Showing only posts in GCP Security. Show all posts.

Get started with Google Cloud's built-in tokenization for sensitive data protection

Source

In many industries including finance and healthcare, sensitive data such as payment card numbers and government identification numbers need to be secured before they can be used and shared. A common approach is applying tokenization to enhance security and manage risk. A token is a substitute value that replaces …

Introducing Google Cloud Abuse Event Logging to enable automated incident remediation

Source

At Google Cloud, we are deeply committed to partnering with our customers to help achieve stronger security outcomes. As a part of this commitment, we're excited to announce that Google Cloud customers can now track Cloud Abuse Events using Cloud Logging. These events can include leaked service account keys …

Find sensitive data faster (but safely) with Google Distributed Cloud’s gen AI search solution

Source

Today, generative AI is giving organizations new ways to process and analyze data, discover hidden insights, increase productivity and build new applications. However, data sovereignty, regulatory compliance, and low-latency requirements can be a challenge. The need to keep sensitive data in certain locations, adhere to strict regulations, and respond …

Google Cloud's commitment to responsible AI is now ISO/IEC certified

Source

With the rapid advancement and adoption of AI, organizations face increasing pressure to ensure their AI systems are developed and used responsibly. This includes considerations around bias, fairness, transparency, privacy, and security. A comprehensive framework for managing the risks and opportunities associated with AI can help by offering a …

How Virgin Media O2 uses Privileged Access Manager to achieve principle of least privilege

Source

Editor’s note : Virgin Media O2 provides internet and communications services to more than 48.5 million subscribers, and teams are also responsible for supporting more than 16,000 employees. Virgin Media O2 is committed to empowering customers with outstanding customer-centered products and essential connectivity — all powered behind the …

The Cyber Threat Intelligence Program Design Playbook is now available

Source

As cybersecurity threats have grown more sophisticated and prevalent, we’ve seen organizations develop robust cyber threat intelligence (CTI) programs to help bolster defenses. However, creating and maturing a CTI program remains a challenge because it requires people, processes, technologies, and metrics to validate success. To help organizations better …

Google Cloud first CSP to join BRC, MFG-ISAC, and affiliates to advance security

Source

The AI phase of industrial evolution is marked by a profound transformation in how humans and intelligent machines collaborate. The blurring of boundaries between physical and digital systems across the manufacturing landscape is accelerating, driven by advancements in automation, robotics, artificial intelligence, and the Internet of Things. This interconnectedness …

How Google Cloud helps navigate your DPIA and AI privacy compliance journey

Source

At Google, we understand that new technology applications such as artificial intelligence driven innovation can introduce new questions about data privacy. We are committed to helping our customers meet their data protection obligations while using AI offerings integrated in Google Cloud services (which includes Google Workspace services.) Some customers …

Improve your security posture with expanded Custom Org Policy

Source

When it comes to securing cloud resources, one of the most important tools for administrators is the ability to set guardrails for resource configurations that can be applied consistently across the environment, centrally managed, and safely rolled out. Google Cloud's custom Organization Policy is a powerful tool that can …

Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud

Source

Conventional fraud detection methods have a hard time keeping up with increasingly sophisticated criminal tactics. Existing systems often rely on the limited data of individual institutions, and this hinders the detection of intricate schemes that span multiple banks and jurisdictions. To better combat fraud in cross-border payments, Swift, the …

To avoid “bill shocks,” Palo Alto Networks deploys custom AI-powered cost anomaly detection

Source

In today's fast-paced digital world, businesses are constantly seeking innovative ways to leverage cutting-edge technologies to gain a competitive edge. AI has emerged as a transformative force, empowering organizations to automate complex processes, gain valuable insights from data, and deliver exceptional customer experiences. However, with the rapid adoption of …

Securing AI: Advancing the national security mission

Source

Artificial intelligence is not just a technological advancement; it's a national security priority. In this new era, AI is both a powerful technology that can bolster any organization’s cybersecurity capabilities and also a critical part of the technology infrastructure that we need to defend and protect. Google recently …

Cloud CISO Perspectives: To end ransomware scourge, start with more reporting — not blocking cyber-insurance

Source

Welcome to the second Cloud CISO Perspectives for November 2024. Today, Monica Shokrai, head of business risk and insurance, Google Cloud, and Kimberly Goody, cybercrime analysis lead, Google Threat Intelligence Group, explore the role cyber-insurance can play in combating the scourge of ransomware. As with all Cloud CISO Perspectives …

Make IAM for GKE easier to use with Workload Identity Federation

Source

At Google Cloud, we work to continually improve our platform’s security capabilities to deliver the most trusted cloud. As part of this goal, we’re helping our users move away from less secure authentication methods such as long-lived, unauditable, service account keys towards more secure alternatives when authenticating …

Shift-left your cloud compliance auditing with Audit Manager

Source

Cloud compliance can present significant regulatory and technical challenges for organizations. These complexities often include delineating compliance responsibilities and accountabilities between the customer and cloud provider. At Google Cloud, we understand these challenges faced by our customers’ cloud engineering, compliance, and audit teams, and want to help make them …

Secure your data ecosystem: a multi-layered approach with Google Cloud

Source

It’s an exciting time in the world of data and analytics, with more organizations harnessing the power of data and AI to help transform and grow their businesses. But in a threat landscape with increasingly sophisticated attacks around every corner, ensuring the security and integrity of that data …

Google Cloud deepens its commitment to security and transparency with expanded CVE program

Source

At Google Cloud, we recognize that helping customers and government agencies keep tabs on vulnerabilities plays a critical role in securing consumers, enterprises, and software vendors. We have seen the Common Vulnerabilities and Exposure (CVE) system evolve into an essential part of building trust across the IT ecosystem. CVEs …

Mandatory MFA is coming to Google Cloud. Here’s what you need to know

Source

At Google Cloud, we’re committed to providing the strongest security for our customers. As pioneers in bringing multi-factor authentication (MFA) to millions of Google users worldwide, we've seen firsthand how it strengthens security without sacrificing a smooth and convenient online experience. That’s why we will soon require …

page 1 | older articles »