You say you are ready for AI, but are you, really?

You say you are ready for AI, but are you, really?

In the past few years, more customers from diverse verticals are developing interest in understanding how Artificial Intelligence and Machine Learning( AI/ML) can be leveraged to influence their business outcomes. If you’re new to this world and have a problem you think the AI magic blackbox can solve, a little understanding of how machine learning

You say you are ready for AI, but are you, really? Read More »

Asset-Key-Thief-Disclosure-eblog_social-promo_blog_1600x900

Google Cloud security vulnerability: Asset Key Thief technical details

Asset Key Thief is a recently patched Google Cloud privilege escalation vulnerability that enabled Google Cloud principals with the Cloud Asset Viewer role (or other roles with the `cloudasset.assets.searchAllResources` permission) on the Cloud Asset Inventory API at the Project, Folder, or Organization level to view and exfiltrate any user-managed Google Cloud Service Account private key

Google Cloud security vulnerability: Asset Key Thief technical details Read More »

Engineering Blog: Data warehouse, data lake, delta lakes, and multicloud data

Data warehouse, data lake, delta lakes, and multicloud data with Google Cloud’s BigLake

Learn about BigLake, a storage engine (built on years of investments in the BigQuery platform) that promises to unify data lakes and data warehouses by providing fine-grained access controls across multi-cloud storages such as Google Cloud Storage, Amazon S3, and Azure Data Lake Storage (ADLS) gen 2 in open file formats such as AVRO, ORC,

Data warehouse, data lake, delta lakes, and multicloud data with Google Cloud’s BigLake Read More »

Engineering Blog: Cloud DLP as an essential security tool

Cloud DLP as an essential security tool

Data is the world’s biggest commodity, bigger than oil. Protecting data from attackers and bad actors is one of the most critical functions of any security ecosystem. If your data contains sensitive and personally identifiable information (PII) or adheres to regulatory compliance standards like Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation

Cloud DLP as an essential security tool Read More »

Scroll to Top