- 119
- 2 297 369
Mandiant (Part of Google Cloud)
United States
เข้าร่วมเมื่อ 19 เม.ย. 2010
Google Cloud’s Mandiant specializes in cybersecurity solutions tailored to meet the demands of today's dynamic threat landscape. Trust us to safeguard your critical assets and maintain business continuity before, during, and after cybersecurity incidents.
EP02 Victor Manuel Alvarez - Motivation, Community, and the Future with YARA-X: Building the Futu...
In this episode we’re sitting down with Victor Manuel Alvarez, the creator of YARA. YARA is one of the most powerful tools in cybersecurity. We discuss his early career, what motivated him to create YARA, and the role the community has played in its development. Plus, Victor shares his thoughts on the future of YARA and YARA-X, which is a ground-up rewrite of this venerable tool.
มุมมอง: 32
วีดีโอ
CISO Community Talks: Cybersecurity Forecast 2025
มุมมอง 126วันที่ผ่านมา
As part of Cybersecurity Forecast 2025, we hear from customers what they are thinking about in the year ahead. Get the Google Cloud Cybersecurity Forecast 2025 report now: cloud.google.com/security/resources/cybersecurity-forecast
Cybersecurity Forecast 2025 with Phil Venables
มุมมอง 12614 วันที่ผ่านมา
As part of Cybersecurity Forecast 2025, Phil Venables, VP, TI Security & CISO, Google Cloud, discusses continued cloud migration, encryption in the cloud, cloud regulations, and how boards of directors should be thinking about security. Pre-register for the Cybersecurity Forecast 2025 report now, and a copy will be sent to your inbox when it releases on November 13: cloud.google.com/security/re...
Cybersecurity Forecast 2025 with Sunil Potti
มุมมอง 11814 วันที่ผ่านมา
As part of Cybersecurity Forecast 2025, Sunil Potti, VP/GM, Google Cloud Security, discusses the next phase of AI and security, and the desire for a more sovereign cloud. Pre-register for the Cybersecurity Forecast 2025 report now, and a copy will be sent to your inbox when it releases on November 13: cloud.google.com/security/resources/cybersecurity-forecast
Cybersecurity Forecast 2025 with Sandra Joyce
มุมมอง 9714 วันที่ผ่านมา
As part of Cybersecurity Forecast 2025, Sandra Joyce, VP of Google Threat Intelligence at Google Cloud, discusses the Big Four (China, Russia, North Korea, and Iran). Pre-register for the Cybersecurity Forecast 2025 report now, and a copy will be sent to your inbox when it releases on November 13: cloud.google.com/security/resources/cybersecurity-forecast
Cybersecurity Forecast 2025 with Charles Carmakal
มุมมอง 11714 วันที่ผ่านมา
As part of Cybersecurity Forecast 2025, Charles Carmakal, Mandiant CTO, Google Cloud, discusses China-nexus operations, ransomware and multifaceted extortion, attacker and defender use of AI, and more. Pre-register for the Cybersecurity Forecast 2025 report now, and a copy will be sent to your inbox when it releases on November 13: cloud.google.com/security/resources/cybersecurity-forecast
EP01 Nick Harbour - Early Days of Incident Response, Mandiant History and FLARE-ON
มุมมอง 15221 วันที่ผ่านมา
Nick Harbour discusses his career journey from his early days in the Air Force to his work at Mandiant. He shares insights into the evolution of malware, his contributions to the field of malware analysis, and the development of the Flare-On contest, a reverse engineering challenge.
How to Run an Effective Tabletop Exercise
มุมมอง 176หลายเดือนก่อน
Mandiant Senior Consultant Alishia Hui joins host Luke McNamara to discuss all things tabletop exercise related. Alishia walks through the elements of a tabletop exercise, important preparatory steps, the success factors for a good exercise, and how organizations can implement lessons learned. cloud.google.com/transform/the-empty-chair-guess-whos-missing-from-your-cybersecurity-tabletop-exercis...
