没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
Every day you’re safer
with Google
Visit g.co/safety/cyber
Advancing future technologies
We want to protect societies from the next generation of
cybehreats. Building on our AI expeise, we are designing the next
wave of architectures to push the boundaries of security innovation.
Empowering society to address
evolving cybersecurity risks
We empower societies to unlock the potential of open source,
and share our knowledge and expeise transparently with the
industry to keep ecosystems safer.
Protecting people, businesses
and governments
Security is the cornerstone of our product strategy.
Which is why all our products have built-in
protections that make them secure by default.
In an age of ever-expanding technological reach, trust in technology
is key to unlocking society’s true potential.
As we put our security knowledge into practice, we will continue to
paner with people, businesses, and governments to protect their
safety and drive a new era in cybersecurity.
202
Passkey: The
Passwordless Future
We
'
ve been se
ing the stage for a
passwordless future for over a decade. We
j
oined the
F
I
DO
Alliance in 20
13
to drive
open standards for a passwordless world
and now by expanding our suppo for
F
I
DO
Sign-in standards to Android
&
C
hrome
through passkey technology in 202
3
, we will
nally have the pla
orm for a truly
passwordless future.
202
Protected
C
omputing
We announced
P
rotected
C
omputing, a
growing toolkit of technologies that
transforms how, when, and where data is
processed to technically ensure user’s
privacy and safety. We do this by minimi
z
ing
the data footprint, de-identifying data, and
restricting access to sensitive data.
T
his
means Android can suggest the next phrase
in the text, while keeping the conversation
completely private.
2022
Post
-Q
uantum
C
ryptography
S
tandardi
z
ation
F
uture focused, we continue to develop
next-generation cryptographic systems that
safeguard against the breaking of public-key
cryptosystems and compromising digital
communications.
T
he
N
ational Institute of
Standards and
T
echnology selected a
submission with
G
oogle’s involvement
(
S
PH
I
NC
S
+)
for standardi
z
ation.
202
M
andiant and
Google
C
loud
M
andiant brings real-time, in-depth threat
intelligence gained on the frontlines of
cybersecurity with the largest organi
z
ations
in the world.
C
ombined with
G
oogle
C
loud’s
cloud-native security o
erings, we help
enterprises and public sector agencies stay
protected throughout the security lifecycle.
202
C
on
dential
C
omputing
F
or critical security, safety, and privacy, we
introduced
G
oogle
C
loud
C
on
dential
C
omputing, a breakthrough technology that
keeps data encrypted while it is being
processed, allowing it to stay secure
throughout its entire life cycle, including
while at rest or in transit.
N
ow even the most
sensitive data can con
dently be migrated to
the cloud.
202
Google Open Source
Security Team (GOSST)
GO
SS
T
was created to improve the security
of the open source so
ware the world
relies on. We panered with the
O
pen
Source Security
F
oundation
(O
penSS
F)
to
develop and release Supply-
C
hain
L
evels
for So
ware Aifacts
(
S
L
SA
)
, a framework
to secure the so
ware supply chain and
enable long-term security for the entire
so
ware ecosystem.
$100
M
illion commi
ed to third pay
open source security operations to help
x vulnerabilities
202
I
nvestment to Advance
C
ybersecurit
We’re commi
ed to strengthening
cybersecurity, expanding
z
ero-trust
programs, helping secure the so
ware
supply chain, and enhancing open-source
security. We pledged to train
1
00,000
Americans in
elds like I
T
Suppo and
D
ata
Analytics through the
G
oogle
C
areer
C
ei
cate program.
$10
B
illion commitment to
cybersecurity initiatives
20
1
C
hronicle
Built as a speciali
z
ed layer on top of our core
infrastructure,
C
hronicle was introduced to
provide cloud-based security designed for
enterprises to privately retain, analy
z
e, and
search massive amounts of security and
network data.
20
1
Passwordless
R
e
-
Authentication
E
xtended our
F
I
DO
suppo in Android so users
could seamlessly log on to websites with
j
ust a
P
I
N
or biometric, no password needed.
20
1
Titan
S
ecurity
K
ey
We made the
T
itan Security
K
ey for users who
want an end-to-end
G
oogle solution.
T
he keys
are
F
I
DO
compliant and can be used elsewhere
too, not
j
ust with
G
oogle.
100
+
B
illion apps
scanned for malware daily
20
1
Google Play Protect
T
he most widely deployed mobile threat
protection service in the world, constantly
adapting and improving with
G
oogle’s
machine learning,
G
oogle
P
lay
P
rotect
automatically scans apps for malware and
encrypts user payments on Android phones.
1
5
0
M
illion user
payments encrypted daily
encrypted
20
1
7
Advanced Protection
Program
(
APP
)
E
xtra secure protections, including Security
K
ey, for high-visibility and high-risk users such
as
j
ournalists and government o
cials.
3
00
+
federal campaigns protected
protected
20
1
4
Pro
j
ect
Z
ero
A speciali
z
ed task force devoted to hunting
z
ero day exploits across the internet - in
so
ware, hardware,
G
oogle products, and
beyond to ensure a safe and open Internet.
