Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft adds data protection to Indline to Edge to block data leaks Genai
Global Security

Microsoft adds data protection to Indline to Edge to block data leaks Genai

AdminBy AdminMarch 24, 2025No Comments3 Mins Read
Inline Data Protection
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 24, 2025Red LakshmananSecurity Enterprise / browser

Data Protected

Microsoft on Monday announced A new feature called Inline Data Protection for its enterprise, focused on Business Web Browser.

Native data control data control is designed to prevent sensitive employees related to companies, in the consumer application of generative artificial intelligence (Genai), such as Openai Chatgpt, Google Gemini and Deepseek. The list will be expanded over time to include other Genai, email, cooperation and social media applications.

“With the new Edge Building Option for Edge, you can prevent data leakage in different ways that users interact with sensitive data in the browser, including a text set directly into the AI ​​-Generative Web,” said the technology giant.

Cybersecurity

Prevention Loss Microsoft PURView (Dlp) Control comes when the company has announced the overall availability of cooperation security for Microsoft teams, trying to fight phishing attacks on Enterprise Communication.

In recent months subjects threats such as Storm-1674 and Storm-1811 Microsoft’s teams as a pipeline to deceive unbumed users in the download of malicious software or providing them with remote access for subsequent ransom deployment.

The last set of features offers new controls that allow the organization’s security team to dictate which tenants, domains and

Microsoft

Users can communicate with their staff, best protection against malicious connections or real -time investments, and improve ways to report suspicious messages to administrators.

“Suspicious files and URL -url are automatically executed in a safe, isolated setting – a sandbox – to determine whether they find any harmful behavior,” Microsoft said. “This process, known as real -time detonation, ensures that harmful content will be detected and neutralized before the end users can access it.”

Match these ads, Redmond said it is expanding Protective copille With 11 new agents, five of which come from external partners to analyze data violations, prioritize critical announcements, conduct an analysis of the root cause and improve the fulfillment of requirements.

Microsoft-designed agents that will be available for preview next month will make it difficult to phinging, prevention of data loss and notifications about insiders, vulnerabilities monitors and recovery, as well as elaboration threatening through the effects of the organization.

Cybersecurity

“The tireless pace and complexity of the cyber -cathedral has exceeded human capabilities, and the creation of agents II is the need for modern security,” said Vas Jakal, Vice President of Microsoft Security.

“The volume of these attacks is overwhelmed by security groups, relying on manual processes and fragmented protection, which makes it difficult to do as three-haired malicious messages, and uses the data on the broad control of cyber-risa.”

“A security agent in the field of security today can handle conventional alerts and attacks by phishing, releasing human defenders to focus on more complex threats and security measures.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.