Showing only posts in GCP Security. Show all posts.

Accelerating cybersecurity resilience through the expanded Accenture-Google Cloud partnership

Source

Accenture and Google Cloud have partnered since 2018 to help the world’s largest organizations digitally transform their enterprises by harnessing our data analytics, AI/ML, and services expertise to build stronger digital cores. Today at the RSA Conference 2023 in San Francisco, we’re excited to announce that …

How Google and Intel make Confidential Computing more secure

Source

Confidential Computing has quickly emerged as a critical technology to ensure confidentiality and security of sensitive data while it’s being processed. It performs computation in a hardware isolated environment that is encrypted with keys managed by the processor and unavailable to the operator. These isolated environments help prevent …

Introducing AI-powered investigation in Chronicle Security Operations

Source

Leveraging recent advances in artificial intelligence (AI) and large language models (LLM), Google Cloud Security AI Workbench sets out to address three of the biggest challenges in cybersecurity: threat overload, toilsome tools, and the talent gap. These could not be more relevant for security operations. At the RSA Conference …

Introducing AI-powered risk summaries in Security Command Center

Source

Cloud security teams need expert guidance to protect against an increasing number of threats, and to help pinpoint where they are most at risk. They also need to make security issues understandable so that non-security specialists can help keep their organization safe. To meet both requirements, we will integrate …

Supercharging security with generative AI

Source

At Google Cloud, we continue to invest in key technologies to progress towards our true north star on invisible security : making strong security pervasive and simple for everyone. Our investments are based on insights from our world-class threat intelligence teams and experience helping customers respond to the most sophisticated …

Announcing API abuse detection powered by machine learning

Source

API security incidents are increasingly common and disruptive. With the growth of API traffic, enterprises across the world are also experiencing an uptick in malicious API attacks, making API security a heightened priority. According to our latest API Security Research Report, 50% of organizations surveyed have experienced an API …

How Chronicle can help advance security product development and overcome data lake challenges

Source

Building your cybersecurity product’s data platform to automatically process massive volumes of data and deliver high-speed search, rich contextual insight, threat detection, and context-aware response automation can be difficult, even with modern day data lakes. One option to avoid the challenges of data lakes and enable your engineers …

Take control of your supply chain with Artifact Registry remote and virtual repositories

Source

Dev : "I need that library's functionality for the new feature!" Sec : "I can't approve it if I don't know that it's safe to deploy!" Dev : "And when will we know?" Sec : "My queue is 11 weeks long...." The most contentious conversations between security and development teams often involve the …

Understanding Nasuni’s new ransomware protection service on Google Cloud

Source

Open ecosystems and collaborative partnerships matter, particularly with cloud infrastructure solutions. Google Cloud maintains a robust partner ecosystem that encourages companies like file-data-services provider Nasuni to create innovative solutions that run on its infrastructure. Partners can leverage what Google Cloud has built and advanced over many years to offer …

How to secure content production on Google Cloud with CSAP

Source

Content production is increasingly happening in the cloud. While moving a creative process that spans three centuries into the modern era brings challenges and risks, MovieLabs is one organization that takes digital transformation seriously. A nonprofit research and development group founded by a consortium of the major Hollywood studios …

Google Cloud Assured Open Source Software service is now generally available

Source

Threats to the software supply chain and open source software (OSS) security continue to be major areas of concern for organizations creating apps and their developers. According to Mandiant’s M-Trends 2022 report, 17% of all security breaches start with a supply chain attack, the initial infection vector second …

Best Kept Security Secrets: How Assured Workloads accelerates security and compliance

Source

Digital transformation is now a strategic imperative for organizations across every industry. For governments and regulated businesses, moving services to the cloud poses a unique set of challenges. As a vital enabler of transformation, the cloud can unlock innovation and help keep pace with the accelerating pace of digital …

Google Public Sector achieves CJIS compliance in Florida

Source

Google Public Sector has completed the process with Florida Department of Law Enforcement (FDLE) to ensure Google Cloud supports the requirements necessary to store, process, and support criminal justice information (CJI). As part of this process, Google Public Sector worked with FDLE to conduct physical audits of facilities nationally …

Announcing Firewall Insights support for firewall policies and trend-based analysis

Source

Firewall Insights helps you understand and optimize your Cloud Firewall rules by providing insights, recommendations, and metrics about how your firewall rules are being used. We are excited to announce new enhancements for Firewall Insights that support hierarchical firewall policies and network firewall policies. These enhancements are now generally …

Realize policy-as-code with Pulumi through CrossGuard on Google Cloud

Source

When it comes to creating and deploying cloud infrastructure on Google Cloud, more organizations are using CrossGuard from Pulumi. This policy-as-code offering lets you set guardrails to enforce compliance for resources, so you can provision your own infrastructure while sticking to best practices and baseline your organization’s security …

Google named a 2023 Strong Performer in the Gartner Peer Insights™ Voice of the Customer for Security Information and Event Management

Source

In 2016, Google’s "X", the moonshot factory, began working on a project aimed to take on cybersecurity. The belief that we could increase the speed and impact of security teams if it were much easier, faster, and more cost-effective for them to capture and analyze security-related clues from …

How Dataplex can improve data auditing, security, and access management

Source

Data is one of the most important assets of any enterprise. It is essential for making informed decisions, improving efficiency, and providing a competitive edge. However, managing data comes with the responsibility of preventing data misuse. Especially in regulated industries, mishandling data can lead to significant financial and reputational …

How to secure digital assets with multi-party computation and Confidential Space

Source

In a previous blog post, we introduced how multi-party computation (MPC) can help reduce risk from single points of compromise and can facilitate instant, policy-compliant digital asset transactions. One of the quickest and easiest ways companies can implement MPC solutions is with Google Cloud's Confidential Space. This solution offers …

« newer articles | page 11 | older articles »