X|S Controllers

When you can play your favorite games anywhere and anytime, stay confident by keeping your Xbox Series X|S controller protected against drops and scrapes with the OtterBox Easy Grip Controller Shell. In a brand-new Lilac Dream color, featuring two sets of purple and pink swappable grips and a clear glitter shell, this is sure to add some sparkle to your favorite Xbox Series X|S controller. This first-of-its-kind, highly durable hard shell delivers the protection you’ve come to trust and count on from OtterBox while ensuring your controller feels and plays like a pro-level controller from Xbox. The soft grip pads are easily swapped in for a fresh look or added grip and keep your hands comfortable with sweat-wicking material that is easy to wash. The Easy Grip Controller Shell is the worry-free solution that makes your gaming comfortable and cool.

The OtterBox Easy Grip Controller Shell in Lilac Dream is available for purchase today for $39.99 USD from Microsoft Store in US/Canada and other select retailers worldwide.

Visit OtterBox.com or your local retailer for additional information.

8BitDo Ultimate Wired Controller for Xbox

8BitDo Ultimate Wired Controller for Xbox

The 8BitDo Ultimate Wired Controller for Xbox was designed in a playful pastel pink to add a bit of color to your gaming setup. This controller gives you more ways to play with two programmable, pro-level back buttons so you have easy access to your most valuable actions during gameplay. The 8BitDo Ultimate Software (available on Xbox Series X|S, Xbox One, Windows 10, Android and iOS) gives you the control to customize button mapping, adjust stick and trigger sensitivity, vibration and more. Create custom profiles to represent your unique styles of gameplay and switch on the fly with the custom profile button. Connect your favorite wired headset directly to the 3.5mm audio jack and mute your mic directly on the controller with the flip of a switch. The 8BitDo Ultimate Wired Controller is compatible with Xbox Series X|S, Xbox One and Windows PC.

The 8BitDo Ultimate Wired Controller for Xbox in Pastel Pink is available for pre-order today for $44.99 USD from Microsoft Store and other retailers in select markets worldwide.

Check 8BitDo.com or your local retailers for more information.

Choose your favorite accessory or gather the entire collection to create a one-of-a-kind gaming setup that is perfect for Spring. With the Designed for Xbox Spring Collection, gaming is more playful in pastel.

Posted on Leave a comment

A new Open Data for Social Impact Framework

Today, we’re publishing a resource to help nonprofits, multilateral organizations, governments and research institutions around the world put data to work to help address societal issues: the Open Data for Social Impact Framework. This new resource builds on the 10 lessons learned from Microsoft’s Open Data Campaign, and includes practical recommendations on how to apply these lessons to an organization’s data strategy.

At Microsoft, we believe data powers insights that help address critical societal problems. This is why we launched the Open Data Campaign in April 2020, partnering with organizations to better understand the opportunities and challenges they face in applying data strategies to advance their core social missions. Now, having supported 23 collaborations built around open and shared data, we’ve found that, while much of the talk around data focuses on the role it can play in the development of new business solutions, opening up data can also help answer some of the most challenging questions we face today. Questions ranging from, “How do we reduce carbon emissions?” to “How can we build a broader and more inclusive digital workforce?” to “How can we close the broadband gap?” – these can all benefit from collaboration and exploration through an increase in open and shared data.

The Open Data for Social Impact Framework is a tool organizational leaders can use to further understand how best to put data to work to solve important societal challenges. The collaborations we have supported helped us better appreciate both the benefits of data strategies and the challenges organizations face in building them. By compiling what we’ve learned from our Open Data journey and what others have shared along the way, we seek to help organizations think about the various questions and technological elements they will need to explore on their journey. We also share examples of organizations and projects that illustrate both best practices in building data strategies and the positive social impact that open data can help unlock. For instance, the World Health Organization is a case study in the importance of leadership in transforming an organization’s culture to be data-driven, and the Caring for Equality data collaboration in Buenos Aires, Argentina, shows how open data can lead to insights that help address inequality gaps with respect to care-related tasks that constrain women’s economic autonomy. These and other examples featured in the framework provide evidence of the benefits of using open data, but they also highlight a methodology that can be applied in other scenarios.

The framework highlights the challenges organizations can face when it comes to open data. It walks leaders through the following common steps and considerations:

  1. Leadership: Are you ready to put data to work to improve social outcomes?
  2. Opportunity: What are the questions you want to answer with data?
  3. Skills: Do you have the talent needed for data analysis?
  4. Community governance: Have you built trust in your community around the use of data?
  5. Technology and data: What solutions and resources do you need to measure, enable and enhance your impact?

