Sr. Content Developer at Microsoft, working remotely in PA, TechBash conference organizer, former Microsoft MVP, Husband, Dad and Geek.
147979 stories
·
33 followers

Gemini 3.1 Pro: A smarter model for your most complex tasks

1 Share
3.1 Pro is designed for tasks where a simple answer isn’t enough.
Read the whole story
alvinashcraft
just a second ago
reply
Pennsylvania, USA
Share this story
Delete

OpenAI reportedly finalizing $100B deal at more than $850B valuation

1 Share
OpenAI is reportedly getting close to closing a $100 billion deal, with backers including Amazon, Nvidia, SoftBank, and Microsoft. The deal would value the ChatGPT-maker at $850 billion.
Read the whole story
alvinashcraft
12 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

Copilot quietly pulls your data from other Microsoft products, including Edge and MSN, but you can opt out

1 Share

Microsoft has quietly confirmed that Copilot automatically pulls your data from other Microsoft products, such as Bing, MSN, and Edge. We don’t know whether Windows is included in “other” products, but it doesn’t appear to be, at least for now. Regardless, you can turn off “usage” sharing with Copilot, but it could make Copilot less useful.

In our tests, Windows Latest observed that there’s a new toggle called “Microsoft usage data” when you open copilot.microsoft.com in any browser and go to Settings. The toggle is buried inside the “Memory” tab, so it’s likely that your data from other Microsoft products powers the memory feature of Copilot.

Microsoft usage data with Copilot
Image Courtesy: WindowsLatest.com

When memory is turned on, Copilot is able to remember things about you, including your preferences. And given the fact that “Microsoft usage” data is part of the memory feature, it is possible Copilot can now pull your personal preferences or data from apps like Microsoft Edge, Bing, MSN, and other products.

“Let Copilot use data from Bing, MSN, Edge, and other Microsoft products you’ve used,” Microsoft warns.

I noticed that the toggle was turned on by default, and you need to turn it off if you want to block Copilot from pulling your personal information.

Microsoft insists that your product usage data is only used for personalizing Copilot, and it won’t train its AI models on your data.

You can always turn on or off the feature from Copilot > Settings > Memory. But you’ll also need to click “Delete all memory” to remove existing data from Copilot.

There are also other improvements coming to Copilot, including the ability to set reminders and alarms, and even connecting your health app.

Copilot is testing health apps integration, similar to ChatGPT

Copilot health records

Microsoft is testing a new feature called “Copilot Health Records,” which pulls data from your health apps or hardware, including your Apple Watch.

“Copilot will use context from your health records to improve answers,” Microsoft noted, and added that you can delete conversations or disconnect an app at any time.

This feature isn’t available to everyone yet, but it’s rolling out alongside the ability to set reminders. In our tests, Windows Latest observed that you can ask Copilot to remind you at a specific time or date, and it will send a notification on your mobile.

Copilot Reminders feature

You can also ask Copilot to set a recurring reminder or on specific days. Copilot reminder is a good idea, but it only works on mobile and is hit or miss.

The post Copilot quietly pulls your data from other Microsoft products, including Edge and MSN, but you can opt out appeared first on Windows Latest

Read the whole story
alvinashcraft
39 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

Practical AI skills for everyone

1 Share
Get Google certified in the practical AI skills employers value most. Includes 3 months of Google AI Pro.
Read the whole story
alvinashcraft
48 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

Google Releases Gemini 3.1 Pro

1 Share

Google announced the release of Gemini 3.1 Pro, a "step forward in core reasoning" for its most powerful AI model.

The post Google Releases Gemini 3.1 Pro appeared first on Thurrott.com.

Read the whole story
alvinashcraft
1 minute ago
reply
Pennsylvania, USA
Share this story
Delete

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

1 Share

Effective exposure management begins by illuminating and hardening risks across the entire attack surface. Some of the most meaningful shifts in security happen quietly—when teams take a clear look at their exposure landscape and acknowledge the gap between where they stand today and where they need to be. Today, we’re sharing a new guide designed to support that moment of clarity. It offers a practical, maturity-based path for moving from fragmented visibility and reactive fixes to a more unified, risk-driven approach that strengthens resilience one step at a time. Read “Establishing proactive defense—A maturity-based guide for adopting a dynamic, risk-based approach to exposure management” to learn more now. 

Five levels of exposure management maturity 

In the guide, you’ll learn how organizations progress through five levels of exposure management maturity to strengthen how they identify, prioritize, and act on risk. Early-stage teams operate reactively with limited visibility and compliance-driven fixes. As capabilities mature, processes become consistent, prioritization incorporates business context, and decisions shift from reactive to proactive. This progression reflects a move away from isolated security actions toward repeatable, measurable practices that scale with organizational complexity. At higher maturity, organizations validate controls, consolidate asset and risk data into a single source of truth, and confirm that mitigations work. Rather than assuming security improvements are effective, teams test and verify outcomes to ensure effort translates into real risk reduction. At the most advanced stage, exposure management is fully aligned to business objectives, supported by clear risk metrics, and used to guide remediation, resource allocation, and strategic outcomes.

The maturity model helps security leaders assess where their organization is at and identify practical next steps to mature and have a full-fledged exposure management program. Each level in the guide includes details on the realities organizations face, the key characteristics at each maturity level, common pain points, and suggestions for moving forward and up in maturity. Importantly, the model emphasizes that maturity is not static or final. The last stage of the maturity model, level five, isn’t a finish line—it’s the point where exposure management becomes a continuously evolving capability, fueled by real-time telemetry and adaptive risk modeling. At this stage, exposure management shifts from a program to a strategic discipline—one that informs long-term resilience decisions rather than discrete remediation cycles. 

The path to proactive defense  

Organizations build a unified path to proactive defense when they move beyond fragmented tools and adopt an integrated exposure management approach. By bringing assets, identities, cloud posture, and attack paths into one coherent view, security teams gain the clarity needed to focus effort where it matters most. This alignment enables more consistent action, stronger prioritization, and security decisions that reflect real business risk instead of isolated signals. It also helps teams move from chasing individual findings to managing exposure systematically, with shared context across security, IT, and risk stakeholders. Over time, this shift turns exposure management into a repeatable operating model rather than a collection of disconnected responses. 

Take the next step toward proactive defense 

Designed to help security leaders translate strategy into practical next steps, regardless of where they are starting, the maturity levels outlined in the e-book support organizations as they shift from reacting to cyberthreats to proactively reducing risk and strengthening security across every layer of the environment. To go deeper into the practices, maturity levels, and actions that matter most, read the new e-book: Establishing a proactive defense—A maturity-based guide for adopting a dynamic, risk-based approach to exposure management to learn more now. 

Join us at RSAC™ 2026

RSAC™ 2026 is more than a conference. It’s a chance to shape the future of security. By engaging with Microsoft Security, you’ll gain:  

  • Actionable insights from industry leaders and researchers.  
  • Hands-on experience with cutting-edge security tools.  
  • Connections that help you navigate the evolving cyberthreat landscape.  

Together, we can make the world safer for all. Join us in San Francisco March 22-26, 2026, and be part of the conversation that defines the next era of cybersecurity.  

Learn more

Learn more about Microsoft Security Exposure Management.

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity. 

The post New e-book: Establishing a proactive defense with Microsoft Security Exposure Management appeared first on Microsoft Security Blog.

Read the whole story
alvinashcraft
1 minute ago
reply
Pennsylvania, USA
Share this story
Delete
Next Page of Stories