Showing only posts in GCP Security. Show all posts.

A better way to stay ahead of attacks: Security Command Center adds attack path simulation

Source

To help secure increasingly complex and dynamic cloud environments, many security teams are turning to attack path analysis tools. These tools can enable them to better prioritize security findings and discover pathways that adversaries can exploit to access and compromise cloud assets such as virtual machines, databases, and storage …

Announcing first Google Cloud OSCAL package submission for DoD Impact Level 5

Source

Today, Google Cloud is proud to announce that we have successfully submitted the complete OSCAL package for Department of Defense (DoD) Impact Level 5 (IL5) to eMASS. This is a major milestone for us, as it represents our step forward supporting scalable compliance for Google Cloud and its customers …

Announcing general availability of Cloud Firewall threat intelligence and geo-location features

Source

Google Cloud Firewall is a fully distributed, stateful inspection firewall engine that is built into our software-defined networking fabric and enforced at each workload. With Cloud Firewall, you can enhance and simplify security posture, and implement Zero Trust networking for cloud workloads. Previously, we announced several enhancements and expansions …

Announcing Google Cloud’s first complete OSCAL package

Source

Today, Google Cloud is proud to announce that we have successfully submitted the complete OSCAL package. This is a major milestone for us, as it represents our step forward supporting scalable compliance for Google Cloud and its customers. Open Security Control Assessment Language (OSCAL) OSCAL (Open Security Control Assessment …

New Cryptomining Protection Program offers $1 million for costly cryptomining attacks

Source

Cryptomining is a pervasive and costly threat to cloud environments. A single attack can result in unauthorized compute costs of hundreds of thousands of dollars in just days. Further, the Google Cybersecurity Action Team (GCAT) September 2022 Threat Horizons Report revealed that 65% of compromised cloud accounts experienced cryptocurrency …

How to easily migrate your on-premises firewall rules to Cloud Firewall policies

Source

Firewalls are a critical component of your security architecture. With the increased migration of workloads to cloud environments, more companies are turning to cloud-first solutions for their network security needs. Google Cloud Firewall is a scalable, cloud-first service with advanced protection capabilities that helps enhance and simplify your network …

Introducing new ways Security Command Center Premium protects identities

Source

After decades of managing and securing identities in data centers, security and IT operations teams face new challenges when detecting identity compromise in their public cloud environments. Protecting cloud service accounts against leaked keys, privilege escalation in complex authorization systems, and insider threats are vital tasks when considering the …

How Apigee can help government agencies adopt Zero Trust

Source

Securely sharing data is critical to building an effective government application ecosystem. Rather than building new applications, APIs can enable government leaders to gather data-driven insights within their existing technical environments. With the help of APIs, agencies can bring application-based information together to support their objectives. U.S. government …

Partnering with Health-ISAC to strengthen the European healthcare system

Source

Last July, Google Cloud launched our ambassador partnership with the Health Information Sharing and Analysis Center (Health-ISAC) and committed to working with industry leaders to better protect our healthcare ecosystem. Securing healthcare technology and data is a global challenge, and to meet it security professionals need to have better …

How Broadcom simplifies compliance for federal customers with Assured Workloads

Source

Broadcom is a global technology leader that designs, develops, and supplies many semiconductor and infrastructure software solutions. Broadcom’s category-leading product portfolio serves critical markets including data center, networking, software, broadband, wireless, storage, and industrial sectors. Our customers, many of whom operate in the federal public sector, need ready-made …

Cloud Data Loss Prevention’s sensitive data intelligence service is now available in Security Command Center

Source

Our Cloud Data Loss Prevention (Cloud DLP) discovery service can monitor and profile your data warehouse to bring awareness of where sensitive data is stored and processed. Profiling is also useful for confirming that data is not being stored and processed where you don’t want it. But how …

Game-changing IT security with Unity, Orca Security, and Google Cloud

Source

Every month, more than 1 million creators worldwide use Unity’s expansive platform to develop games, create beautiful visual effects, and design everything from electric cars to skyscrapers. The company’s comprehensive suite of solutions makes it easier to create, run, and monetize 2D and 3D content. Unity has …

How to solve customer challenges when security patching Google Kubernetes Engine

Source

Editor's note: This blog post has been adapted from the April 2023 Threat Horizons Report. Cloud customers are increasingly running their compute workloads in Kubernetes clusters due to the availability, flexibility, and security they provide. Just like other IT assets, these clusters need to be routinely patched to keep …

Introducing Organization Restrictions, a new way to keep threat actors out

Source

In Google Cloud, IAM Policies provide administrators with fine-grained control over who can use resources within their Google Cloud organization. With Organization Restrictions, a new generally available Google Cloud security control, administrators can restrict users’ access to only resources and data in specifically authorized Google Cloud organizations. It does …

New asset query simplifies asset inventory management in Security Command Center

Source

As our cloud customers scale their environments, they need to manage cloud resources and policies. Our biggest customers have millions of assets in their Google Cloud environments. Securing growing environments requires tools to help discover, monitor, and secure cloud assets. To help, Security Command Center (SCC), our security and …

3 new ways to authorize users to your private workloads on Cloud Run

Source

More and more organizations are building applications on Cloud Run, a fully managed compute platform that lets you run containerized applications on top of Google’s infrastructure. Think web applications, real-time dashboards, APIs, microservices, batch data processing, testing and monitoring tools, data science inference models, and more. Today, we're …

« newer articles | page 10 | older articles »