Using LLMs to Analyze Windows Binaries
มุมมอง 127หลายเดือนก่อน
Vicente Diaz, Threat Intelligence Strategist at VirusTotal, joins host Luke McNamara to discuss his research into using LLMs to analyze malware. Vicente covers how he used Gemini to analyze various windows binaries, the use cases this could help address for security operations, technical challenges with de-obfuscation, and more. For more on this topic: blog.virustotal.com/2023/04/introducing-vi...
How Threat Actors Bypass Multi-Factor Authentication
มุมมอง 121หลายเดือนก่อน
Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA bypass and how threat actors are conducting adversary in the middle (AiTM) attacks to gain access to targeted organizations. Josh walks through a case study of MFA bypass, how token theft occurs, the increasing amount of AiTM activity with more featu...
Mandiant Academy - Election Security On Demand
มุมมอง 2762 หลายเดือนก่อน
This on-demand course provides an overview of cybersecurity threats along with the fundamentals of strong cybersecurity hygiene. It is designed for both non-technical and technical learners who want to understand how threat actors see their targets, and it shares methods to help mitigate risks. Learners will be introduced to foundational elements of cybersecurity risks, including today’s threat...
Mandiant Academy - Incident Response in Google Cloud Course
มุมมอง 2532 หลายเดือนก่อน
This intensive three-day course is designed to teach investigators techniques needed to respond to an investigation of a Google Cloud organization. The fast-paced course is built upon a series of hands-on labs that highlight how to investigate and respond to a targeted attack in a Google Cloud organization. Learn more: cloud.google.com/learn/security/mandiant-academy
Mandiant Academy - DFIR Bootcamp
มุมมอง 2262 หลายเดือนก่อน
To effectively defend data and intellectual property, organizations must have the ability to rapidly detect and respond to threats. This intensive two-week bootcamp is designed to teach the fundamental investigative techniques needed to respond to today’s landscape of threat actors and intrusion scenarios. Learn more: cloud.google.com/learn/security/mandiant-academy
Mandiant Academy - Election Cybersecurity Seminar
มุมมอง 692 หลายเดือนก่อน
This seminar empowers election officials, campaign staff, and concerned citizens to combat the spread of election-related disinformation. Learn to identify common disinformation techniques, monitor social media, verify information sources, and effectively debunk false narratives. Develop communication strategies to maintain public trust during election cycles. Learn more: cloud.google.com/learn...
TAG's Work Tracking Commercial Surveillance Vendors
มุมมอง 992 หลายเดือนก่อน
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into the increasing rise of zero-day exploitation. F...
Mandiant Academy - Cyber Intelligence for Critical Infrastructure
มุมมอง 2192 หลายเดือนก่อน
Mandiant Academy - Cyber Intelligence for Critical Infrastructure
Mandiant Red Team Series, Part 6: Key Reasons for Red Teaming
มุมมอง 1143 หลายเดือนก่อน
Mandiant Red Team Series, Part 6: Key Reasons for Red Teaming
Mandiant Red Team Series, Part 5: Red Team vs. Purple Team
มุมมอง 943 หลายเดือนก่อน
Mandiant Red Team Series, Part 5: Red Team vs. Purple Team
Mandiant Red Team Series, Part 4: Service Differentiators
มุมมอง 893 หลายเดือนก่อน
Mandiant Red Team Series, Part 4: Service Differentiators
Mandiant Red Team Series, Part 3: Today's Top 3 Findings
มุมมอง 963 หลายเดือนก่อน
Mandiant Red Team Series, Part 3: Today's Top 3 Findings
Mandiant Red Team Series, Part 2: An Executive Perspective
มุมมอง 1913 หลายเดือนก่อน
Mandiant Red Team Series, Part 2: An Executive Perspective
Mandiant Red Team Series, Part 1: The Need for Red Teaming
มุมมอง 1713 หลายเดือนก่อน
Mandiant Red Team Series, Part 1: The Need for Red Teaming
What Iranian Threat Actors Have Been Up To This Year
มุมมอง 1213 หลายเดือนก่อน
What Iranian Threat Actors Have Been Up To This Year
Mandiant's Approach to Securely Using AI Solutions
มุมมอง 813 หลายเดือนก่อน
Mandiant's Approach to Securely Using AI Solutions
Lessons Learned from Responding to Cloud Compromises
มุมมอง 403 หลายเดือนก่อน
Lessons Learned from Responding to Cloud Compromises
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
มุมมอง 303 หลายเดือนก่อน
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
Optimized Vulnerability Management with Google Threat Intelligence
มุมมอง 1.4K6 หลายเดือนก่อน
Optimized Vulnerability Management with Google Threat Intelligence
Uncover External Threats with Google Threat Intelligence
มุมมอง 1.1K6 หลายเดือนก่อน
Uncover External Threats with Google Threat Intelligence
A lot of work is still needed on the AI voice and natural speech.
