Transcript
A (0:02)
You know, so we see. I focus a lot on sort of the Russian language marketplaces and the English language ones. But there's obviously this, it's a global problem. A lot of players around the world, they tend to gravitate towards different platforms. So for example, the Russian and English ones sort of like the classic bulletin boards and now Telegram increasingly, whereas Latin American ones will use other social media platforms to communicate. It's a dedicated website, but the hacktivist of space as well. Right, you mentioned that as well. Telegram's very popular, sort of an English language world, Russian language world, and also South Asia, whereas Twitter is really popular in Latin America.
B (0:50)
Welcome to another episode of Mannion's Defenders Advantage podcast. I am your host, Luke McNamara. I have the privilege today being joined by two of our guests, one who's returning, Jose Nazario, senior principal within Google Threat Intelligence Group. And Brandon, I think this is your first time on the podcast. Brandon Wood, product manager for Google Threat Intel. Great to have both of you here on this Friday.
C (1:15)
Yeah, likewise. Really honored to be here.
B (1:18)
So we're going to talk about some new capabilities that are rolling out within Google Threat Intelligence and then also talk about some of the use cases, some of the reasoning as to why some of the problems that we're trying to address in rolling these capabilities out. Maybe. Brandon, we'll start with you. What is this new set of features that is going to be available as of the time of this podcast going live in gti and what was sort of the market need that we saw that we wanted to address with these?
C (1:46)
Yeah, that's a great question, Luke. And you know, I've been focused on this problem for the last decade. And before I got to Google, I came with you guys as part of the Mandiant acquisition. I focused on tools that were largely related to creating Dark web monitors and trying to create alerts for customers based on conversations about them on the dark web. And what we saw comparing our tooling with most of the competitive landscape is that we all kind of handle this problem the same way. We create monitors largely based on regex, maybe have some machine learning classification, and then as a threat actor says something on the underground, we create an alert for it. Unfortunately, with this approach over the last decade, it creates a ton of noise for Threat intel teams and SOC teams. Right. And we see the adversary be very mindful of on being aware of the tools that we use to do this type of collection in the underground. And what's new with the capability that we've brought is that we actually Use Gemini to process everything that we see from the underground and personalize the intelligence that we've seen. And being able to do this at Google with Gemini, we've been able to get the system up to overwhelming performance. You know, we process every single one of the posts we collect from the dark web, tens of millions of events a day. We process every single one of those posts using Gemini. And then rather than using key terms and having the customer have to load all this context into the system like you do with existing monitors, we actually again use Gemini to go out and create a profile of the customer to get them started and create personalized intelligence for them. And again, using Gemini to make each of the alerts very relevant for them. So, you know, we're using Gemini on the front end at ingestion, really focused in on the, you know, the threats that really matter to organizations. We're using Gemini again to do the matching and then Gemini again to do the personalization. So, you know, I think the big thing for us and this team is leading with an AI capability that really takes what's been a really hard and pernicious problem for threat intelligence teams and flipping the false positive problem with these tools on its head to just be a very clean source of signal and really get after the adversary and changes we're seeing in the threat landscape.
