{"id":51606,"date":"2023-04-25T04:08:56","date_gmt":"2023-04-25T04:08:56","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/"},"modified":"2023-04-25T04:08:56","modified_gmt":"2023-04-25T04:08:56","slug":"googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/","title":{"rendered":"Google&#8217;s here to boost your cloud security and the magic ingredient? AI, of course"},"content":{"rendered":"<p><span class=\"label\">RSA Conference<\/span> Google Cloud used the RSA 2023 conference to talk about how it&#8217;s injected artificial intelligence into various corners of its security-related services.<\/p>\n<p>The web giant&#8217;s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/rsa-google-cloud-security-ai-workbench-generative-ai\/\">announcement<\/a> of the resulting new features \u2013 marketed under the Google Cloud Security AI Workbench umbrella brand \u2013 is pretty long winded, so we thought we&#8217;d ask its <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/04\/05\/google_bard_sundar_pichai\/\" rel=\"noopener\">Bard<\/a> <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/bard.google.com\/\">chat bot<\/a> to summarize it all. Here&#8217;s what the thing told us:<\/p>\n<p>Um, okay, that kinda makes sense, but we&#8217;re still not sure what exactly is new here. Maybe the diagram Google handed out about the workbench will help?<\/p>\n<div class=\"CaptionedImage width_85\" readability=\"7\"><a href=\"https:\/\/regmedia.co.uk\/2023\/04\/25\/handout_google_security_ai_workbench.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2023\/04\/25\/handout_google_security_ai_workbench.png?x=648&amp;y=348&amp;infer_y=1\" alt=\"Google-supplied diagram showing how its AI workbench works\" title=\"Google-supplied diagram showing how its AI workbench works\" height=\"348\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Google&#8217;s illustration showing how its AI workbench comes together<\/p>\n<\/div>\n<p>Fine, we&#8217;ll read and summarize the announcement ourselves. Here&#8217;s what&#8217;s new and worth highlighting from Google Cloud:<\/p>\n<h3 class=\"crosshead\">VirusTotal and Sec-PaLM<\/h3>\n<p>Google said it has created a security-specialized large language model called Sec-PaLM that it&#8217;s put to use in VirusTotal, which Google also owns. When you upload malware to VirusTotal to analyze, it will use Sec-PaLM to generate a written report (<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.virustotal.com\/gui\/file\/d6111869a8088e2d1b49a92a30fc3d477373d88a4a2f1a7da4e75ce85dc08ba4\/detection\">like this one<\/a>) describing what the file&#8217;s code will do if executed and what the intent appears to be.<\/p>\n<p>So far this <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.virustotal.com\/2023\/04\/introducing-virustotal-code-insight.html\">Code Insight<\/a> feature works on qualifying PowerShell scripts, and this is expected to be expanded to other file formats.<\/p>\n<h3 class=\"crosshead\">Mandiant Breach Analytics for Chronicle<\/h3>\n<p>Next, Google said its Mandiant Breach Analytics for Chronicle will alert you when it detects an intrusion, and will use Sec-PaLM to describe these security breaches.<\/p>\n<p>Diving deeper into the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/rsa-introducing-ai-powered-investigation-chronicle-security-operations\">announcement<\/a> reveals the LLM can be used to search and analyze security event logs, set up and customize the detection of malicious or suspicious activity on a network, and produce summaries and insights.<\/p>\n<p>It essentially brings Google-owned Mandiant&#8217;s threat intelligence tech into Chronicle, Google&#8217;s cloud security suite.<\/p>\n<h3 class=\"crosshead\">Assured Open Source Software<\/h3>\n<p>Google also promised to somehow use LLMs to add more packages to its Assured Open Source Software project, which <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/assured-open-source-software\">Google uses<\/a> to avoid supply-chain attacks, and suggests you also make use of it.<\/p>\n<p>Dependencies in AOSS are expected to be free from tampering, obtained from vetted sources, fuzzed and analyzed for vulnerabilities, and include useful metadata about their contents. The idea being that it&#8217;s a place to get software from without worrying if someone&#8217;s secretly slipped bad stuff into a library.<\/p>\n<h3 class=\"crosshead\">Mandiant Threat Intelligence AI<\/h3>\n<p>It&#8217;s Sec-PaLM again, this time in Mandiant Threat Intelligence AI, which <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/rsa-introducing-ai-powered-insights-threat-intelligence\">can be used<\/a> to &#8220;quickly find, summarize, and act on threats relevant to your organization,&#8221; we&#8217;re told.<\/p>\n<h3 class=\"crosshead\">Security Command Center AI<\/h3>\n<p>Finally, Security Command Center AI <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/rsa-introducing-ai-powered-risk-summaries-security-command-center\">promises<\/a> to make it easier for users to understand how their organizations can be attacked, by summarizing and explaining the situation.<\/p>\n<p>Crucially, it doesn&#8217;t appear to use hypothetical examples, it instead takes a look at your assets and resources, and tells you how someone could take a crack your IT environment specifically. It also recommends mitigations, Google said.