{"id":45622,"date":"2022-03-08T18:15:07","date_gmt":"2022-03-08T18:15:07","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/google-to-buy-mandiant-aims-to-automate-security-response"},"modified":"2022-03-08T18:15:07","modified_gmt":"2022-03-08T18:15:07","slug":"google-to-buy-mandiant-aims-to-automate-security-response","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/","title":{"rendered":"Google to Buy Mandiant, Aims to Automate Security Response"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google has announced its intent to buy incident response (IR) firm Mandiant for $5.4 billion, with the goal of broadening its portfolio of cybersecurity services with a company known for its IR investigations. That includes its response to the massive 2009 Aurora attacks, which compromised hundreds of companies \u2014 Google among them.<\/p>\n<p>The acquisition will expand Google&#8217;s revenue from cybersecurity services, give the company access to more real-time threat intelligence, and more tightly integrate those services into the Google Cloud Platform (GCP). In addition, Google will benefit from Mandiant&#8217;s plans to expand its automation of detection and response services to help companies cope with the unmet demand for cybersecurity professionals, said Kevin Mandia, CEO of Mandiant, during a press briefing.<\/p>\n<p>&#8220;We have been on a mission to automate security and secure the cloud,&#8221; he said. &#8220;Even though many look at Mandiant as an incident response company, we are not in business to be solely an incident company. &#8230; By coming together with Google, we get the investment we need to continue automating incident response.&#8221;<\/p>\n<p>The planned purchase of Mandiant is the latest move by Google to bolster its cybersecurity products and services. In August, the company <a href=\"https:\/\/www.darkreading.com\/cloud\/google-launches-security-advisory-service-security-to-workspaces\" target=\"_blank\" rel=\"noopener\">pledged to spend $10 billion to boost software security<\/a>, including investments in bug bounties and donations to open source software projects. Mandiant will join other recent Google acquisitions \u2014 such as<a href=\"https:\/\/www.darkreading.com\/operations\/google-buys-siemplify-to-get-ahead-in-cloud-security\" target=\"_blank\" rel=\"noopener\"> security orchestration, automation, and response (SOAR) firm Siemplify<\/a>, which the company acquired in January \u2014 to deliver additional capabilities.<\/p>\n<p><strong>Google Cloud Platform<\/strong><strong><br \/><\/strong>Integrating Mandiant into GCP gives Google a stronger revenue stream linked to IR as well as other services that can be integrated into the platform, such as threat intelligence, testing and validation of security controls, and risk management. The full suite of capabilities provided by Google, many of which come from recently acquired companies, should be attractive to enterprises, says Phil Venables, vice president at Google and chief information security officer at Google Cloud.<\/p>\n<p>&#8220;We are clearly going to spend time thinking about how the integration will work in the right way,&#8221; he says. &#8220;But when you look at the elements of this, it is a pretty compelling set of technologies and services that can really benefit enterprises and all organizations in their end-to-end security mission. It brings a lot of fresh competition to the marketplace and really responds to what customers are asking for.&#8221;<\/p>\n<p>While Google is not willing to discuss plans for the final form of the integrated companies, Mandiant will still support its customers and work with companies that are not Google customers. The integration of Mandiant into Google should help businesses because the broad base of threat intelligence should provide better information to customers of either company, says Neil MacDonald, distinguished research VP at business analysis firm Gartner.<\/p>\n<p>&#8220;The deal benefits customers even if they don&#8217;t run on the Google Cloud Platform because there will be a halo effect,&#8221; he says. &#8220;Google&#8217;s security will be improved by Mandiant, so customers benefit from that expertise and data from its services.&#8221;<\/p>\n<p>The halo effect will not just help businesses but all of Google&#8217;s consumer customers as well, said Alberto Y\u00e9pez, co-founder and managing director at Forgepoint Capital, in a statement sent to Dark Reading.<\/p>\n<p>&#8220;Everyday Internet users will benefit from this deal because Gmail and Google Apps \u2014 plus all of the other Google business applications \u2014 will now be armed with Madiant\u2019s insights on threat vectors and cyber criminal organizations around the world,&#8221; he said. &#8220;This context is critical for attack prevention. Layering that context with the use of big data and AI allows Google to be significantly more effective in preventing attacks.&#8221;<\/p>\n<p>The acquisition ends eight months of reportedly competitive talks to purchase Mandiant following <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/fireeye-sells-products-business-to-symphony-group-for-1-2b\" target=\"_blank\" rel=\"noopener\">the sale of its FireEye security products business<\/a> to Symphony Technology Group for $1.2 billion in June 2021. Symphony had previously bought McAfee&#8217;s enterprise security business and <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/fireeye-mcafee-enterprise-renamed-as-trellix\" target=\"_blank\" rel=\"noopener\">renamed the McAfee and FireEye enterprise businesses as Trellix<\/a>. The company formerly known as FireEye <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/mandiant-confirms-name-change-from-fireeye-inc-to-mandiant-inc-\" target=\"_blank\" rel=\"noopener\">rebranded itself as Mandiant<\/a> during the divestiture of its FireEye products business at the beginning of October.