Posted by Jan Keller, Technical Entertainment Manager, Bug Hunters Are you ready to put your hacking…
Mes: agosto 2022
SBOM in Action: finding vulnerabilities with a Software Bill of Materials
Posted by Brandon Lum and Oliver Chang, Google Open Source Security Team The past year has…
Announcing the winners of the 2021 GCP VRP Prize
Posted by Harshvardhan Sharma, Information Security Engineer, Google 2021 was another record-breaking year for our Vulnerability Rewards…
Retrofitting Temporal Memory Safety on C++
Posted by Anton Bikineev, Michael Lippautz and Hannes Payer, Chrome security team Memory safety in Chrome…
Privileged pod escalations in Kubernetes and GKE
Posted by GKE and Anthos Platform Security Teams At the KubeCon EU 2022 conference in Valencia,…
How Hash-Based Safe Browsing Works in Google Chrome
By Rohit Bhatia, Mollie Bates, Google Chrome Security There are various threats a user faces when…
How To Get Your Head Around Your Kids’ Online Gaming Life
Let’s be honest – many of us parents aren’t big fans of gaming. In fact, some…
Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World
By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a…
To Secure Saas, Combine Top Compliance Frameworks with An SSPM
The explosion in the number and variety of SaaS apps used by enterprises has created both…
Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity
By Sydney Asensio, Head of Operations at 2020 Partners As a woman who has recently entered…