Tuesday, 12 August 2025

The four stages of creating a trust fabric with identity and network security

This interesting article from Microsoft will help you understand the four stages of creating a digital trust "fabric" to strengthen security for your distributed enterprise. Zero trust is an approach to security that continuously monitors and authenticates users and applications to make sure they are, in fact, authorized to access the data or applications. Read this article to learn more about Microsoft security and zero trust solutions.

Read More...

Generate New Ideas with Microsoft Copilot in Chat

When you're tight on time and need help, fire up Microsoft Copilot in Chat. This quick video illustrates how it works and will show you how productive you can be in Chat, with help from Copilot.

Monday, 11 August 2025

Cybersecurity Woes and Regulatory Challenges: Allianz Life Data Breach and Meta's EU Ad Halt

Today's businesses are facing a dangerous convergence: the escalation of cybersecurity breaches and the growing complexity of data privacy regulations. This article outlines two major developments that illustrate the scale and severity of these risks. Read the article to understand what's at stake and how to prepare your organization for similar challenges. Reach out to Liquid Telecom to discuss your cybersecurity strategy.

Read More...

Tuesday, 5 August 2025

Develop AI applications safely & innovate with confidence using Microsoft Azure Responsible AI tools

With the right solution, your organization can scale AI with confidence and turn responsible AI into a competitive advantage. Watch this instructive video outlining how Microsoft Azure AI tools are built with six responsible AI principles designed to help you safely build the next generation of applications for responsible AI.

How implementing a trust fabric strengthens identity and network

Ensuring that only authorized end users and applications can access your enterprise data is fundamental to strong IT security. But traditional identity access management (IAM) security comes with multiple challenges, including the rise of AI deepfakes and other AI-enabled threats. In this article, Microsoft explains its zero-trust approach to security.

Read More...

Get caught up on meetings in a fraction of the time

Do you struggle with an unending flood of emails, texts and meetings? Keeping track of the discussions, decisions and action plans can be difficult. You can stay on top of it all with Copilot in Teams.

Monday, 4 August 2025

How agentic AI is reshaping networks and connectivity | Frontier Enterprise

As digital infrastructure grows more complex, traditional network management tools are struggling to keep up. This article reveals how agentic AI is being used to reshape network behavior and connectivity strategy. You will learn how enterprises are testing agentic models to automate traffic routing, security enforcement, and resource allocation. Read the article and connect with Liquid Telecom for guidance on next steps.

Read More...