<\/p>\n<p><strong>First It Was&nbsp;Microsoft&nbsp;<\/strong><strong><br \/><\/strong>Until recently, Microsoft had been rumored as the favored purchaser of the company, but talks ended earlier in March. GCP needs the capabilities more than Microsoft&#8217;s Azure, which already has Active Directory and the Defender endpoint detection and response (EDR) service, said Jeff Pollard, vice president and principal analyst at Forrester Research, in a statement sent to Dark Reading.<\/p>\n<p>&#8220;GCP is playing catchup to Microsoft in cybersecurity and lacks its competitors\u2019 inherent advantages in the enterprise: endpoint and active directory,&#8221; he said. &#8220;That forces [Google] to pay a premium and be more aggressive, which it&#8217;s signaled a willingness to do.&#8221;<\/p>\n<p>The focus on automation is unsurprising. The US and other developed countries face significant cybersecurity threats but continue to have far too few cybersecurity professionals to deal with the problems. Currently, US companies have open requests for almost 598,000 cybersecurity positions, which is <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noopener\">57% of the total employed cybersecurity workers<\/a> in the US, according to CyberSeek, a collaboration between Emsi Burning Glass, CompTIA, and the National Initiative for Cybersecurity Education (NICE).<\/p>\n<p>However, much of the basic cybersecurity work is repetitive and can be automated, says Mandiant&#8217;s Mandia.<\/p>\n<p>&#8220;As we are having the conversation, Mandiant is responding to 150 breaches, and I would say 85% to 90% of what our folks are doing, we have done it before,&#8221; he says. &#8220;If we can automate that capability to go through all the data that people are harvesting to secure their networks to find the needles in the haystacks \u2014 if we can automate what we do, the need for people will decrease.&#8221;<\/p>\n<p>Mandiant found a suitor with deep pockets in Google, which helps as the company reinvents its business, Pollard said, pointing out that there are still gaps in Google&#8217;s cybersecurity capabilities. Most pressing is the lack of an endpoint detection and response (EDR) platform to compete with standalone offerings and Microsoft&#8217;s Defender for Endpoint.<\/p>\n<p>&#8220;We expect an EDR tool is next on its shopping list,&#8221; he said.<\/p>\n<p>Google has <a href=\"https:\/\/www.mandiant.com\/company\/press-release\/mgc\" target=\"_blank\" rel=\"noopener\">agreed to pay $23 per share<\/a> in the <a href=\"https:\/\/www.googlecloudpresscorner.com\/2022-03-08-mgc\" target=\"_blank\" rel=\"noopener\">all-cash deal<\/a>. The acquisition still has to be approved by regulators and stockholders. Mandiant investigated the 2009 Aurora attacks that compromised at least two dozen companies \u2014 but <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/-aurora-attacks-still-under-way-investigators-closing-in-on-malware-creators\" target=\"_blank\" rel=\"noopener\">later reports estimated hundreds<\/a> \u2014 including Google.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/google-to-buy-mandiant-aims-to-automate-security-response\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/google-to-buy-mandiant-aims-to-automate-security-response\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45622","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T18:15:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google to Buy Mandiant, Aims to Automate Security Response\",\"datePublished\":\"2022-03-08T18:15:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/\"},\"wordCount\":1058,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte5ff1f773d255b95\\\/6206ba14e413e76824f96b8d\\\/google_achinthamb_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/\",\"name\":\"Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte5ff1f773d255b95\\\/6206ba14e413e76824f96b8d\\\/google_achinthamb_shutterstock.jpg\",\"datePublished\":\"2022-03-08T18:15:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte5ff1f773d255b95\\\/6206ba14e413e76824f96b8d\\\/google_achinthamb_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blte5ff1f773d255b95\\\/6206ba14e413e76824f96b8d\\\/google_achinthamb_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-to-buy-mandiant-aims-to-automate-security-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google to Buy Mandiant, Aims to Automate Security Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/","og_locale":"en_US","og_type":"article","og_title":"Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-08T18:15:07+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google to Buy Mandiant, Aims to Automate Security Response","datePublished":"2022-03-08T18:15:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/"},"wordCount":1058,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/","url":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/","name":"Google to Buy Mandiant, Aims to Automate Security Response 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg","datePublished":"2022-03-08T18:15:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blte5ff1f773d255b95\/6206ba14e413e76824f96b8d\/google_achinthamb_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-to-buy-mandiant-aims-to-automate-security-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google to Buy Mandiant, Aims to Automate Security Response"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45622"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45622\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}