menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Google News

>

Cloud CISO...
source image

Cloudblog

1d

read

138

img
dot

Image Credit: Cloudblog

Cloud CISO Perspectives: From gen AI to threat intelligence: 2024 in review

  • Phil Venables, VP, TI Security & CISO, Google Cloud, shared the top Google Cloud security updates in 2024 that attracted the most interest from the security community.
  • The top stories are from the areas of development in cybersecurity that include security and AI, the security ecosystem, threat intelligence, and security operations.
  • In the area of security and AI, Google Cloud focused on encouraging AI use cases in cybersecurity and the development of responsible AI use and risk management policies.
  • Google Cloud made significant developments in security ecosystem by advocating for more resilient and secure-by-design technology.
  • Google Cloud also made important updates to core products throughout the year, and introduced Google Threat Intelligence, Security Command Center Enterprise, and Chrome Enterprise Premium.
  • In the area of threat intelligence, integrated threat intelligence products and services from across Mandiant, VirusTotal, and Google presented a comprehensive view of the threat landscape.
  • Google also announced new ways to help keep customers safe, including updated best practices, expanded managed services, and additional avenues for threat intelligence sharing.
  • In the area of security operations, Google Cloud focused on innovation, improvement, and education in building a modern security operations solution that is intelligence-driven, AI-powered, and capable of fueling productivity while empowering defenders to handle new threats.
  • Google put together a forecast report with insights from across the company to help defenders proactively prepare for the coming year.
  • Google Cloud also released various online resources and news this month from security teams on topics such as how to make the cloud an engine for manufacturing success, how to combat fraud, and how to achieve compliance with NIS2.

Read Full Article

like

8 Likes

For uninterrupted reading, download the app