Game on! The 2022 Google CTF is here.

Posted by Jan Keller, Technical Entertainment Manager, Bug Hunters  Are you ready to put your hacking…

SBOM in Action: finding vulnerabilities with a Software Bill of Materials

Posted by Brandon Lum and Oliver Chang, Google Open Source Security Team The past year has…

Announcing the winners of the 2021 GCP VRP Prize

Posted by Harshvardhan Sharma, Information Security Engineer, Google 2021 was another record-breaking year for our Vulnerability Rewards…

Retrofitting Temporal Memory Safety on C++

Posted by Anton Bikineev, Michael Lippautz and Hannes Payer, Chrome security team Memory safety in Chrome…

Privileged pod escalations in Kubernetes and GKE

Posted by GKE and Anthos Platform Security Teams  At the KubeCon EU 2022 conference in Valencia,…

How Hash-Based Safe Browsing Works in Google Chrome

By Rohit Bhatia, Mollie Bates, Google Chrome Security There are various threats a user faces when…

How To Get Your Head Around Your Kids’ Online Gaming Life

Let’s be honest – many of us parents aren’t big fans of gaming. In fact, some…

Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World

By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a…

To Secure Saas, Combine Top Compliance Frameworks with An SSPM

The explosion in the number and variety of SaaS apps used by enterprises has created both…

Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity

By Sydney Asensio, Head of Operations at 2020 Partners As a woman who has recently entered…