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>This is sorta more like the AI future we imagined, not chat bots fabricating people&#8217;s biographies.<\/p>\n<h3 class=\"crosshead\">Context<\/h3>\n<p>Interestingly enough, Google says customers can build plugins to reach into the platform and extend its functionality in customized ways. There&#8217;s also the usual promise that any customer-supplied or customer-owned data won&#8217;t end up in the hands of others.<\/p>\n<p>&#8220;Google Cloud Security AI Workbench powers new offerings that can now uniquely address three top security challenges: threat overload, toilsome tools, and the talent gap,&#8221; gushed Sunil Potti, veep of Google Cloud Security, in a statement on Monday.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZEd7Ckj60OXI7RJkG6cSMAAAAIM&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>&#8220;It will also feature partner plug-in integrations to bring threat intelligence, workflow, and other critical security functionality to customers.&#8221;<\/p>\n<p>What Google&#8217;s announced today is being seen as a response to the OpenAI-powered Security Copilot Microsoft <a href=\"https:\/\/www.theregister.com\/2023\/03\/28\/microsoft_security_copilot\/\">launched<\/a> last month. What&#8217;s funny is that years ago the Google Brain team invented the transformer approach now used by all of these modern LLMs, and so the Big G today finds itself in the weird situation of seemingly playing catch up on technology it was or is at the forefront of.<\/p>\n<p>&#8220;We need to first acknowledge that AI will soon usher in a new era for security expertise that will profoundly impact how practitioners &#8216;do&#8217; security,&#8221; Potti added. &#8220;Most people who are responsible for security \u2014 developers, system administrators, SRE, even junior analysts \u2014 are not security specialists by training.&#8221;<\/p>\n<p>Accenture is the first guinea pig for the Google Cloud Security AI Workbench, we&#8217;re told. For the rest of us, Code Insight is available now in preview form, and the rest will roll out gradually to testers and in preview this year, if all goes to plan. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/04\/25\/google_ai_security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Send in the LLMs RSA Conference\u00a0 Google Cloud used the RSA 2023 conference to talk about how it&#8217;s injected artificial intelligence into various corners of its security-related services.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51607,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-51606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google&#039;s here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google&#039;s here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-25T04:08:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2023\/04\/25\/handout_google_security_ai_workbench.png?x=648&amp;y=348&amp;infer_y=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google&#8217;s here to boost your cloud security and the magic ingredient? AI, of course\",\"datePublished\":\"2023-04-25T04:08:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/\"},\"wordCount\":785,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/\",\"name\":\"Google's here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png\",\"datePublished\":\"2023-04-25T04:08:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png\",\"width\":648,\"height\":348},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google&#8217;s here to boost your cloud security and the magic ingredient? AI, of course\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google's here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/","og_locale":"en_US","og_type":"article","og_title":"Google's here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-25T04:08:56+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2023\/04\/25\/handout_google_security_ai_workbench.png?x=648&amp;y=348&amp;infer_y=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google&#8217;s here to boost your cloud security and the magic ingredient? AI, of course","datePublished":"2023-04-25T04:08:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/"},"wordCount":785,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/","url":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/","name":"Google's here to boost your cloud security and the magic ingredient? AI, of course 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png","datePublished":"2023-04-25T04:08:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course.png","width":648,"height":348},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/googles-here-to-boost-your-cloud-security-and-the-magic-ingredient-ai-of-course\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google&#8217;s here to boost your cloud security and the magic ingredient? AI, of course"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51606"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51606\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51607"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}