Showing only posts in GCP Security. Show all posts.

How Project Shield helped protect U.S. midterm elections from DDoS attacks

Source

Modern elections rely on public access to a vast array of online information, including political candidate stances, elections monitoring, and directions to polling sites. Public websites can be taken offline by an attacker with no special access, through the use of a Distributed Denial of Service (DDoS) attack. These …

Join us at RSA Conference to transform cybersecurity with frontline intelligence and cloud innovation

Source

The promise of digital transformation is being challenged by the increasingly disruptive threat landscape. More sophisticated and capable adversaries have proliferated as nation-states pivot from cyber-espionage to compromise of private industry for financial gain. Their tactics shift and evolve rapidly as workloads and workforces become distributed and enterprises’ attack …

Early-bird registration for Google Cloud Next ‘23 is open now

Source

San Francisco, here we come. Starting today, you can now register at the Early Bird rate of $899 USD* for Google Cloud Next ‘23, taking place in person, August 29-31, 2023. This year’s Next conference comes at an exciting time. The emergence of generative AI is a transformational …

Google Cloud and FS-ISAC team up to advance financial services security

Source

Google Cloud is committed to strengthening the security and resiliency of financial services organizations and making the Internet a safer place for all organizations to conduct transactions and business. While building a secure and resilient ecosystem is a joint responsibility, we want to ensure that we’re working together …

Be threat ready for 2023: Join us for Google Cloud Security Talks in March

Source

At Google Cloud, our north star for security success today is to help customers apply cloud-scale, modern security everywhere they operate. As part of our mission to help customers achieve these objectives, we host a quarterly digital discussion event, Google Cloud Security Talks, where we bring together experts from …

Introducing time-bound Session Length defaults to improve your security posture

Source

Google Cloud provides many layers of security for protecting your users and data. Session length is a configuration parameter that administrators can set to control how long users can access Google Cloud without having to reauthenticate. Managing session length is foundational to cloud security and it ensures access to …

How to improve your Kubernetes security posture with GKE Dataplane V2 network policies

Source

As more organizations adopt Kubernetes, they also embrace new paradigms for connecting and protecting their workloads. Relying on perimeter defense alone is no longer an effective strategy. With microservice architecture patterns continuing to evolve rapidly, it is imperative that organizations adopt a defense-in-depth strategy to keep their applications and …

Why you should migrate to network firewall policies from VPC Firewall rules

Source

In the fall of 2022, we announced new policy constructs for Google Cloud Firewall, a scalable, cloud-first firewall service that helps secure traffic flow to and from workloads in Google Cloud, and whose distributed architecture enables simplified, granular control including micro-segmentation. Whereas legacy VPC firewall rules included network tags …

How Google Cloud Armor helps Broadcom block DDoS Attacks

Source

Technology leader Broadcom is a worldwide provider of enterprise security solutions that leverages its expertise in hardware and software to offer a broad portfolio of embedded security solutions, including integrated Symantec cybersecurity software. In 2021, Broadcom received the Google Cloud DevOps Award. As Broadcom migrated its enterprise security solution …

The top five global data and AI trends in 2023

Source

How will your organization manage this year's data growth and business requirements? Your actions and strategies involving data and AI will improve or undermine your organization's competitiveness in the months and years to come. Our teams at Google Cloud have an eye on the future as we evolve our …

What you can do to protect your software supply chain today

Source

“What are things we can do today to protect our software supply chains?” This is one of the top questions our team often gets when talking to IT leaders and practitioners about protecting their software supply chains – the code, people, systems, and processes that contribute to development and delivery …

Securing Cloud Run Deployments with Least Privilege Access

Source

With Cloud Run, developers can quickly deploy production web applications and APIs on a serverless environment that runs on top of Google’s scalable infrastructure. While development teams can leverage Cloud Run to improve development agility and iterate quickly, many overlook their infrastructure’s security posture. In particular, one …

Confidential GKE Nodes are now available on Compute Optimized C2D VMs

Source

Today, we are happy to announce that Confidential GKE Nodes are available on compute optimized C2D VMs. Many companies have adopted Google Kubernetes Engine (GKE) as a key component in their application infrastructure. In some cases, the advantages of using containers and Kubernetes can surpass those of traditional architectures …

How Google Cloud is preparing for NIS2 and supporting a stronger European cyber ecosystem

Source

Online data theft is a significant risk for organizations around the world and in Europe. European businesses stand to lose roughly 10 terabytes of data each month to cyber theft, according to a July 2022 report from the European Union Agency for Cybersecurity (ENISA). Meanwhile, cyberattacks cost European businesses …

Health-ISAC and Google Cloud partner to build more resilient healthcare, one threat indicator at a time

Source

Google Cloud is committed to helping healthcare and life sciences organizations defend themselves from threats that disrupt their ability to care for patients. The pandemic showed how vulnerable this industry is to attacks, and the real-life impacts that shutting down hospital systems and affecting drug makers can have on …

How Anthos helps improve your platform and application security and governance

Source

Security has become a critical component in every modern application and platform today. As IT admins try to implement security policies required to protect applications across distributed platforms, they often run into issues such as the lack of effective policy enforcement and lack of visibility into the policy violations …

Google Cloud Firewall capabilities to enhance your security posture and simplify configuration

Source

Google Cloud Firewall is a scalable, built-in service with advanced protection capabilities that helps enhance and simplify security posture, and implement zero trust networking, for cloud workloads. Its fully-distributed architecture provides micro-segmentation and granular control independent of network structure. Our unique architectural approach offers several advantages over the network …

Application security with Cloud SQL IAM database authentication

Source

Hardening a complex application is a challenge, more so for applications that include multiple layers with different authentication schemes. One common question is “how to integrate Cloud SQL for PostgreSQL or MySQL within your authentication flow?” Cloud SQL has always supported password-based authentication. There are, however, many questions that …

Google Cloud to join Catena-X and help build a sovereign data ecosystem in the automotive industry

Source

The automotive industry has a long history of being at the forefront of automation and digitalization in many areas, be it digital design or digital shop floor. In parallel, carmakers have grown into broad partnerships within their ecosystem, with a special focus on their suppliers in the value chain …

Improved gVisor file system performance for GKE, Cloud Run, App Engine and Cloud Functions

Source

Flexible application architectures, CI/CD pipelines, and container workloads often run untrusted code and hence should be isolated from sensitive infrastructure. One common solution has been to deploy defense-in-depth products (like GKE Sandbox which uses gVisor ) to isolate workloads with an extra layer of protection. Google Cloud’s serverless …

Introducing Security Command Center’s project-level, pay-as-you-go options

Source

One of the toughest challenges security teams can face occurs when IT leaders recognize the urgency to secure their organization’s cloud workloads and data, but operational hurdles create delays that can leave resources vulnerable to cyberattacks. Giving security teams the flexibility to rapidly apply security controls to their …

How Iron Mountain uses Assured Workloads to serve our customers’ compliance needs

Source

Editor’s note: Data storage experts Iron Mountain turned to Google Cloud when they wanted to scale their digital business. David Williams, cloud manager at Iron Mountain, explains in this post how Assured Workloads helped Iron Mountain’s InSight product achieve and maintain compliance with government standards and better …

« newer articles | page 12 | older articles »