This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
This blog section is a place where community members can hear from Googlers, customers, and partners and get tips, advice, and information about topics across Google Cloud Security.
Learn how to apply the function timestamp.diff to calculate the
difference in specific time units within your datasets and how it
differs from calculating differences using mathematical operations!
Streamline your log ingestion with Google Security Operations! Leverage
our pre-built Cloud Run functions and simplify security data collection.
Learn how in this guide.
This third quarter of 2024, Google Threat Intelligence continued to
deliver on the three pillars of our strategy: world class threat
intelligence, turnkey operationalization, and proactive and continuously
up-to-date
Learn about the origins of Technique Inference Engine and how to use it
to improve incident investigations, analysis, real-time investigation
guidance, advanced detections and improved ATT&CK operationalizations.
Learn how string functions like strings.extract_hostname and
strings.extract_domain and be used to easily grab portions of strings
and use them in searches and rules in Google SecOps to streamline your
hunts, detections and investigations!
Learn how two time functions get_timestamp and as_unix_seconds can be
used to more easily work with data/time values in Google SecOps as you
hunt, investigate and build detections!
Learn how to proactively monitor your security data pipeline with Google
SecOps and ensure your team isn't blindsided by missing logs or
malicious activity going unnoticed.
Learn how to proactively monitor your security data pipeline with Google
SecOps and ensure your team isn't blindsided by missing logs or
malicious activity going unnoticed.
In our latest New to Google SecOps blog, we are going to introduce three
string functions that can be used to easily find and extract values
within a string for use in threat hunting and detection engineering!
Drowning in a sea of ATT&CK techniques? Feeling lost in the matrix? This
article reveals the secret to harnessing ATT&CK's true power and
transforming your security operations from chaos to clarity.
In our latest New to Google SecOps blog, we are going to introduce two
string functions that can be used to convert string values to integers
which will then be used in statistical analysis.
This blog explores three key use cases for how to do baseline testing in
Mandiant Security Validation (MSV) - focusing on endpoint core controls,
egress testing, and lateral movement, as well as provides a step-by-step
guide to quickly build baselines for each use case.
Gen AI brings transformative potential, but also introduces complex
challenges. Organizations must prioritize governance, security, and
continuous learning to successfully navigate Gen AI adoption and unlock
its full potential. Use our roadmap to plan this!
This article explains how to bulk close alerts with the Google Security
Operations API. It provides step-by-step instructions and Python client
code for closing a list of alerts triggered by a given detection rule.
Looking to design your own “building code” or gen AI through an internal
Acceptable Use Policy (AUP)? The way that you shape and evolve your AUP
can help establish a shared understanding in your organization about the
values and principles that govern gen AI, which can be increasingly
important as widespread adoption and everyday use become more common.