Showing only posts in GCP Security. Show all posts.

How Confidential Space and multi-party computation can help manage digital assets more securely and efficiently

Source

Managing digital asset transactions and their often-competing requirements to be secure and timely can be daunting. Human errors can lead to millions in assets being instantly lost, especially when managing your own encryption keys. This is where multi-party computation (MPC) can help reduce risk stemming from single points of …

[Infographic] Navigating secure digital transformation in financial services

Source

Adopting cloud computing technologies and services presents financial services institutions with opportunities to address many forms of security risks in new, innovative, and more effective ways. However, firms often lack the tools required to map out their digital transformation journey in the context of security and risk governance. That …

How to deploy Tink for BigQuery encryption on-prem and in the cloud

Source

Data security is a key focus for organizations moving their data warehouses from on-premises to cloud-first systems, such as BigQuery. In addition to storage-level encryption, whether using Google-managed or customer-managed keys, BigQuery also provides column-level encryption. Using BigQuery's SQL AEAD functions, organizations can enforce a more granular level of …

CISO Survival Guide: Vital questions to help guide transformation success

Source

Part of being a security leader whose organization is taking on a digital transformation is preparing for hard questions – and complex answers – on how to implement a transformation strategy. In our previous CISO Survival Guide blog, we discussed how financial services organizations can more securely move to the cloud …

Secure your life sciences data from the ground up

Source

With the rapid growth in the quantity of healthcare data available, organizations are able to unlock deeper insights, advance innovation, and increase experimentation. The sector is now in a position to take advantage of cloud technology to accelerate clinical trials, expand research and development, and optimize supply chains. However …

Best Kept Security Secrets: How VPC Service Controls can help build defense in depth

Source

While cloud security skeptics might believe that data in the cloud is just one access configuration mistake away from a breach, the reality is that a well-designed set of defense in depth controls can help minimize the risk of configuration mistakes and other security issues. Our Virtual Private Cloud …

ICYMI: Security Talks goes deep on SolarWinds, Chrome, Zero Trust, and today’s toughest SOC challenges

Source

Security operations teams are facing a “perfect storm” of challenges from nation-state actors turning their attention to financial crime, to rising uncertainty and potential complexities because of rapidly advancing cloud migration and IoT adoption, to the long-lamented skills shortage. Now imagine having to face this trifecta without visibility into …

How SolarWinds still affects supply chain threats, two years later

Source

Our quarterly Security Talks series brings together experts from Google Cloud Security teams and the industry to share information on our latest security products, innovations and best practices. Below is an introduction to Mandiant’s Security Talks presentation on Dec. 7, Mandiant Tales from the Front Lines: Activate Cyber …

Build your API security strategy on these 4 pillars

Source

Savvy leaders at organizations around the world know that digital transformations can create a virtuous flywheel of more and faster innovation, driven by the power of software integration. APIs can facilitate the necessary software integration and communication, and that requires serious consideration of the organization’s API security posture …

Announcing Google Cloud support for Impact Level 5 (IL5) workloads

Source

Google Cloud is committed to serving public sector customers around the world, and has made significant progress in building products and services designed specifically to meet your needs. Today, Google Cloud is proud to announce Department of Defense Impact Level 5 (IL5) provisional authorization (PA) — another important milestone that …

4 new features of Active Assist to help automate idle resource management

Source

Unattended Project Recommender makes identifying idle cloud projects easy, and helps you mitigate associated security issues, reduce unnecessary spend and environmental impact. In order to implement a scalable and repeatable resource lifecycle management process, it’s important to have the right tools for the job. Today, we’re announcing …

Securing tomorrow today: Why Google now protects its internal communications from quantum threats

Source

Editor's note : The ISE Crypto PQC working group is comprised of Google Senior Cryptography Engineers Stefan Kölbl, Rafael Misoczki, and Sophie Schmieg. When you visit a website and the URL starts with HTTPS, you’re relying on a secure public key cryptographic protocol to shield the information you share …

How the year’s final Google Cloud Security Talks will ready you for security and cloud success in 2023

Source

As we help our customers evolve their security approaches for the cloud era, two key objectives based on Google’s experience defending our own infrastructure and systems, emerge: trust nothing and detect everything. These can seem like daunting tasks for even the most capable security teams, especially in today …

« newer articles | page 13 | older articles »