Showing only posts in GCP Security. Show all posts.

Simplify your Cloud Run security with Identity Aware Proxy (IAP)

Source

Cloud Run provides a powerful and scalable platform for deploying applications. Today, we’re introducing the general availability of two major enhancements to Cloud Run security: direct Identity-Aware Proxy (IAP) integration, and a way to allow public access to Cloud Run services that is compatible with Domain Restricted Sharing …

Welcoming Wiz to Google Cloud: Redefining security for the AI era

Source

Google’s security-first mindset comes from more than two decades of building some of the largest and most secure computing systems in the world. As software and AI permeate more industries, and business innovation increasingly centers on the adoption of AI and cloud computing technology, securing your organizations from …

Cloud CISO Perspectives: New Threat Horizons report highlights current cloud threats

Source

Welcome to the first Cloud CISO Perspectives for March 2026. Today, Bob Mechler and Crystal Lister, from Google Cloud’s Office of the CISO, share cloud threat intelligence and analysis from our new Cloud Threat Horizons Report. As with all Cloud CISO Perspectives, the contents of this newsletter are …

Google named a Leader in IDC MarketScape: U.S. State and Local Government Professional Security Services 2025–2026 Vendor Assessment

Source

In today’s cyber threat landscape, U.S. state and local governments find themselves under continuous attack, with bad actors leveraging AI to act with greater speed and sophistication. The need to secure mission-critical workloads has never been greater. In light of these challenges, we are proud that Google …

Make security simpler: Introducing the Google Cloud recommended security checklist

Source

A secure foundation is essential for tech innovation. As organizations embrace agentic AI, they should also continue to prioritize cloud security and risk management. To help organizations better manage security requirements and set configurations, today we’re publishing a recommended security checklist inspired by the Minimum Viable Secure Product …

Cloud CISO Perspectives: How Google approaches critical security topics, from fundamentals to AI

Source

Welcome to the second Cloud CISO Perspectives for February 2026. Today, Royal Hansen, vice-president, Engineering, explains how we tackle today’s thorniest cybersecurity challenges. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If you’re reading this on the …

Sovereignty and European competitiveness: A partnership-led approach to AI growth

Source

In our conversations with business and policy leaders across Europe, we have listened closely to their concerns about sovereignty and European competitiveness. It is clear that they often find themselves caught in a paradox that Europe must choose between autonomy and growth. At Google Cloud, we believe that this …

Cloud CISO Perspectives: New AI threats report: Distillation, experimentation, and integration

Source

Welcome to the first Cloud CISO Perspectives for February 2026. Today, John Hultquist, chief analyst, Google Threat Intelligence Group, explains the research detailed in our newest AI Threat Tracker report. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If …

Delivering a secure, open, and sovereign digital world

Source

The global conversation about our digital future goes beyond technology; it’s about architecting a prosperous, secure, and resilient economy where the digital services we rely on every day — from banking to healthcare to public administration — are built on a foundation of trust and operate according to local regulations …

Introducing Single-tenant Cloud HSM to support more data encryption control

Source

Organizations that handle sensitive data in highly-regulated sectors often face a difficult choice: Build and manage physical hardware to meet strict compliance needs, or use cloud services that might not offer the specific level of isolation they require. These organizations, often in financial services, defense, healthcare, insurance, and government …

Cloud CISO Perspectives: Practical guidance on building with SAIF

Source

Welcome to the first Cloud CISO Perspectives for January 2026. Today, Tom Curry and Anton Chuvakin, from Google Cloud’s Office of the CISO, share our new report on using Google’s Secure AI Framework with Google Cloud capabilities and services to build boldly and responsibly with AI. As …

Auto-ISAC and Google partner to boost automotive sector cybersecurity

Source

Ever since Carl Benz patented what is widely considered the first practical automobile and Henry Ford’s industrial techniques drove production scalability, consumer behavior and evolving preferences have driven improvements in performance, safety, and reliability. We are now at a phase of automotive development where continued automobile featurization — digital …

Cloud CISO Perspectives: 2025 in review: Cloud security basics and evolving AI

Source

Welcome to the second Cloud CISO Perspectives for December 2025. Today, Google Cloud’s Nick Godfrey, senior director, and Anton Chuvakin, security advisor, look back at the year that was. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If …

Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast report

Source

Welcome to the first Cloud CISO Perspectives for December 2025. Today, Francis deSouza, COO and president, Security Products, Google Cloud, shares our Cybersecurity Forecast report for the coming year, with additional insights from our Office of the CISO colleagues. As with all Cloud CISO Perspectives, the contents of this …

Expanding the Vision: Welcoming Palo Alto Networks to Google Unified Security Recommended

Source

Today’s organizations highly value their ability to choose the security tools they want to use, driving the reality that the security landscape should be interoperable. At Google Cloud, we believe in meeting customers where they are — including the partners they want to work with. We are thrilled to …

Using MCP with Web3: How to secure agents making blockchain transactions

Source

At Google Cloud, we sit at a unique intersection of two transformative technologies: AI and Web3. The rise of AI agents capable of interacting with blockchains opens up a world of automated financial strategies, fast payments, and more complex scenarios like executing complex DeFi operations and bridging assets across …

Responding to CVE-2025-55182: Secure your React and Next.js workloads

Source

Earlier today, Meta and Vercel publicly disclosed two vulnerabilities that expose services built using the popular open-source frameworks React Server Components ( CVE-2025-55182 ) and Next.js to remote code execution risks when used for some server-side use cases. At Google Cloud, we understand the severity of these vulnerabilities, and our …

Cloud CISO Perspectives: Phil Venables on CISO 2.0 and the CISO factory

Source

Welcome to the second Cloud CISO Perspectives for November 2025. Today, Phil Venables, Google Cloud’s current strategic security advisor and former CISO, and creator of this newsletter, shares his thoughts on how the role of the CISO is evolving in the AI era, and how organizations should shift …

A new era: Supporting customers as a critical ICT third-party provider under EU DORA

Source

At Google Cloud, we take our role in the financial ecosystem in Europe very seriously. We also firmly believe that digital operational resilience is vital to safeguarding and enhancing innovation. Today, we mark a significant milestone in our long-term commitment to the European financial services sector. The European Supervisory …

An open approach to security: Announcing Google Unified Security Recommended

Source

At Google Cloud, we believe that being at the forefront of driving secure innovation and meeting the evolving needs of customers includes working with partners. The reality is that the security landscape should be interoperable, and your security tools should be able to integrate with each other. Google Unified …

Supporting Viksit Bharat: Announcing our newest AI investments in India

Source

India’s developer community, vibrant startup ecosystem, and leading enterprises are embracing AI with incredible speed. To meet this moment for India, we are investing in powerful, locally-available tools in India that can help foster a diverse ecosystem, and ensure our platform delivers the controls you need for compliance …

page 1 | older articles »