{"id":22081,"date":"2023-05-23T16:00:54","date_gmt":"2023-05-24T00:00:54","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/05\/23\/news-15811\/"},"modified":"2023-05-23T16:00:54","modified_gmt":"2023-05-24T00:00:54","slug":"news-15811","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/05\/23\/news-15811\/","title":{"rendered":"Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security"},"content":{"rendered":"<p><strong>Credit to Author: Joy Chik| Date: Tue, 23 May 2023 15:00:00 +0000<\/strong><\/p>\n<p>At Microsoft Build 2023\u2014an event for developers by developers\u2014we\u2019re going to announce exciting new features and technologies, share ideas, and help everyone boost their skills so we can all build a more secure future together. This year\u2019s Microsoft Build offers a full program, both online and in-person, to suit every attendee, whether you\u2019re a professional developer, data pro, or a brand-new coder. Not only is Microsoft Build a great opportunity to gain new knowledge and skills, but it\u2019s also <em>the<\/em> place to meet and learn from other developers. If you haven\u2019t registered yet, I invite you to visit the <a href=\"https:\/\/build.microsoft.com\/en-US\/home\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Build event page<\/a>.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters bg-gray-800 text-white\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Build 2023<\/h2>\n<div class=\"mb-3\">\n<p>Browse virtual and in-person security sessions at Microsoft Build. <\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/build.microsoft.com\/en-US\/home\" class=\"btn btn-link text-decoration-none p-0 text-light-blue\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Register now<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img width=\"600\" height=\"600\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Blog-Insights_Build-02-1.png\" class=\"card-img img-object-cover\" alt=\"logo\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Blog-Insights_Build-02-1.webp 600w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Blog-Insights_Build-02-1-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Blog-Insights_Build-02-1-150x150.webp 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>Below is a quick tour of a few security-related sessions and the new features and technologies they highlight.<\/p>\n<h2 class=\"wp-block-heading\">New identity and access features in Microsoft Entra<\/h2>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1-1024x544.webp\" alt=\"Graphic showing how Microsoft Entra External ID helps personalize and secure access to any application for customers and partners with a complete customer identity and access management solution. \" class=\"wp-image-130212 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1-1024x544.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1-300x159.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1-768x408.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1.webp 1443w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/05\/Picture1-1-1024x544.webp\"><\/figure>\n<h3 class=\"wp-block-heading\">Welcome to modern identity and access management with Microsoft Entra<\/h3>\n<p>Developers are in the business of building app features and capabilities. Most developers are not\u2014and don\u2019t want to be\u2014identity security experts.<\/p>\n<p>At Microsoft Build, we\u2019re announcing the next generation customer identity access management platform: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-external-id\">Microsoft Entra External ID<\/a>, now in preview. Microsoft Entra External ID was purpose-built to personalize and secure access to applications while protecting any external identity and effectively controlling which resources they can access. It delivers a flexible, unified identity platform, personalized customer experiences, adaptive access policies, and built-in identity governance. In the session \u201c<a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/2d3f258e-5c47-441b-9c3c-e18b993cab00\" target=\"_blank\" rel=\"noreferrer noopener\">Explore CIAM capabilities with External Identities in Microsoft Entra<\/a>,\u201d <a href=\"https:\/\/www.linkedin.com\/in\/yoel-horvitz-b1b01566\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yoel Horvitz<\/a>, Senior Program Manager, Microsoft Azure Active Directory (Azure AD), and <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/71e62128-7019-45b1-befb-4d7801591a71?source=\/speakers\" target=\"_blank\" rel=\"noreferrer noopener\">Namita Singh<\/a>, Senior Software Engineer at Cloud Data Center Cybersecurity, Microsoft, will explore how easily you can create branded sign-up and sign-in app experiences. No more trade-offs between great security and great customer experiences. You\u2019ll see how quickly you can add a strong sign-up or sign-in experience plus comprehensive onboarding flows that capture and validate customer information.<\/p>\n<p>Partner identity scenarios (B2B Collaboration) remain in the same location on the Microsoft Entra admin portal within the Workforce tenant. Please note that there is no action for our current Azure AD business-to-consumer (B2C) customers required at this time as the next generation platform is currently in early preview only. We remain fully committed to support the current Azure AD B2C solution, and there are no requirements for B2C customers to migrate at this time and no plans to discontinue the current B2C service.