This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
This blog section is a place where community members can hear from Googlers, customers, and partners and get tips, advice, and information about topics across Google Cloud Security.
A clear roadmap is essential for success with any new technology. In
this blog post, david-nehoda will outline the ideal path to adopting
Mandiant Security Validation, maximizing your investment and achieving a
stronger security posture.
The “New to Chronicle” blog found on chronicle.security has moved to the
Community Blog. This blog was originally published on August 1st, 2022.
Learn the basics of unified data model, UDM, in Google SecOps using
searches to see how querying this data extracts a good deal of value
very easily
UDM Lookup provides users of Google SecOps the ability to quickly and
easily identify fields of interest and append these to searches while
assisting users to better understand where their data is parsed and
stored.
Enhance the capabilities of Chronicle's REST API using Python. Add and
remove entries to and from existing Reference Lists with client-side
logic. Your list updates can be automated!
Interested in detections that you can leverage in Chronicle with your
Azure Active Directory (Entra ID)? We’ve built a set that can help you
to develop your own use cases.
Cloud threats are getting more complex. Learn how to boost your AWS
security posture with Chronicle SIEM. It includes expertly crafted
detection rules to easily identify threats. Get hands-on with examples!
Learn how to proactively monitor your Google Workspace organization for
suspicious and notable behaviors using Chronicle Security Operations and
over 20 detection rules.
So, we (Tim and Anton, the crew behind the podcast) wanted to post
another reflections blog based on our Cloud Security Podcast by Google
being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise),
kind of similar to this one. But we realized we don’t have enough new
profound reflections…. We do have a few fun new things!
Chronicle Security Operations automatically enriches the entity and
event data that it ingests. Learn how to build detection rules that
leverage this contextually enriched data and alert on suspicious domain
activity in your organization.