Published inGoogle Cloud - CommunityDeploying a GenAI app with PythonToday we’re going from zero to one: we will walk through creating a web-app to call Generative AI APIs and have a chat with Gemini. We’ll…Aug 30Aug 30
How do security researchers get hacked?Insight into a state-sponsored hacking group and how it tries to compromise professional researchersFeb 1, 2021Feb 1, 2021
Published inGoogle Cloud - CommunityFaster onboarding in a fully remote worldHiring new people during a global pandemic isn’t usually covered in your standard HR or IT handbooks.Nov 19, 2020Nov 19, 2020
Published inGoogle Cloud - CommunityBuilding AI Talent to accelerate your businessWhat’s a horizontal AI team, and why do I need one at my business?Oct 22, 2020Oct 22, 2020
Published inGoogle Cloud - CommunityImproving marketplace integrations with PandiumScaling multi-tenant architecture with KubernetesApr 1, 2020Apr 1, 2020
Shifting to Context-Aware Access over timePerimeter security is dangerous, and should be abandoned. Companies see this, and yet struggle to move to context-aware access.Mar 15, 2019Mar 15, 2019
Published inGoogle Cloud - CommunityMoving your identity to the cloudWhy move your identity from the safety of local AD or LDAP? You can get all kinds of benefits from the cloud, including…Feb 5, 2019Feb 5, 2019
Published inGoogle Cloud - CommunityHow to get Cloud Identity-Aware Proxy up and runningYou wouldn’t let a passenger on a plane without first inspecting who they are and what they’re carrying, and you should…Jan 29, 20191Jan 29, 20191
Published inGoogle Cloud - CommunitySecure your devices, and theirs: BYOD and device managementTo make good decisions about access, you need to gather data about all the devices your employees will use.Jan 23, 20191Jan 23, 20191
Published inGoogle Cloud - CommunityWhat is BeyondCorp? What is Identity-Aware Proxy?Your company holds very sensitive data: about your clients, your business, your employees. Your employees need to use a variety of…Jan 16, 20192Jan 16, 20192