Welcoming Wiz to Google Cloud: Redefining security for the AI era

Source

Google’s security-first mindset comes from more than two decades of building some of the largest and most secure computing systems in the world. As software and AI permeate more industries, and business innovation increasingly centers on the adoption of AI and cloud computing technology, securing your organizations from …

Microsoft Patch Tuesday, March 2026 Edition

Source

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing “zero-day” flaws this month (compared to February’s five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows …

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications

Source

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located within the European Union (EU), and physically and logically separate from all other AWS Regions. The unique approach of the AWS European Sovereign Cloud provides the only …

Security is a team sport: AWS at RSAC 2026 Conference

Source

The RSAC 2026 Conference brings together thousands of professionals, practitioners, vendors, and associations to discuss issues covering the entire spectrum of cybersecurity—a place where innovation meets collaboration and the industry’s brightest minds converge to shape its future. This March, Amazon Web Services (AWS) returns to the annual …

Cloud CISO Perspectives: New Threat Horizons report highlights current cloud threats

Source

Welcome to the first Cloud CISO Perspectives for March 2026. Today, Bob Mechler and Crystal Lister, from Google Cloud’s Office of the CISO, share cloud threat intelligence and analysis from our new Cloud Threat Horizons Report. As with all Cloud CISO Perspectives, the contents of this newsletter are …

AWS Security Hub is expanding to unify security operations across multicloud environments

Source

After talking with many customers, one thing is clear: the security challenge has not gotten easier. Enterprises today operate across a complex mix of environments, including on-premises infrastructure, private data centers, and multiple clouds, often with tools that were never designed to work together. The result is enterprise security …

Google named a Leader in IDC MarketScape: U.S. State and Local Government Professional Security Services 2025–2026 Vendor Assessment

Source

In today’s cyber threat landscape, U.S. state and local governments find themselves under continuous attack, with bad actors leveraging AI to act with greater speed and sophistication. The need to secure mission-critical workloads has never been greater. In light of these challenges, we are proud that Google …

New Attack Against Wi-Fi

Source

It’s called AirSnitch : Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the …

How AI Assistants are Moving the Security Goalposts

Source

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive …

« newer articles | page 2 | older articles »