Security News > 2023 > August > Google Applies Generative AI Tools to Cloud Security

At its Google Next '23 event this week, Google revealed how - with the use of its PaLM 2 foundational model - it is applying the generative AI Duet AI to security solutions in Google Cloud, including posture management, threat intelligence and detection and network and data security.
Integrating Duet AI into Chronicle explicitly addresses security operations workload and tool proliferation, and implicitly the shortage of security operators in SOC teams, Potti explained.
Potti said that as part of its SOC team services, Google is also integrating Duet AI into its Security Command Center in order to provide visibility into customer vulnerabilities in Google Cloud and perform automated tasks.
"Through Duet AI and our Security Command Center, we are helping to summarize those attack paths so security teams can quickly understand what these paths are and recommended steps to remediate some of those issues. These are improvements that help reduce toil security teams face every day," he said.
According to Potti, in order to tune Duet AI for security functions, Google used its Vertex AI PaLM 2.
Potti said Google trained PaLM 2 on security data from its Mandiant threat intelligence unit to create a generative AI model it calls Sec-PaLM 2, which is designed to be optimized for supporting security work cases.
News URL
https://www.techrepublic.com/article/google-applies-generative-ai-tools-cloud-security/
Related news
- Watch Out For These 8 Cloud Security Shifts in 2025 (source)
- Google Chrome's AI-powered security feature rolls out to everyone (source)
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- How AI and ML are transforming digital banking security (source)
- Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool (source)
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)
- AI-driven insights transform security preparedness and recovery (source)
- AI security posture management will be needed before agentic AI takes hold (source)
- Top 8 Penetration Testing Tools to Enhance Your Security (source)