Cloud Computing

Co-op mode: New partners driving the future of gaming with AI

Leaders in the games industry are using Google Cloud’s AI to drive unprecedented advancements in game development, including smarter, faster, and more immersive gaming experiences. And just like any successful game studio is the work of a broad and diverse team, our partner ecosystem is ready to help level up any project, including with game-industry-specific […]

Co-op mode: New partners driving the future of gaming with AI Read More »

BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique

Written by: Truman Brown, Emily Astranova, Steven Karschnia, Jacob Paullus, Nick McClendon, Chris Higgins Executive Summary The Rise of Browser in the Middle (BitM): BitM attacks offer a streamlined approach, allowing attackers to quickly compromise sessions across various web applications. MFA Remains Crucial, But Not Invulnerable: Multi-factor authentication (MFA) is a vital security measure, yet

BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique Read More »

Protecting your APIs from OWASP’s top 10 security threats

APIs are an integral part of modern services, and the data they exchange is often highly sensitive. Without proper authentication, authorization, and protection against data leakage, your organization and your end users will face an increased risk of cyberattacks.  The Open Worldwide Application Security Project (OWASP) develops and publishes community-led documentation and standards for critical

Protecting your APIs from OWASP’s top 10 security threats Read More »

Streamlined Security: Introducing Network Security Integration

Many Google Cloud customers have deep investments in third-party ISV security solutions such as appliances to secure their networks and enforce consistent policies across multiple clouds. However, integrating these security solutions into the cloud application environment comes with its own set of challenges: Network re-architecture: Integrating third-party appliances for traffic inspection often necessitates a network

Streamlined Security: Introducing Network Security Integration Read More »

Streamlined Security: Introducing Network Security Integration

Many Google Cloud customers have deep investments in third-party ISV security solutions such as appliances to secure their networks and enforce consistent policies across multiple clouds. However, integrating these security solutions into the cloud application environment comes with its own set of challenges: Network re-architecture: Integrating third-party appliances for traffic inspection often necessitates a network

Streamlined Security: Introducing Network Security Integration Read More »

10 months to innovation: Definity’s leap to data agility with BigQuery and Vertex AI

At Definity, a leading Canadian P&C insurer with a history spanning over 150 years, we have a long tradition of innovating to help our customers and communities adapt and thrive. To stay ahead in our rapidly evolving industry, we knew a unified data foundation was key to realizing the business and customer experience opportunities offered

10 months to innovation: Definity’s leap to data agility with BigQuery and Vertex AI Read More »

How SIGNAL IDUNA supercharges customer service with gen AI

Today’s insurance customers expect more: simple digital services, instant access to service representatives when they want to discuss personal matters, and quick feedback on submitted invoices. Meeting these demands has become increasingly difficult for insurers due to rising inquiry volumes, a shortage of skilled workers, and the loss of expertise as employees retire.  Recognizing the

How SIGNAL IDUNA supercharges customer service with gen AI Read More »