PR Newswire October 16, 2019
BlackBerry Cylance Announces Integration with Chronicle's Backstory

Together, this integration will help security administrators quickly identify and respond to threats detected in their organization's environment by recognizing patterns in threat data and user activity over time.

CTA Created with Sketch.
Jon Markman, Forbes September 29, 2019
New Cybersecurity Companies Have Their Heads In The Cloud

Chronicle, a Google Cloud cybersecurity business, launched Backstory in March. The cloud service is a lot like Google Photos. Enterprises and organizations dump their data into silos. Then the system structures everything, stores the data in the cloud and compares it to a continuous stream of threats.

CTA Created with Sketch.
Rob Wright, TechTarget September 5, 2019
Chronicle: Crimeware group takedowns 'increasingly ineffectual'

New research from Chronicle shows that as crimeware has grown over the last five years, law enforcement efforts have become increasingly ineffective -- and in some cases have produced unintended consequences.

CTA Created with Sketch.
Alex Coop, Channel Daily News August 28, 2019
Chronicle, Google search for your security data, is coming to Canada through Herjavec Group

Herjavec Group is adding a pair of Google security intelligence products its managed security services portfolio, the cybersecurity firm announced…

CTA Created with Sketch.
Michael Novinson, CRN August 06, 2019
20 Hot New Cybersecurity Products Unleashed At Black Hat Las Vegas 2019

The Tanium-Chronicle Backstory integration empowers customers to use Tanium Threat Response to proactively stream enterprisewide telemetry data directly from endpoints to the Backstory platform.

CTA Created with Sketch.
Brandon Levene, Dark Reading July 31, 2019
The Attribution Trap: A Waste of Precious Time & Money

Aiming for attribution doesn't help most organizations become more secure. It can actually have the opposite effect.

CTA Created with Sketch.
Catalin Cimpanu, ZDNET July 2, 2019
US Cyber Command issues alert about hackers exploiting Outlook vulnerability

Chronicle links the malware samples to Iran's APT33 group, which previously developed the infamous Shamoon malware.

CTA Created with Sketch.
Attackers are Signing Malware with Valid Certificates

Thousands of malware samples uploaded to VirusTotal have been signed with a valid certificates from well-known certificate authorities, said researchers from Chronicle.

CTA Created with Sketch.
Siemens, Alphabet's Chronicle forge cybersecurity partnership

Under the pact, Siemens will use Chronicle's Backstory platform to provide security visibility across information and operational technology. Chronicle's platform will be combined with Siemens' cybersecurity tools for the energy industry.

CTA Created with Sketch.
Security researchers discover Linux version of Winnti malware

Discovered by security researchers from Chronicle, Alphabet's cyber-security division, the Linux version of the Winnti malware works as a backdoor on infected hosts, granting attackers access to compromised systems.

CTA Created with Sketch.
A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree

In those cases and others, the hackers could easily have unleashed unprecedented mayhem, says Silas Cutler, a researcher at Alphabet-owned security startup Chronicle who has tracked the Barium hackers.

CTA Created with Sketch.
Leak Reveals Iran’s Wildest Hacker Crew Stole 13,000 Passwords From 98 Organizations

Shortly after the leak, researchers from Chronicle, a cybersecurity startup founded by Google owner Alphabet, went through the trove of data.  It found a small handful of targets were based outside the Middle East, …..

CTA Created with Sketch.
Researchers Uncover New Version of the Infamous Flame Malware

But now researchers at Alphabet’s Chronicle Security say they have discovered what appears to be a new version of Flame that popped up in 2014 and likely remained active until 2016.

CTA Created with Sketch.
Paul Roberts, SecurityLedger March 6, 2019
For Customers, Backstory’s Lure is Data, Economics

That’s where Siemens sees Chronicle’s Backstory – leveraging Google’s infrastructure – playing a role. “What company in the world is best positioned to apply AI and machine learning to ingest these different data streams, tag them, mix them, and begin to identify patterns,” he asked.

CTA Created with Sketch.
Maria Korlov, Data Center Knowledge March 6, 2019
Can Alphabet's Chronicle Become the Next Big Cybersecurity Vendor?

The company spelled out the competitive market it's intending to take on, which includes the entire on-premises data security market, such as SIEMs, Hadoop, and Elasticsearch, as well as security for all the related infrastructure, including servers, networking, and storage. "We really compete with doing security intelligence on your own to try to stop cyber attacks," Alphabet said.

CTA Created with Sketch.
Kevin Kelleher, Fortune March 5th, 2019
Alphabet's Cybersecurity Division Unveils Its First Product, a Real-Time Security Management Service

Backstory relies on Google’s vast infrastructure, machine learning and data analytics tools to simplify the task at lower cost, helping companies to more easily filter out the signal of imminent security threats from the noise of false alarms that accompany them.

CTA Created with Sketch.
Lily Hay Newman, Wired March 4, 2019
An Alphabet Moonshot Wants to Store the Security Industry’s Data

For example, an organization that missed a breach on its network initially will be able to use Backstory to find the origins of the incident and track what played out as a result. Crucially, Backstory customers will also benefit from the discoveries Chronicle makes by looking for patterns and anomalies in the combined data set of all its clients.

CTA Created with Sketch.
Kate Fazzini, CNBC March 4, 2019
Alphabet launches its first commercial security product from Chronicle, a spin-out of X

...Backstory gives security analysts the ability to parse potential threats from the avalanche of alerts, helping them more quickly pinpoint the real vulnerabilities. In a crowded U.S. market for cybersecurity vendors, there are few existing ways for security teams to knit all of the data from their different products in a unified system.

CTA Created with Sketch.
Robert McMillan January 23, 2019
Inside Google’s Team Fighting to Keep Your Data Safe From Hackers

...a database of attack code called VirusTotal managed by another arm of Google-parent Alphabet Inc.

CTA Created with Sketch.
Nick Summers November 30, 2018
Inside Chronicle, Alphabet’s cybersecurity moonshot

What exactly had Chronicle built, and why did it need the moonshot treatment to exist?

CTA Created with Sketch.
Kate Fazzini August 23, 2018
One of Google's newest sister companies is almost ready to go after the $96 billion cybersecurity industry on a 'planet scale'

"We can work with an average security team and turn them into a great security team..."

CTA Created with Sketch.
Members of the media can contact our team at
Media Kit
Download a zip file here.
Get in touch
The path to stronger, more affordable cybersecurity starts here. Contact us to request a demo, ask questions, or just say hi.
CTA_Arrow_WHITE Created with Sketch.