it was only a matter of time before familiar Mandiant (now part of Google Cloud) Black and Red branding would be gone, 2 years after the acquisition by Google the "new" blog is here.(https://lnkd.in/gkZ6Xmcn) For those of you using Feedly or Inoreader there is a new RSS feed, here is the updated bookmark:(https://lnkd.in/gd_3ic-S)
Mark Thomasson’s Post
More Relevant Posts
-
Google Cloud strives to make good security outcomes easier for customers to achieve. As part of this continued effort, Google are releasing an updated and stronger set of security defaults that are automatically implemented for new customers. Read more https://t.ly/AoZYX #cloudace #cloudaceindonesia #Google #GoogleCloud #cloudacebiggerstronger
To view or add a comment, sign in
-
Today Google TAG & Mandiant (now part of Google Cloud) launched a joint review of 0 days exploited in-the-wild. The report shows that Google observed 97 0-day vulns exploited in-the-wild in 2023 & key findings related to vendor investments, CSVs, the enterprise and more: https://lnkd.in/exi2vt8n
To view or add a comment, sign in
-
Tracking trends in vulnerability exploitation is a task for anyone in a Defender and CTI role. Mandiant (part of Google Cloud) just released the report "How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends"—https://lnkd.in/gYjadsxH. It has lots of great insights.
To view or add a comment, sign in
-
Are you still managing patching and vulnerability as a compliance oriented? Based on SLAs definitions? Maybe you need to reconsider this. Threat actors are not a compliance assessment and certification company. They simple don’t care if you have a policy, SOP or not. In fact they prefer to attack compliant and compliance oriented companies due to the media impact and also cause they know that once your complaint, people tends to reduce their efforts as the “goal” is already achieved.
Tracking trends in vulnerability exploitation is a task for anyone in a Defender and CTI role. Mandiant (part of Google Cloud) just released the report "How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends"—https://lnkd.in/gYjadsxH. It has lots of great insights.
To view or add a comment, sign in
-
In case you want to to have a very cost efficient solution for limiting unwanted requests, allowing access to well known good bots, then this solution is for you. My solution will complement your existing IP reputation solution with publicly available sources. You will find sources which are regularly updated through various feeds. You may use this with Google Cloud Armor address list. Even if you are using some other provider, this post will still be useful for you. You may read my post in Google Cloud Community Blog. https://lnkd.in/g22K7Ggc
To view or add a comment, sign in
-
While Microsoft grapples with the fallout of yet another major outage, Google Cloud remains focused on delivering consistent, reliable services to our customers. Learn how Google Cloud's security-first approach provides superior protection and peace of mind. #GoogleCloud #MicrosoftOutage #CloudReliability #SecurityFirst #this_post_was_generated_with_ai_assistance #responsibleai https://lnkd.in/eUJRbbz8
To view or add a comment, sign in
-
Certified Azure, GCP and GenAI solutionist | Python & Java Developer | | System Administrator | on the hunt for new tech/dev blogs and events
Moral of the story - No amount of backups are enough if you're depending on a sole cloud provider, always have on-premise / Hybrid solution ready . Kind of similar to GitLab's 2017 outage Further reading - GitLab Blog https://lnkd.in/gfwrYhYF youtube video explaining the timeline https://lnkd.in/gVwu6x8a
Seeking System Administrator | 2 Azure Certified | Skilled in Docker, Kubernetes, Jenkins, Azure DevOps | Tech Content Creator
Google Cloud accidentally deleted a company's entire cloud environment (Unisuper, an investment company, which manages $80B). The company had backups in another region, but GCP deleted those too. Luckily, they had yet more backups on another provider. More https://lnkd.in/g_7ZVDQW #ibbus #google #deleted #accident
To view or add a comment, sign in
-
"In 2023, many enterprises bought models through their existing cloud service provider (CSP) for security reasons—leaders were more concerned about closed-source models mishandling their data than their CSPs—and to avoid lengthy procurement processes. This is still the case in 2024, which means that the correlation between CSP and preferred model is fairly high: Azure users generally preferred OpenAI, while Amazon users preferred Anthropic or Cohere. As we can see in the chart below, of the 72% of enterprises who use an API to access their model, over half used the model hosted by their CSP. (Note that over a quarter of respondents did self-host, likely in order to run open source models.)" https://lnkd.in/gAryJNmC
To view or add a comment, sign in
-
Hetzner Cloud Pro Tip: - Check IP reputation. Some ranges may be blocked, causing issues with external services. - For example: GCP blocked some IP ranges, making Sentry unreachable. Solution: Rotate IP and use Cloudflare as a reverse proxy to allow traffic only through CF.
To view or add a comment, sign in
-
We're just under an hour out from this - be sure to join Google Mandiant (now part of Google Cloud) and Corelight for this informative session on how AI and ML can work in your favor when it comes to security operations!
Our webinar with Google and Mandiant (now part of Google Cloud) is just around the corner! Join us this Thursday as industry experts Umesh Shankar from Google Cloud, Gregory Bell and Vern Paxson from Corelight, break down how #AI and #ML can benefit security operations. We’ll share real-world use cases, what your team should be aware of, and answer your burning questions. Sign up now: https://lnkd.in/eUwU8_Gc
To view or add a comment, sign in