T
hey were the
rst to detail
“
M
eltdown
”
and
“
Specter,
”
enabling developers to
q
uickly
address
CP
U
vulnerabilities and apply
mitigations across the so
ware supply chain.
20
1
Pro
j
ect
S
hield
P
ro
j
ect Shield has helped protect news, human
rights organi
z
ations, election sites, political
organi
z
ations, and campaigns from
D
istributed
D
enial of Service
(DD
oS
)
a
acks in over
1
00
countries from cyber a
acks by identifying
threats and enabling responses in the security
community and law enforcement.
1
5
0
+
websites currently
protected in
U
kraine
protected
20
1
2
-S
tep
V
eri
cation
We were one of the
rst to o
er 2-Step
Veri
cation
(
2SV
)
by default, and the
rst to
auto-enable 2SV for over
1
5
0 million people
in 202
1
, providing a safe and easy way to log
in.
E
ven if your password is stolen, your
account is protected.
5
0
%
decrease in compromised
accounts since 2SV
20
1
The
R
ed Team
L
aunched to take on an adversarial mindset
and hack
G
oogle to help strengthen our
defenses and spot gaps.
T
hey work across
the globe to keep up with current threats,
improve security controls, conduct a
ack
detection/prevention, and eliminate entire
classes of vulnerabilities by driving new and
be
er frameworks.
20
1
Google
B
ug
H
unters
O
ur Vulnerability
R
ewards program a
racts
high schoolers, lawyers, I
T
professionals, and
hobbyists to hunt down bugs in
G
oogle
products with cash pri
z
es.
T
heir motives vary,
but their mission is the same
:
nd
undiscovered vulnerabilities to keep online
services safe and secure.
M
illions of dollars paid out in rewards since 20
1
0
20
1
Z
ero Trust
A
er surviving
O
peration Aurora, a
coordinated series of , we
revolutioni
z
ed our approach to build a
secure-by-default architecture now known
as
“
Z
ero
T
rust
”
. It ensures fewer a
ack
vectors, fewer oppounities to lose data,
and more control over the systems users
depend on. We suppo the White
H
ouse’s
e
os to deploy the
Z
ero
T
rust model across
the federal government and have also
packaged it into Beyond
C
orp
E
nterprise so
that any enterprise can leverage it.
cyber a
acks
20
1
Threat Analysis Group
(
TAG
)
A
er
O
peration Aurora, we formed a
speciali
z
ed team of expes for
detecting, analy
z
ing, and disrupting
government-backed and serious criminal
cyber threats.
T
A
G
traced Wanna
C
ry, the
largest ransomware a
ack in history, to
N
oh
K
orea, and recently shared of the
hack-for-hire ecosystems from India,
R
ussia,
and the
U
nited Arab
E
mirates.
responsible
examples
200
Google Password
M
anager
T
he introduction of
P
assword
M
anager made
signing-in easier and safer, without the need
to remember or type in your password and is
now used for
5
0
%
of all logins in
C
hrome
across pla
orms.
1
B
illion
passwords checked
daily for breaches
checked
200
re
C
APT
C
H
A
We ac
q
uired the fraud and bot management
solution to stop credential stu
ng and
account takeovers, and to prevent abusive
activities from malicious so
ware/fake users.
5
M
illion
websites defended
defended
200
S
afe
B
rowsing
We help proactively protect devices around
the world by aleing users when they visit
dangerous websites, evolving these online
protections into
in 2020.
E
nhanced Safe browsing
5
B
illion
devices
by Safe Browsingprotected
protected
200
Gmail
S
pam Protection
We were one of the
rst to build
AI-driven email protections.
99.9
%
of dangerous
and suspicious emails are
b l o c k e d by
G
mail
blocked
C
ontinuously innovating
through the ages
Since the launch of
G
mail in 200
4
to the introduction of
P
rotected
C
omputing in 2022,
G
oogle has been pioneering cybersecurity technology
and continually innovating on products, pla
orms, and panerships to
eliminate entire classes of threats to create a safer future for people,
organi
z
ations and societies by
:
As people
'
s needs and the internet evolve, we continue to be at the
forefront of new technologies to mitigate ever-changing cybehreats,
ensuring that every day is safer with
G
oogle.
D
eveloping secure
products and pla
orms
F
ostering program
and panership
Building agile
Security
T
eam
P
roviding critical funding for
innovation and workforce training
W
e keep more people safe
online than anyone else in the world
With the dramatic rise of state-sponsored cyber a
acks and
malicious actors online, we believe our products and services are
only as helpful as they are secure.
At
G
oogle, we are more focused than ever on people,
organi
z
ations and governments by sharing our expeise,
the society to address ever-evolving cyber risks and
continuously working to the state of the a in
cybersecurity to build a .
protecting
empowering
advance
safer world for everyone
safe
O
ur cybersecurity
j
ourney
through the years
资源评论
2401_86195623
- 粉丝: 0
- 资源: 12
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功