Cloud Security Resources Archived: 2026-04-05 15:45:24 UTC Filter by Content Types Blog posts Datasheets Events Infographics Insights Podcasts Security reports Technical guides Videos Webinars Whitepapers Topics BOD Insights CISO Insights Cloud Security Transformation Frontline Intelligence & Expertise Security & Identity Security Operations Threat Intelligence Featured filters Threat Intelligence Insights The latest curated blogs, reports, and insights from Mandiant Frontline Experts. Security Reports A collection of reports that address key challenges and findings around Threat Intelligence and Expertise, Security Operations, Cloud Security. Preparing for Threats to Come: Cybersecurity Forecast 2026 https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html Page 1 of 3 Nov 2025 Every November, we make it our mission to equip organizations with the knowledge needed to stay ahead of threats we anticipate in the coming year. Cloud CISO Perspectives: AI as a strategic imperative to manage risk Nov 2025 Welcome to the second Cloud CISO Perspectives for October 2025. PQC in plaintext: How we're helping customers prepare for a quantum-safe future Oct 2025 Google has been working on making computing quantum safe for almost a decade. Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring Oct 2025 The Criticality of Privileged Access in Today's Threat LandscapePrivileged access stands as the most critical pathway for adversaries seeking to compromise sensitive systems and data. Enabling a safe agentic web with reCAPTCHA Oct 2025 The emergence of the agentic web — an internet where autonomous AI agents can independently execute complex, multi-step tasks and transactions that previously required human interaction — promises a fundamental shift for how customers and businesses interact. A practical guide to Google Cloud's Parameter Manager Oct 2025 Every development team wants to build robust, secure, and scalable cloud applications, and that often means navigating complexity — especially when it comes to configuration management. Help Wanted: Vietnamese Actors Using Fake Job Posting Campaigns to Deliver Malware and Steal Credentials Oct 2025 Google Threat Intelligence Group (GTIG) is tracking a cluster of financially motivated threat actors operating from Vietnam that leverages fake job postings on legitimate platforms to target individuals in the digital advertising and marketing sectors. How Model Armor can help protect your AI apps from prompt injections and jailbreaks https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html Page 2 of 3 Oct 2025 As AI continues to rapidly develop, it’s crucial that IT teams address the business and organizational risks posed by two common threats: prompt injection and jailbreaking. Pro-Russia Information Operations Leverage Russian Drone Incursions into Polish Airspace Oct 2025 Google Threat Intelligence Group (GTIG) observed multiple instances of pro-Russia information operations (IO) actors promoting narratives related to the reported incursion of Russian drones into Polish airspace that occurred on Sept. 9-10, 2025. What’s new in Cloud Armor: Innovations to boost security posture, threat protection Oct 2025 In today's complex threat landscape, effectively managing network security is crucial — especially across diverse environments. To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER Oct 2025 COLDRIVER, a Russian state-sponsored threat group known for targeting high profile individuals in NGOs, policy advisors and dissidents, swiftly shifted operations after the May 2025 public disclosure of its LOSTKEYS malware, operationalizing new malware families five days later. New from Mandiant Academy: Protect your perimeter with practical network training Oct 2025 For too long, network data analysis has felt less like a science and more like deciphering cryptic clues. To help close that gap, we’re introducing a new Mandiant Academy course from Google Cloud, designed to replace frustration with clarity and confidence. Source: https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html Page 3 of 3