Cloud Computing

Build intelligent employee onboarding with Gemini Enterprise

Employee onboarding is rarely a linear process. It’s a complex web of dependencies that vary significantly based on an individual’s specific profile. For example, even a simple request for a laptop requires the system to cross-reference the employee’s role, function, and seniority level to determine whether they need a high-powered workstation or a standard mobile

Build intelligent employee onboarding with Gemini Enterprise Read More »

High-performance inference meets serverless compute with NVIDIA RTX PRO 6000 on Cloud Run

Running large-scale inference models can involve significant operational toil, including cluster management and manual VM maintenance. One solution is to leverage a serverless compute platform to abstract away the underlying infrastructure. Today, we’re bringing the serverless experience to high-end inference with support for NVIDIA RTX PRO™ 6000 Blackwell Server Edition GPUs on Cloud Run. Now

High-performance inference meets serverless compute with NVIDIA RTX PRO 6000 on Cloud Run Read More »

Introducing Single-tenant Cloud HSM to support more data encryption control

Organizations that handle sensitive data in highly-regulated sectors often face a difficult choice: Build and manage physical hardware to meet strict compliance needs, or use cloud services that might not offer the specific level of isolation they require.  These organizations, often in financial services, defense, healthcare, insurance, and government, require a key management service to

Introducing Single-tenant Cloud HSM to support more data encryption control Read More »

Sovereign failover – Design for digital sovereignty using the AWS European Sovereign Cloud

Organizations operating across multiple jurisdictions need to consider the impact of regulatory changes or geopolitical events on their access to cloud infrastructure. This post explains how to design failover architectures that span AWS partitions—including the AWS European Sovereign Cloud, AWS GovCloud (US) and other AWS Regions in the global infrastructure — so workloads can continue operating

Sovereign failover – Design for digital sovereignty using the AWS European Sovereign Cloud Read More »

Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Introduction Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion. As detailed in our companion report, ‘Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft’, these campaigns leverage evolved voice phishing (vishing) and victim-branded credential harvesting to successfully compromise single sign-on (SSO) credentials and

Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS Read More »

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Introduction  Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-branded extortion operations. These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to corporate environments by obtaining single sign-on (SSO) credentials and multi-factor authentication (MFA) codes. Once inside,

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft Read More »