Hi Community,
We all know the feeling. A major zero-day hits the news, and immediately the questions start flying from leadership and regulators: "Are we impacted?" and "Are we prepared?"
Usually, answering these questions triggers a fire drill—pulling your best threat hunters and detection engineers off their day jobs to manually research, craft queries, and scan the environment.
In this new video, Nolan Karpinski, SecOps Product Manager, walks us through the launch of the Emerging Threat Center within Google SecOps. He explains how we are shifting from reactive scrambling to "Active Threat Intelligence" by leveraging Google’s scale and Mandiant’s frontline knowledge.
Watch the video to learn how to:
- End the Fire Drill: Automate the process of assessing high-profile campaigns (or "Matters of Interest") without disrupting your team's workflow.
- See What Instantly Matters: Utilize a dedicated feed of campaigns defined by Google Threat Intelligence (GTI) and filter them by your specific industry or region.
- Get Instant Answers: Use operational reports to instantly see impacted assets, retro-hunt IOCs back 365 days, and validate your current detection coverage.
- Look Under the Hood: See how we use synthetic data and Gemini to generate rules and test them against real-world attack behaviors before they even hit your environment.
We Want Your Feedback! We are actively collecting feedback to iterate on this feature before General Availability. Whether it’s positive or negative, we want to hear how this is working for you. Please drop a comment below or share your thoughts in the discussion!
