Showing only posts in GCP Security. Show all posts.

Cloud CISO Perspectives: At Next ‘26, why we’re multicloud and multi-AI

Source

Welcome to the second Cloud CISO Perspectives for April 2026. Today, Francis deSouza, COO Google Cloud and President, Security Products, explains why Google is multicloud and multi-AI, straight from Next ‘26. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog …

Announcing new partner-supported workflows for Google Security Operations

Source

Security teams are frequently burdened with manually stitching together telemetry, alerts, and response playbooks. This fragmentation can limit visibility, increase alert fatigue, and slow down investigations. Defending the modern enterprise requires tools that work together. Today at Google Cloud Next, we are thrilled to announce a robust cohort of …

Introducing Google Cloud Fraud Defense, the next evolution of reCAPTCHA

Source

The agentic web — where autonomous AI agents reason, plan, and execute complex transactions using the open web and industry standard protocols — aims to create an autonomous customer experience. While these agents can significantly enhance online interactions, they also introduce new abuse and fraud vectors, creating unique challenges for security …

Next ‘26: Redefining security for the AI era with Google Cloud and Wiz

Source

aside_block ), ('btn_text', ''), ('href', ''), ('image', None)])]> The AI era demands a new security era. Organizations are facing the dual challenge of harnessing the potential of AI while defending against its malicious use, and Google Cloud can help you adapt and thrive. The latest research from Google Cloud shows that adversaries …

Cloud CISO Perspectives: How CISOs can pursue technical and cultural resilience (Q&A)

Source

Welcome to the first Cloud CISO Perspectives for April 2026. Today, Thiébaut Meyer and Lia Wertheimer from Google Cloud’s Office of the CISO share Thiébaut’s conversation with Matt Rowe, chief security officer, Lloyds Banking Group, on how security leaders can simultaneously pursue technical and cultural resilience. As …

Raising the security baseline: Essential AI and cloud security now on by default

Source

The rapid evolution of AI is redefining industries, while also exposing organizations to new risks. At Google Cloud, we believe that modern cloud defense should have AI protection built in and accessible by default, delivering native guardrails and controls that are essential to ensuring that security strengthens your AI …

Guardrails at the gateway: Securing AI inference on GKE with Model Armor

Source

Enterprises are rapidly moving AI workloads from experimentation to production on Google Kubernetes Engine (GKE), using its scalability to serve powerful inference endpoints. However, as these models handle increasingly sensitive data, they introduce unique AI-driven attack vectors — from prompt injection to sensitive data leakage — that traditional firewalls aren't designed …

Google Cloud named a Leader in The Forrester Wave™: Sovereign Cloud Platforms, Q2 2026

Source

In today’s global economy, data is a strategic asset. For many organizations — particularly those in highly regulated industries and the public sector — the ability to innovate with AI is often balanced against the rigorous requirements of data sovereignty, residency, and operational autonomy. We are proud to announce that …

See beyond the IP and secure URLs with Google Cloud NGFW

Source

In a cloud-first world, traditional IP-based defenses are no longer enough to protect your perimeter. As services migrate to shared infrastructure and content delivery networks, relying on static IP addresses and FQDNs can create security gaps. Because single IP addresses can host multiple services, and IPs addresses can change …

How to build production-ready AI agents with Google-managed MCP servers

Source

As ​​developers build AI agents with more sophisticated reasoning systems, they require higher-quality fuel–in the form of enterprise data and specialized tools–to drive real business value. To get the most out of that octane-rich mix, we offer Google-managed model context protocol (MCP) servers: an engine purpose-built for …

RSAC ’26: Supercharging agentic AI defense with frontline threat intelligence

Source

aside_block ), ('btn_text', ''), ('href', ''), ('image', None)])]> AI-driven defense is changing the cybersecurity industry in ways that defenders have long hoped for, and Google Security is bringing its most significant capabilities yet to RSA Conference. With the agentic security operations center as our foundation, and empowered by the unprecedented reasoning capabilities …

Simplify your Cloud Run security with Identity Aware Proxy (IAP)

Source

Cloud Run provides a powerful and scalable platform for deploying applications. Today, we’re introducing the general availability of two major enhancements to Cloud Run security: direct Identity-Aware Proxy (IAP) integration, and a way to allow public access to Cloud Run services that is compatible with Domain Restricted Sharing …

Welcoming Wiz to Google Cloud: Redefining security for the AI era

Source

Google’s security-first mindset comes from more than two decades of building some of the largest and most secure computing systems in the world. As software and AI permeate more industries, and business innovation increasingly centers on the adoption of AI and cloud computing technology, securing your organizations from …

Cloud CISO Perspectives: New Threat Horizons report highlights current cloud threats

Source

Welcome to the first Cloud CISO Perspectives for March 2026. Today, Bob Mechler and Crystal Lister, from Google Cloud’s Office of the CISO, share cloud threat intelligence and analysis from our new Cloud Threat Horizons Report. As with all Cloud CISO Perspectives, the contents of this newsletter are …

Google named a Leader in IDC MarketScape: U.S. State and Local Government Professional Security Services 2025–2026 Vendor Assessment

Source

In today’s cyber threat landscape, U.S. state and local governments find themselves under continuous attack, with bad actors leveraging AI to act with greater speed and sophistication. The need to secure mission-critical workloads has never been greater. In light of these challenges, we are proud that Google …

Make security simpler: Introducing the Google Cloud recommended security checklist

Source

A secure foundation is essential for tech innovation. As organizations embrace agentic AI, they should also continue to prioritize cloud security and risk management. To help organizations better manage security requirements and set configurations, today we’re publishing a recommended security checklist inspired by the Minimum Viable Secure Product …

Cloud CISO Perspectives: How Google approaches critical security topics, from fundamentals to AI

Source

Welcome to the second Cloud CISO Perspectives for February 2026. Today, Royal Hansen, vice-president, Engineering, explains how we tackle today’s thorniest cybersecurity challenges. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If you’re reading this on the …

Sovereignty and European competitiveness: A partnership-led approach to AI growth

Source

In our conversations with business and policy leaders across Europe, we have listened closely to their concerns about sovereignty and European competitiveness. It is clear that they often find themselves caught in a paradox that Europe must choose between autonomy and growth. At Google Cloud, we believe that this …

Cloud CISO Perspectives: New AI threats report: Distillation, experimentation, and integration

Source

Welcome to the first Cloud CISO Perspectives for February 2026. Today, John Hultquist, chief analyst, Google Threat Intelligence Group, explains the research detailed in our newest AI Threat Tracker report. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If …

Delivering a secure, open, and sovereign digital world

Source

The global conversation about our digital future goes beyond technology; it’s about architecting a prosperous, secure, and resilient economy where the digital services we rely on every day — from banking to healthcare to public administration — are built on a foundation of trust and operate according to local regulations …

Introducing Single-tenant Cloud HSM to support more data encryption control

Source

Organizations that handle sensitive data in highly-regulated sectors often face a difficult choice: Build and manage physical hardware to meet strict compliance needs, or use cloud services that might not offer the specific level of isolation they require. These organizations, often in financial services, defense, healthcare, insurance, and government …

page 1 | older articles »