Cybersecurity

Google’s hackers: Inside the cybersecurity red team

By acting like hackers, Google’s red team helps to keep the company safe from cyber threats. Here’s how.

Google is one of the biggest technology and software companies in the world, with over 150,000 employees and billions of users – and that status means it’s a high-profile target for cyberattacks.

Google knows it is a target – and has a team of security experts who are tasked with conducting their own attempts to break in, with the aim of helping to secure the company and its users from the latest cyber threats that might come from malicious hackers.

« The team essentially has the mission to make Google safer and more secure for our users, for Google itself and our infrastructure – and we do that by simulating threats and attacks that Google is actually exposed to, » says Stefan Friedli, red team tech lead and manager at Google.

The term ‘red team‘ originated in the military, where a designated team would take on the role of adversaries in a scenario designed to test how the defenders react. The term has found its way into the information security world and represents an authorized team using offensive hacking techniques to test the defences of a ‘blue team’ – the cybersecurity defenders.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

4 jours ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

5 jours ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

1 semaine ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

1 semaine ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

1 semaine ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.