Remove Engineering Remove Technology Remove Whitepaper
article thumbnail

Chuck, Acme, and Remediation Avoidance

Adam Shostack

Lets look at what happens if Acme gives Chuck some free resources, like our Fast, Cheap and Good: An Unusual Tradeoff Available in Threat Modeling whitepaper. With automation, you formalize the work and share the information across all these different people, but that doesnt mean you can just use technology.

article thumbnail

Anton’s Security Blog Quarterly Q4 2021

Anton on Security

Random fun new posts: “SOC Technology Failures?—?Do Do They Matter?” Kill SOC Toil, Do SOC Eng” “Anton and The Great XDR Debate, Part 1” Fun posts by topic. A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” “Today, You Really Want a SaaS SIEM!”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure by Design: Google’s Perspective on Memory Safety

Google Security

In this post, we share our perspective on memory safety in a comprehensive whitepaper. We'll also highlight our commitments towards implementing several of the solutions outlined in the whitepaper, most recently with a $1,000,000 grant to the Rust Foundation , thereby advancing the development of a robust memory-safe ecosystem.

Software 110
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

Some of these include: Advanced persistent threats (APTs); Insider threats; Social engineering; and, Human error. This problem is magnified by the adoption of newer technologies, such as cloud, big data, internet of things (IoT), software containers and other transformative technologies that make defining a perimeter much more difficult.

article thumbnail

Private AI For All: Our End-To-End Approach to AI Privacy on Android

Google Security

Posted by Dave Kleidermacher, VP Engineering, Android Security and Privacy, and Giles Hogben, Senior Director, Privacy Engineering, Android Your smartphone holds a lot of your personal information to help you get things done every day. Pioneering new privacy technologies.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. The researchers presented Monday afternoon at the RSA Conference, to tease a soon-to-be-released whitepaper of their work. AI could impact more than just social engineering.

article thumbnail

Gmail client-side encryption: A deep dive

Google Security

Nicolas Lidzborski, Principal Engineer and Jaishankar Sundararaman, Sr. Director of Engineering, Google Workspace In February, we expanded Google Workspace client-side encryption (CSE) capabilities to include Gmail and Calendar in addition to Drive, Docs, Slides, Sheets , and Meet.