The framework also includes a roadmap for organizations to follow to start using data to address their core social missions, and other important resources to help leaders embrace open data.

One of the key lessons we’ve learned is intrinsic to the framework – the ability to access and use data to improve outcomes involves much more than technological tools and the data itself. It includes having a leadership that is committed to using and publishing more open data, assembling the talent necessary to work with that data, and creating a good governance framework to ensure that data opportunities and data risks are managed.

Open data is important, but it can be challenging for some organizations to realize its benefits and we should all continue to look for ways to make it easier. We believe in the limitless opportunities that opening, sharing and collaborating on data can create to help drive solutions to some of the world’s most pressing challenges.

Tags: , ,

Posted on Leave a comment

Verizon enriches the mobile endpoint with Verizon Mobile for Microsoft Teams

What you need to know:

  • Verizon is one of the first operators to combine forces with Microsoft to enable wireless subscribers to use their mobile phone number to make and receive calls using Microsoft Teams.

  • With Verizon Mobile for Microsoft Teams, enterprise customers will experience the full power of Teams using the mobile device’s native dialer.

  • Verizon Mobile for Microsoft Teams complements Verizon VoIP for Operator Connect, a fixed line solution built on Verizon’s Global SIP network and powered by Microsoft’s Azure for Operators’ Managed Service for Teams Calling.

NEW YORK – Verizon Business today announced Verizon Mobile for Microsoft Teams, a new service that will integrate a customer’s Verizon Wireless business number with Microsoft Teams and bring enterprise-grade voice quality and policy management to Teams calls to and from mobile devices. Verizon Mobile for Microsoft Teams gives users the option of placing outbound calls through the Microsoft Teams desktop application, an integrated IP Phone, or directly through the native dialer on their mobile device.

“We continue to see global demand for unified calling platforms to keep distributed workforces connected,” said Sampath Sowmyanarayan, Chief Revenue Officer, Verizon Business. “Verizon Mobile for Microsoft Teams answers that customer demand and will make an immediate impact on the collaboration industry. Verizon is helping large enterprise customers adapt and succeed in today’s hybrid work environment by delivering a best-in-class suite of professional services spanning voice, security, and Network as a Service solutions to power the mobile workforce.”

By elevating a user’s mobile identity to become a unified calling and collaboration endpoint, Verizon Mobile for Microsoft Teams empowers customers to easily and quickly apply enterprise policies to mobile numbers, reducing the costs associated with managing mobile and desktop phones and offering a path to consolidating all activity on mobile handsets where appropriate. 

Key advantages:

Mobile Manageability: Provides users with a single mobile phone number for business, which can be easily managed by IT administration with enterprise-grade calling policies in Teams

Unified Call Control: Converge voicemail, call history, and presence information across endpoints, and direct call queues to mobile numbers

Network Flexibility: Seamlessly move calls between networks and endpoints, including uplifting calls from the cellular voice network to VoIP data calls with video and screensharing

Verizon Mobile for Microsoft Teams complements the existing Verizon VoIP for Operator Connect solution for fixed line voice services. The popularity of Teams, combined with the scale and reliability of Verizon’s global network, will provide enterprise customers with a secure, managed multi-device solution that blends connectivity, calling, and administration under one easy-to-use customer interface and calling plan.

“This collaboration with Verizon allows us to combine the power of cloud, cellular and edge to deliver tightly integrated mobile calling and business collaboration workflows that are reliable, secure, device & network agnostic all while being cost-efficient and simple for the customers to manage a single calling offering,” said Martin Lund, CVP of Azure for Operators. “The solution leverages the power of Azure to accelerate the migration of critical workflows to the cloud and benefits from Microsoft’s expertise in providing managed services that enable operators to quickly certify with the Teams Operator Connect program.”

As a certified gold Microsoft partner with more than 15 years of experience delivering VoIP services and 7,000+ business customers with 18M telephone numbers active on Verizon’s VoIP platform, Verizon is uniquely positioned to support organizations of all sizes as they seek to unlock the full potential of Microsoft Teams. 

Verizon VoIP for Operator Connect is available today while Verizon Mobile for Microsoft Teams will be available later in 2022. For more information, visit Microsoft Teams for Collaboration and Communication.