<\/p>\n<p>This next-generation expanded solution for customer and partner identities marks the next chapter in our customer identity solution, addressing critical customer feedback and building on top of our existing capabilities.<\/p>\n<p>External ID now combines familiar B2B collaboration functionality in Microsoft Entra (generally available) with evolved and unified customer identity (CIAM) capabilities, targeting customer-facing applications, now in preview. Help us shape the future of this new platform with your participation in <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-external-id\">our preview<\/a>.<\/p>\n<h3 class=\"wp-block-heading\">Microsoft Entra Verified ID digital wallet SDK<\/h3>\n<div class=\"wp-block-msxcm-kicker-container align-left\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-left\" data-bi-an=\"Kicker Left\">\n<p class=\"wp-block-msxcm-kicker__title text-gray-600 text-uppercase\"> \t\t\tMicrosoft Entra Verified ID\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-verified-id\" \t\t\t> \t\t\t<span>Learn more<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>Microsoft Entra Verified ID is an open standards-based verifiable credentials service that customers can use to automate the identity validation process while enabling privacy-protected interactions between organizations and users. You can integrate the upcoming release of the Verified ID Wallet Library into your mobile apps to store and share digital Verified ID cards. This allows you to issue verifiable credentials for dozens of use cases, such as reducing the risk for fraud and account takeovers, streamlining app sign-ins, creating self-service account recovery and helpdesk flows, and enabling rich partner rewards ecosystems. Be sure to check out the \u201c<a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/4ca41843-1b3f-4ee6-955e-9e2326733be8\" target=\"_blank\" rel=\"noreferrer noopener\">Reduce fraud and improve engagement using Digital Wallets\u201d session<\/a> by <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/2ddec6c1-2ce5-4311-8b09-b3edc498b12f?source=\/sessions\/4ca41843-1b3f-4ee6-955e-9e2326733be8\" target=\"_blank\" rel=\"noreferrer noopener\">Christer Ljung<\/a>, Principal Program Manager, Microsoft, and <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/33412e54-e1cc-4f1e-a144-01aa019477df?source=\/sessions\/4ca41843-1b3f-4ee6-955e-9e2326733be8\" target=\"_blank\" rel=\"noreferrer noopener\">Sydney Morton<\/a>, Software Engineer, Microsoft, to learn more about Verified ID\u2019s open source digital wallet SDK.<\/p>\n<h2 class=\"wp-block-heading\">New capabilities for compliance and data automation in Microsoft Purview<\/h2>\n<h3 class=\"wp-block-heading\">General availability of machine learning-enabled source code classifier<\/h3>\n<div class=\"wp-block-msxcm-kicker-container align-left\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-left\" data-bi-an=\"Kicker Left\">\n<p class=\"wp-block-msxcm-kicker__title text-gray-600 text-uppercase\"> \t\t\tMicrosoft purview information protection\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/information-protection\/microsoft-purview-information-protection\" \t\t\t> \t\t\t<span>Learn more<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/compliance\/information-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview Information Protection<\/a> helps organizations automate data classification, labeling, and protection across multiple platforms. More than 35 pre-trained classifiers help quickly identify and protect some of the most sensitive data, such as intellectual property and trade secrets, material non-public information, sensitive health and medical files, business sensitive financial information, and personally identifiable information for General Data Protection Regulation (GDPR) compliance. Plus, an improved ready-to-use source code classifier that supports more than 70 file extensions and 23 programming languages can detect embedded and partial source code.&nbsp;&nbsp;<\/p>\n<h3 class=\"wp-block-heading\">New APIs available to help automate compliance workflows<\/h3>\n<div class=\"wp-block-msxcm-kicker-container align-right\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title text-gray-600 text-uppercase\"> \t\t\tMicrosoft Purview ediscovery\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/risk-management\/microsoft-purview-ediscovery\" \t\t\t> \t\t\t<span>Learn more<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>You can take advantage of new Microsoft Graph APIs built specifically for <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/risk-management\/microsoft-purview-ediscovery\">Microsoft Purview eDiscovery<\/a> and compliance scenarios to help organizations automate their litigation and investigation workflows. Join us for \u201c<a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/ca5e34d9-62cd-4ead-9e9a-23929131b517\" target=\"_blank\" rel=\"noreferrer noopener\">Streamline eDiscovery with new innovations, including Microsoft Graph APIs<\/a>,\u201d a sequel to Microsoft Senior Product Marketing Manager <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/43a7c82a-cd3e-412b-81fb-84e18b7d6fa3?source=\/sessions\/ca5e34d9-62cd-4ead-9e9a-23929131b517\" target=\"_blank\" rel=\"noreferrer noopener\">Caitlin Fitzgerald\u2019s<\/a> Microsoft Build 2022 session, which will share recent examples of using APIs to ensure repeatable and predictable management of time-sensitive compliance processes.