Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

Google injects generative AI into its cloud security tools | TechCrunch

Apr 09, 2024 - techcrunch.com
Google has announced a range of new cloud-based security products and services at its annual Cloud Next conference. Many of these updates involve Gemini, Google's flagship family of generative AI models. Notably, Google unveiled Gemini in Threat Intelligence, a component of the Mandiant cybersecurity platform that can analyze large portions of potentially malicious code. The company also introduced new features in Security Command Center and Chronicle, its cybersecurity telemetry offering. Other updates include privileged access manager, principal access boundary, Autokey, and Audit Manager, all currently in preview.

The new services are designed to help customers manage large, multi-tenant corporate networks. They allow users to perform natural language searches for ongoing threats, summarize open-source intelligence reports, guide security analysts through their workflows, and provide tools for Google Cloud customers in regulated industries to generate proof of compliance. However, with generative AI's tendency to make mistakes, the effectiveness of these tools remains to be seen.

Key takeaways:

  • Google introduced new cloud-based security products and services at its annual Cloud Next conference, many of which involve Gemini, Google’s flagship family of generative AI models.
  • Gemini in Threat Intelligence, a new component of Google's Mandiant cybersecurity platform, can analyze large portions of potentially malicious code and let users perform natural language searches for ongoing threats.
  • Google's enterprise cybersecurity and risk management suite, Security Command Center, now has a new Gemini-driven feature that lets security teams search for threats using natural language.
  • Google is also introducing new services like privileged access manager, principal access boundary, Autokey, and Audit Manager to help mitigate risks and ensure compliance in high-security use cases.
View Full Article

Comments (0)

Be the first to comment!