Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Finalizes Historic  Billion Wiz Acquisition

Google Finalizes Historic $32 Billion Wiz Acquisition

Posted on March 12, 2026 By CWS

Google has successfully completed its landmark $32 billion acquisition of Wiz, a prominent Israeli cloud and AI security firm. This transaction, now the largest in Google’s history, signifies a major development within the global cybersecurity landscape. The integration will see Wiz’s team become part of Google Cloud, maintaining its brand identity and continuing to serve clients across diverse cloud environments.

Regulatory Approval and Strategic Negotiations

This acquisition follows a rigorous regulatory journey and strategic negotiations spanning over a year. Google’s initial bid for Wiz in 2024, amounting to $23 billion, was declined by Wiz’s CEO Assaf Rappaport, who envisioned a higher growth trajectory for the company. Renewed discussions in 2025 led to a formal agreement by March of the same year.

The transaction received necessary approvals from key regulatory bodies, including the U.S. Department of Justice, by October 2025, and subsequently from the European Union, Australia, Singapore, and Japan in early 2026. This $32 billion deal eclipses Google’s previous acquisition record set by its $12.5 billion purchase of Motorola Mobility in 2012.

The Significance of Wiz in Cloud Security

Prior to the acquisition, Wiz had already secured a strong foothold in the cloud security sector, achieving over $1 billion in annual recurring revenue in 2025 and projecting a 40% growth rate for 2026. Its clientele includes half of the Fortune 100 companies, highlighting its industry impact.

Wiz’s platform excels in integrating code, cloud, and runtime into a unified security framework, enabling businesses to oversee application development and operations across complex multicloud settings. This acquisition is Google’s strategic response to the evolving cybersecurity landscape, heavily influenced by AI advancements and multicloud complexities.

Integration and Future Prospects

With this acquisition, Google Cloud and Wiz are set to offer a comprehensive AI-driven cybersecurity platform. This integration combines Google’s threat intelligence and security operations expertise with Wiz’s robust cloud-native security capabilities. Customers will benefit from a unified security solution covering development to runtime, enhanced by Google’s Mandiant Consulting and Gemini AI model for advanced threat detection and management.

Despite joining Google Cloud, Wiz will continue to operate as a multicloud security platform, supporting Amazon Web Services, Microsoft Azure, and Oracle Cloud. Google remains committed to maintaining Wiz’s services across competitive cloud platforms, aiming to foster enterprise trust and broaden the market for cloud security services.

This move establishes Google as a formidable player in the cloud and AI security domains, offering enterprises a powerful, integrated defense mechanism against the increasing frequency and complexity of cyber threats.

Cyber Security News Tags:Acquisition, AI, business news, cloud security, Cybersecurity, enterprise security, Fortune 100, Gemini AI, Google, Google Cloud, Mandiant, MultiCloud, Technology, Wiz

Post navigation

Previous Post: Enhancing Vulnerability Management in the AI-Driven Era
Next Post: CISA Warns of Active n8n Vulnerability Exploitation

Related Posts

HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News
7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain Cyber Security News
Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News