Alphabet hatches cybersecurity company Chronicle using Google technology

Cloud attack could be more costly than major natural disaster
Alphabet has hatched an independent cybersecurity company from its X unit called Chronicle. The company is in the early stages of developing a cybersecurity intelligence and analytics platform using techniques used at Google.
The details about Chronicle's underlying technology for its cybersecurity platform are unclear. On Chronicle's site, the company talks in broad strokes that the technology is built on speed and scale, machine learning and services not servers.
Chronicle was hatched two years ago and enhanced by the 2012 acquisition of VirusTotal, a malware intelligence service.
Ransomware: An executive guide to one of the biggest menaces on the web | This giant cyberwar game pits defenders against malware, hybrid and mobile attacks | TechRepublic: Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse | Tech Pro: Cybersecurity in 2018: A roundup of predictions
Can Chronicle do well? Possibly. The cybersecurity space is littered with vendors so it's a crowded space. Then again, Chronicle can ultimately be bundled with Google Cloud Platform and have distribution to enterprises easily.
In a blog post, Chronicle noted that it's independent, but part of Alphabet. Stephen Gillett, Chronicle CEO, said:
We'll have our own contracts and data policies with our customers, while at the same time having the benefit of being able to consult the world-class experts in machine learning and cloud computing (among many other topics) that reside in other parts of Alphabet.
Chronicle is built on the idea that "cybersecurity needs a moonshot," but enterprise technology buyers are likely to want to hear more. Nevertheless, there are large companies that'll be kicking the tires. In Chronicle's FAQ, the company noted:
The team is in the initial phases of testing a preview release with some Fortune 500 companies so it's still a little early to share details.
- Encryption: In the battle between maths and politics there is only one winner
- Expanded state hacking powers make a stealthy return to German agenda
- Ransomware attack: How a nuisance became a global threat
- Ransomware attack: The clean-up continues after WannaCry chaos
- Congress introduces bill to stop US from stockpiling cyber-weapons
- Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you
- Research: Companies see mobile devices as big cybersecurity threat
- Governments and nation states are now officially training for cyberwarfare: An inside look
- Video: The impending cybersecurity disaster of industrial control systems
- Devastating attacks to public infrastructure 'a matter of when' in the US
- Understanding the military buildup of offensive cyberweapons
- Video: The Internet of Insecure Things, and why we're still in denial
- Cybercrime Inc: How hacking gangs are modeling themselves on big business
- Why ransomware is exploding, and how your company can protect itself
- How the Dark Web works