Myth of the aif gap?
Fantastic overview of Google’s Threat Intelligence! How does Google’s approach differ from other platforms in handling emerging threats?
Ai is excellent, but security is always needed, (?). Just a way so simple, safe like,1950's , 60 s tv saf, where nobody could tabulate outside of a tv turn cannel nobe or remote and take or steal their email ID bank account. Why all. This so wrap all thru out the internet. Why so " lions and Tigers and hackers, oh my. But I think (know) The internet great. How yeah but presto sites, words, meanings, tain ment, and that's suppose to be fun and safe like a 1950's or 60's RCA.
Impressive demo! How does Google Threat Intelligence stay ahead of emerging threats?
Thanks for guidelines
😉
Thanks
People getting remote access seems to worry you :) Nice work thx
On your site the wording (What to see more? Watch this short overview video of Google Threat Intelligence.) Is wrong. I should be (Want* to see more)
In your comment the wording (I should be (Want* to see more) is wrong. It should be It*
What caught my eye was the relevant reporting feature! Mandiant(now GoogleCloud) you all have really outdone this 👏 it’s like a one stop shop for a threat intelligence analyst
very insightful - using intel to prioritize what to look on - finding ways to automize in order maximise business value but at the same time managing risk effectively and seamlessly. Thank you Google Cloud for this talk!
how can i get access?
Well, at least I have this vid to showcase when students come to me asking for AI guidance in cybersec, and I'm like, "I do not think there is a solid consensus already, young human being".
Wow this is I looking for
🤭 'PromoSM'
How about authentication to the Cloud storage buckets?
Ask your CIO and CTO if they remember KATI and Amet the imam from ring road near the border with iran? Diamonds? Oh. Pleased to meet you. I wrote KATI. Wanna see?
"Here is all the indicators in my data.."?!?!?!!? "Here ARE all the indicators in my data.." Subject-verb agreement is important.
The presentation style is like that of a surfer or high schooler, not an expert in security operations. Americans still haven't figured out that the global standard for English is received pronunciation? Would be beneficial and a better impression if Americans noticed the more erudite, educated, sophisticated and knowledgeable sounding English pronunciation and speaking style of the Commonwealth realms (billions of people).
cool hack!
Great Insights
from 2023
Like what you’re hearing? Register for a free mWISE Digital Conference Pass using code DIGITAL500 at mwise.mandiant.com/conf23!
Found this informative in 2023, thanks for the vid!
I wonder how much fun these people have
Very well done. Thanks a lot
Great video! Security starts with the leaders! Doing M&A Cyber it was delightful to hear it mentioned on the video.
Gracias por la informacion que comparten
Thanks 🙏🏻
ᑭяỖmo𝓼𝐦 🍀
Good video
I'm only here for the music
NICE MUSIC! COMPOSITOR NAME ??
Hi
صضشش
Thank you
Wonderful video. Great explanation. Thank you.
Thank you very much for sharing this!
How do you recommend starting in this? I have extensive trade background but IT-wise are there any certifications i can pursue in order?
There are trades in ICS related areas but I do not know of any certifications.
This was really good thanks
Merry Christmas
Merry Christmas