Showing only posts in GCP Security. Show all posts.

Enhance Gemini model security with content filters and system instructions

Source

As organizations rush to adopt generative AI-driven chatbots and agents, it’s important to reduce the risk of exposure to threat actors who force AI models to create harmful content. We want to highlight two powerful capabilities of Vertex AI that can help manage this risk — content filters and …

5 ways Google Cloud can help you minimize credential theft risk

Source

Threat actors who target cloud environments are increasingly focusing on exploiting compromised cloud identities. A compromise of human or non-human identities can lead to increased risks, including cloud resource abuse and sensitive data exfiltration. These risks are exacerbated by the sheer number of identities in most organizations; as they …

Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats

Source

Welcome to the second Cloud CISO Perspectives for January 2025. Iain Mulholland, senior director, Security Engineering, shares insights on the state of ransomware in the cloud from our new Threat Horizons Report. The research and intelligence in the report should prove helpful to all cloud providers and security professionals …

Privacy-preserving Confidential Computing now on even more machines and services

Source

Organizations are increasingly using Confidential Computing to help protect their sensitive data in use as part of their data protection efforts. Today, we are excited to highlight new Confidential Computing capabilities that make it easier for organizations of all sizes to adopt this important privacy-preserving technology. 1. Confidential GKE …

How we’re making GKE more transparent with supply-chain attestation and SLSA

Source

What goes into your Kubernetes software? Understanding the origin of the software components you deploy is crucial for mitigating risks and ensuring the trustworthiness of your applications. To do this, you need to know your software supply chain. Google Cloud is committed to providing tools and features that enhance …

Get started with Google Cloud's built-in tokenization for sensitive data protection

Source

In many industries including finance and healthcare, sensitive data such as payment card numbers and government identification numbers need to be secured before they can be used and shared. A common approach is applying tokenization to enhance security and manage risk. A token is a substitute value that replaces …

Introducing Google Cloud Abuse Event Logging to enable automated incident remediation

Source

At Google Cloud, we are deeply committed to partnering with our customers to help achieve stronger security outcomes. As a part of this commitment, we're excited to announce that Google Cloud customers can now track Cloud Abuse Events using Cloud Logging. These events can include leaked service account keys …

Find sensitive data faster (but safely) with Google Distributed Cloud’s gen AI search solution

Source

Today, generative AI is giving organizations new ways to process and analyze data, discover hidden insights, increase productivity and build new applications. However, data sovereignty, regulatory compliance, and low-latency requirements can be a challenge. The need to keep sensitive data in certain locations, adhere to strict regulations, and respond …

Google Cloud's commitment to responsible AI is now ISO/IEC certified

Source

With the rapid advancement and adoption of AI, organizations face increasing pressure to ensure their AI systems are developed and used responsibly. This includes considerations around bias, fairness, transparency, privacy, and security. A comprehensive framework for managing the risks and opportunities associated with AI can help by offering a …

How Virgin Media O2 uses Privileged Access Manager to achieve principle of least privilege

Source

Editor’s note : Virgin Media O2 provides internet and communications services to more than 48.5 million subscribers, and teams are also responsible for supporting more than 16,000 employees. Virgin Media O2 is committed to empowering customers with outstanding customer-centered products and essential connectivity — all powered behind the …

The Cyber Threat Intelligence Program Design Playbook is now available

Source

As cybersecurity threats have grown more sophisticated and prevalent, we’ve seen organizations develop robust cyber threat intelligence (CTI) programs to help bolster defenses. However, creating and maturing a CTI program remains a challenge because it requires people, processes, technologies, and metrics to validate success. To help organizations better …

Google Cloud first CSP to join BRC, MFG-ISAC, and affiliates to advance security

Source

The AI phase of industrial evolution is marked by a profound transformation in how humans and intelligent machines collaborate. The blurring of boundaries between physical and digital systems across the manufacturing landscape is accelerating, driven by advancements in automation, robotics, artificial intelligence, and the Internet of Things. This interconnectedness …

How Google Cloud helps navigate your DPIA and AI privacy compliance journey

Source

At Google, we understand that new technology applications such as artificial intelligence driven innovation can introduce new questions about data privacy. We are committed to helping our customers meet their data protection obligations while using AI offerings integrated in Google Cloud services (which includes Google Workspace services.) Some customers …

Improve your security posture with expanded Custom Org Policy

Source

When it comes to securing cloud resources, one of the most important tools for administrators is the ability to set guardrails for resource configurations that can be applied consistently across the environment, centrally managed, and safely rolled out. Google Cloud's custom Organization Policy is a powerful tool that can …

Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud

Source

Conventional fraud detection methods have a hard time keeping up with increasingly sophisticated criminal tactics. Existing systems often rely on the limited data of individual institutions, and this hinders the detection of intricate schemes that span multiple banks and jurisdictions. To better combat fraud in cross-border payments, Swift, the …

To avoid “bill shocks,” Palo Alto Networks deploys custom AI-powered cost anomaly detection

Source

In today's fast-paced digital world, businesses are constantly seeking innovative ways to leverage cutting-edge technologies to gain a competitive edge. AI has emerged as a transformative force, empowering organizations to automate complex processes, gain valuable insights from data, and deliver exceptional customer experiences. However, with the rapid adoption of …

Securing AI: Advancing the national security mission

Source

Artificial intelligence is not just a technological advancement; it's a national security priority. In this new era, AI is both a powerful technology that can bolster any organization’s cybersecurity capabilities and also a critical part of the technology infrastructure that we need to defend and protect. Google recently …

page 1 | older articles »