Showing only posts by Seth Rosenblatt. Show all posts.

Best Kept Security Secrets: How VPC Service Controls can help build defense in depth

Source

While cloud security skeptics might believe that data in the cloud is just one access configuration mistake away from a breach, the reality is that a well-designed set of defense in depth controls can help minimize the risk of configuration mistakes and other security issues. Our Virtual Private Cloud …

Best kept security secrets: How Cloud EKM can help resolve the cloud trust paradox

Source

Whether driven by government policy, industry regulation, or geo-political considerations, the evolution of cloud computing has led organizations to want even more control over their data and more transparency from their cloud services. At Google Cloud, one of the best tools for achieving that level of control and transparency …

Best Kept Security Secrets: Tap into the power of Organization Policy Service

Source

The canvas of cloud resources is vast, ready for an ambitious organization to craft their digital masterpiece (or perhaps just their business.) Yet before the first brush of paint is applied, a painter in the cloud needs to think about their frame: What shape should it take, what material …

How a Vulnerability Exploitability eXchange can help healthcare prioritize cybersecurity risk

Source

Diagnosing and treating chronic pain can be complex, difficult, and full of uncertainties for a patient and their treating physician. Depending on the condition of the patient and the knowledge of the physician, making the correct diagnosis takes time, and experimenting with different treatments might be required. This trial-and-error …

How SLSA and SBOM can help healthcare's cybersecurity resiliency

Source

Taking prescription medication at the direction of anyone other than a trained physician is very risky—and the same could be said for selecting technology used to run a hospital, to manage a drug manufacturing facility and, increasingly, to treat a patient for a medical condition. To pick the …

The key role ‘visibility’ plays in healthcare’s cybersecurity resilience

Source

When technology just works, it's easy to trust. But too often, we place our trust in technology that doesn’t deserve it. When we do this with technology to provide healthcare, we put the safety of patients and the security and reliability of our global healthcare system at risk …

How healthcare can strengthen its own cybersecurity resilience

Source

With all the crises that have buffeted the healthcare and life sciences industries the past two years, one that often gets overlooked is the unceasing wave of cyberattacks aimed at medical, research, educational, and public health organizations. These attacks have shut down critical systems, attempted to steal vaccines and …

Illicit coin mining, ransomware, APTs target cloud users in first Google Cybersecurity Action Team Threat Horizons report

Source

At Google we have an immense aperture into the global cybersecurity threat landscape and the means to mitigate risks that stem from those threats. With our recently launched Google Cybersecurity Action Team, we are bringing more of our security abilities and advisory services to our customers to increase their …