Showing only posts by Joakim Nydrén. Show all posts.

How to safeguard your SSH environment with Identity-Aware Proxy and Security Command Center

Source

Identifying and securing internet-facing resources is an essential part of cloud security risk management. Google Cloud offers tools to help you understand risks and add strong access controls to your organization and projects where they are needed. These tools and controls can help mitigate the risks such as the …

A better way to stay ahead of attacks: Security Command Center adds attack path simulation

Source

To help secure increasingly complex and dynamic cloud environments, many security teams are turning to attack path analysis tools. These tools can enable them to better prioritize security findings and discover pathways that adversaries can exploit to access and compromise cloud assets such as virtual machines, databases, and storage …