Cloud Computing

Cloud CISO Perspectives: Talk cyber in business terms to win allies

Welcome to the first Cloud CISO Perspectives for January 2025. We’re starting off the year at the top with boards of directors, and how talking about cybersecurity in business terms can help us better convey the costs and priority and priority of the cybersecurity risks we face. As with all Cloud CISO Perspectives, the contents […]

Cloud CISO Perspectives: Talk cyber in business terms to win allies Read More »

The developer skill you might be neglecting

Ben and Ryan talk with Geoffrey (Jef) Huck, a software developer turned public speaking coach, about the importance of soft skills in the tech industry—in particular, speaking and communication skills. Their conversation touches on how Huck’s experiences with anxiety shaped his efforts to become a better communicator, practical techniques for dispelling anxiety and connecting with

The developer skill you might be neglecting Read More »

Bitly: Protecting users from malicious links with Web Risk

Bitly’s partnership with Google Web Risk helps enhance Bitly’s ability to protect users and build trust as they generate millions of links and QR Codes daily.  Over the last decade, Bitly has solidified its reputation as a multiproduct connections platform, generating millions of links, QR codes, and mobile landing pages every day. Bitly enables users

Bitly: Protecting users from malicious links with Web Risk Read More »

C4A, the first Google Axion Processor, now GA with Titanium SSD

Today, we are thrilled to announce the general availability of C4A virtual machines with Titanium SSDs custom designed by Google for cloud workloads that require real-time data processing, with low-latency and high-throughput storage performance. Titanium SSDs on C4A VMs deliver storage performance of up to 2.4M random read IOPS, up to 10.4 GiB/s of read

C4A, the first Google Axion Processor, now GA with Titanium SSD Read More »

Get started with Google Cloud’s built-in tokenization for sensitive data protection

In many industries including finance and healthcare, sensitive data such as payment card numbers and government identification numbers need to be secured before they can be used and shared. A common approach is applying tokenization to enhance security and manage risk. A token is a substitute value that replaces sensitive data during its use or

Get started with Google Cloud’s built-in tokenization for sensitive data protection Read More »

Your Single-Page Applications Are Vulnerable: Here’s How to Fix Them

Written by: Steven Karschnia, Truman Brown, Jacob Paullus, Daniel McNamara Executive Summary Due to their client-side nature, single-page applications (SPAs) will typically have multiple access control vulnerabilities By implementing a robust access control policy on supporting APIs, the risks associated with client-side rendering can be largely mitigated Using server-side rendering within the SPA can prevent unauthorized

Your Single-Page Applications Are Vulnerable: Here’s How to Fix Them Read More »

Unlock multimodal search at scale: Combine text & image power with Vertex AI

The way users search is evolving. When searching for a product, users might type in natural-sounding language or search with images. In return, they want tailored results that are specific to their query. To meet these demands, developers need robust multimodal search systems. In this blog post, we’ll share a powerful approach to build a

Unlock multimodal search at scale: Combine text & image power with Vertex AI Read More »

Trading in the Cloud: Lessons from Deutsche Börse Group’s cloud-native trading engine

Earlier this year, Deutsche Börse Group began developing a new cloud-native, purpose-built trading platform. It was built with a focus on digital assets, such as stablecoins, cryptocurrencies, and other tokenized assets. However, the new platform is instrument-agnostic and can trade in all types of assets, from equities to ETFs. Developing a trading platform for digital

Trading in the Cloud: Lessons from Deutsche Börse Group’s cloud-native trading engine Read More »

Backscatter: Automated Configuration Extraction

Written by: Josh Triplett Executive Summary Backscatter is a tool developed by the Mandiant FLARE team that aims to automatically extract malware configurations. It relies on static signatures and emulation to extract this information without dynamic execution, bypassing anti-analysis logic present in many modern families. This complements dynamic analysis, providing faster threat identification and high-confidence

Backscatter: Automated Configuration Extraction Read More »