<\/p>\n<h2 class=\"wp-block-heading\">Explore built-in security features in these Microsoft Build sessions<\/h2>\n<h3 class=\"wp-block-heading\">Unlocking the Power of Azure Security: Conversations with Experts, Q&amp;A<\/h3>\n<p>In this Q&amp;A session, <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/2e942ce9-e40e-4be0-bcb1-ee3186aa9836?source=\/speakers\" target=\"_blank\" rel=\"noreferrer noopener\">Richard Diver<\/a>, Technical Story Design Lead, Microsoft, will moderate a panel of experts who help <a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/6da00f4d-58a8-449e-9f00-cffb5c943bd2\" target=\"_blank\" rel=\"noreferrer noopener\">secure the software supply chain within Microsoft Azure<\/a> and other platforms. The session is based on a four-part blog series that includes <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azures-defense-in-depth-approach-to-cloud-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure&#8217;s defense-in-depth approach to cloud vulnerabilities<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-azure-security-expands-variant-hunting-capacity-at-a-cloud-tempo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Variant Hunting<\/a>. The panel will share Microsoft security best practices and how we\u2019re enhancing our response process, extending our internal security research, and continually improving how we secure multitenant services.<\/p>\n<h3 class=\"wp-block-heading\">Next-Level DevSecOps: Secure Supply Chain Consumption Framework, Q&amp;A<\/h3>\n<div class=\"wp-block-group is-content-justification-left is-nowrap is-layout-flex wp-container-4\">\n<div class=\"wp-block-columns is-layout-flex wp-container-3\">\n<div class=\"wp-block-column is-layout-flow\">\n<p>The Secure Software Supply Chain Framework (S2C2F) is designed from the ground up to protect developers from accidentally consuming malicious and compromised packages. In this Q&amp;A session, <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/123c9a90-5d5c-4182-bcfc-8468c1bdc18a?source=\/sessions\/158b88dd-68d5-4ac0-aa25-a89dfccb312e\" target=\"_blank\" rel=\"noreferrer noopener\">Mia Reyes<\/a>, Director, Foundational Security\u2014Cybersecurity, Microsoft, will moderate a panel of <a href=\"https:\/\/build.microsoft.com\/en-US\/sessions\/158b88dd-68d5-4ac0-aa25-a89dfccb312e\" target=\"_blank\" rel=\"noreferrer noopener\">leads from our Secure Software Supply Chain team<\/a>, including <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/8db344d4-01d0-4c94-8fd6-f9aa842a39b3?source=\/sessions\/158b88dd-68d5-4ac0-aa25-a89dfccb312e\" target=\"_blank\" rel=\"noreferrer noopener\">Adrian Diglio<\/a>, Principal Product Marketing Manager, Microsoft, and <a href=\"https:\/\/build.microsoft.com\/en-US\/speakers\/5d708982-3226-4f4a-a8de-bab1d795b6bd?source=\/sessions\/158b88dd-68d5-4ac0-aa25-a89dfccb312e\" target=\"_blank\" rel=\"noreferrer noopener\">Jasmine Wang<\/a>, Product Manager, Microsoft, as they share the Secure Supply Chain Consumption Framework S2C2F. Learn how to patch your vulnerable components faster to prevent consumption of malicious or compromised packages. Download the <a href=\"https:\/\/github.com\/ossf\/s2c2f\/blob\/main\/specification\/Secure_Supply_Chain_Consumption_Framework_(S2C2F).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Supply Chain Consumption Framework Simplified Requirements guide<\/a> to learn how you can improve your open source software (OSS) consumption practices.<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow\">\n<blockquote class=\"wp-block-quote blockquote\">\n<p><em>According to Sonatype\u2019s 2022 State of the Software Supply Chain report, supply chain attacks targeting OSS have increased by an average of 742 percent each year for the past three years.<sup>1<\/sup><\/em><\/p>\n<\/blockquote><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\">Microsoft Build 2023<\/h2>\n<p>Join us in Seattle for Microsoft Build from May 23 to 25, 2023. We\u2019ll stream online sessions May 23 and 24, 2023 during Pacific Time hours. <a href=\"https:\/\/register.build.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Register now<\/a> to reserve your spot and visit the <a href=\"https:\/\/build.microsoft.com\/en-US\/home\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Build 2023 website<\/a> to explore the session catalog and plan your experience. We look forward to connecting with you!<\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.sonatype.com\/state-of-the-software-supply-chain\/introduction\" target=\"_blank\" rel=\"noreferrer noopener\">8th Annual State of the Software Supply Chain Report<\/a>, Sonatype.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/23\/microsoft-build-2023-announcing-new-identity-compliance-and-security-features-from-microsoft-security\/\">Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/23\/microsoft-build-2023-announcing-new-identity-compliance-and-security-features-from-microsoft-security\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joy Chik| Date: Tue, 23 May 2023 15:00:00 +0000<\/strong><\/p>\n<p>Microsoft Build 2023 is the place to discover new features and technologies, share ideas, and boost your skills. Learn about the new identity and compliance features we&#8217;re announcing. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/23\/microsoft-build-2023-announcing-new-identity-compliance-and-security-features-from-microsoft-security\/\">Microsoft Build 2023: Announcing new identity, compliance, and security features from Microsoft Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-22081","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22081"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22081\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}