back to article If you're wondering why Google blew $5b on Mandiant, this may shed some light

Mandiant, now officially owned by Google, has the scale (not to mention the deep pockets) to be the "brain" across organizations' myriad security products and automate protection on top of these controls, according to the security shop's CEO Kevin Mandia. Mandia spoke with reporters for the first time about his threat-intel- …

  1. amanfromMars 1 Silver badge

    And Then There Were Two ... with One an Egg, the Other ITs Chicken.

    That all sounds very much like and too much like AWEsome AIdDevelopments in Live Operational Virtual Environments with Learned Machine Programs for Virtually Advanced IntelAIgent Operating Systems Mentoring and Monitoring FailSafe Progressive Projects ...... Creative Constructive Event Instances and 0Day Vulnerability Exploit Escapades ..... to be considered anything a great deal different, and thus does Google Mandiant have ...... well, if not exactly Opposition, then certainly a Stealthy NEUKlearer HyperRadioProACTive IT Competitor attuned to their corporate wiles and au fait with their Modi Operandi et Vivendi.

    That is sure to be interesting and bound to be healthy if not into exploring or flirting with evil.

  2. anonymous boring coward Silver badge

    "be that brain"

    When was it supposed to become self aware, now again? Must be pretty soon...

  3. Anonymous Coward
    Anonymous Coward

    A googol is the large number 10^100

    It currently verifies the security of about 250 curated packages across Java and Python

    250 is a negligible fraction of 1% of the number of packages across Java and Python posing a security threat in industry.

    Oh, but it's important as proof of concept and now just needs to be scaled up?

    But if it takes $5 billion for proof of concept, how much will it cost to perpetually verify the security of 250K+ constantly changing packages?

  4. Kamal Hashmi

    Secure process memory?

    VME had an option which wiped or scrambled memory after a secure VM used it. Also there were built-in guards against any out of VM access.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like