Showing only posts in GCP Security. Show all posts.

Google Cloud Next for security: 6 essential sessions

Source

Zero Trust. Securing the software supply chain. Policy controls. And what about Mandiant? We have so many cool and interesting security sessions coming this week at Google Cloud Next, it can be hard to know where to start. Fortunately, we’ve got you covered with these six must-watch security …

How to secure APIs against fraud and abuse with reCAPTCHA Enterprise and Apigee X

Source

A comprehensive API security strategy requires protection from fraud and abuse. To better protect our publicly-facing APIs from malicious software that engages in abusive activities, we can deploy CAPTCHAs to disrupt abuse patterns. Developers can prevent attacks, reduce their API security surface area, and minimize disruption to users by …

Secure streaming data with Private Service Connect for Confluent Cloud

Source

Data speed and security should not be mutually exclusive, which is why Confluent Cloud, a cloud-first data streaming platform built by the founders of Apache Kafka, secures your data through encryption at rest and enables secure data in motion. However, for the most sensitive data — particularly data generated by …

Introducing Workforce Identity Federation to easily manage workforce access to Google Cloud

Source

At Google Cloud, we’re focused on giving customers new ways to strengthen their security posture. Managing identities and authorization is a core security control that underpins interactions inside and collaboration outside the organization. To address fraud, identity theft, and other security challenges associated with the proliferation of online …

What makes Google Cloud security special: Our reflections 1 year after joining OCISO

Source

Editor's note : Google Cloud’s Office of the Chief Information Security Officer (OCISO) is an expert team of cybersecurity leaders, including established industry CISOs, initially formed in 2019. Together they have more than 500 years of combined cybersecurity experience and leadership across industries including global healthcare, finance, telecommunications and …

Best Kept Security Secrets: Tap into the power of Organization Policy Service

Source

The canvas of cloud resources is vast, ready for an ambitious organization to craft their digital masterpiece (or perhaps just their business.) Yet before the first brush of paint is applied, a painter in the cloud needs to think about their frame: What shape should it take, what material …

Google Cloud Firewall introduces Network Firewall Policies, IAM-governed Tags and more

Source

The network security that firewalls provide is one of the basic building blocks for a secure cloud infrastructure. We are excited to announce that three new Google Cloud Firewall features are now generally available: Global Network Firewall Policies, Regional Network Firewall Policies, and IAM-governed Tags. With these enhancements, Cloud …

Introducing Custom Organization Policy for GKE to harden security

Source

Compliance officers and platform engineering teams often find it challenging to ensure security, manage consistency, and oversee governance across multiple products, environments, and teams. Google Cloud's Organization Policy Service can help tackle this challenge with a policy-based approach that simplifies policy administration across Google Cloud resources and projects. We …

Evolving our data processing commitments for Google Cloud and Workspace

Source

At Google, we are constantly looking to improve our products, services, and contracts so that we can better serve our customers. To this end, we are pleased to announce that we have updated and merged our data processing terms for Google Cloud, Google Workspace (including Workspace for Education), and …

Introducing more ways to protect corporate applications with BeyondCorp Enterprise

Source

As part of our efforts to democratize Zero Trust, Google Cloud has designed our BeyondCorp Enterprise solution to be an extensible platform where customers can choose to integrate signals from other technology vendors and incorporate these into their Zero Trust access policies. Following our integrations announcements earlier this year …

How to use Google Cloud to find and protect PII

Source

BigQuery is a leading data warehouse solution in the market today, and is valued by customers who need to gather insights and advanced analytics on their data. Many common BigQuery use cases involve the storage and processing of Personal Identifiable Information (PII)—data that needs to be protected within …

Connect Gateway and ArgoCD: Deploy to Distributed Kubernetes

Source

Integrating your ArgoCD deployment with Connect Gateway and Workload Identity provides a seamless path to deploy to Kubernetes on many platforms. ArgoCD can easily be configured to centrally manage various cluster platforms including GKE clusters, Anthos clusters, and many more. This promotes consistency across your fleet, saves time in …

Data governance building blocks on Google Cloud for financial services

Source

Data governance includes people, processes, and technology. Together, these principles enable organizations to validate and manage across dimensions such as: Data management, including data and pipelines lifecycle management and master data management. Data protection, spanning data access management, data masking and encryption, along with audit and compliance. Data discoverability …

Leading towards more trustworthy compliance through EU Codes of Conduct

Source

Google is committed to be the best possible place for sustainable digital transformation for European organizations. Our Cloud on Europe’s terms initiative works to meet regional requirements for security, privacy, and digital sovereignty, without compromising on functionality or innovation. In support of this initiative, we are making our …

Cloud CISO Perspectives: August 2022

Source

Welcome to this month’s Cloud CISO Perspectives. This month, we're focusing on the importance of vulnerability reward programs, also known as bug bounties. These programs for rewarding independent security researchers for reporting zero-day vulnerabilities to the software vendor first started appearing around 1995, and have since evolved into …

A comprehensive cloud security approach for state and local governments

Source

While the digitization of government services and operations has helped enhance the constituent experience, it has also increased the cyber threat surface for governments of all sizes. In 2020, 79 ransomware attacks hit government organizations, amounting to nearly $19 billion in downtime and recovery costs 1. Other research indicates …

Introducing on-demand backup, schema extension support for Google Cloud’s Managed Microsoft AD

Source

Managed Service for Microsoft Active Directory (Managed Microsoft AD) is a Google Cloud service that offers highly available, hardened Microsoft Active Directory running on Windows virtual machines. We recently added on-demand backup and schema extension capabilities that can help Google Cloud users more easily and effectively manage AD tasks …

How to avoid cloud misconfigurations and move towards continuous compliance

Source

Security is often seen as a zero-sum game between “go fast” or “stay secure.” We would like to challenge this school of thought and introduce a framework to change that paradigm to a “win-win game,” so you can do both—“go fast” and “stay secure.” Historically, application security tools …

Announcing Virtual Machine Threat Detection now generally available to Cloud customers

Source

Today we are delighted to announce that our unique, first-to-market detection capability with Virtual Machine Threat Detection (VMTD) in Security Command Center is now generally available for all Google Cloud customers. We launched this service six months ago in public preview and have seen a lot of enthusiasm from …

Announcing public availability of Google Cloud Certificate Manager

Source

Today we are pleased to announce that Cloud Certificate Manager is now in general availability. Cloud Certificate Manager enables our users to acquire, manage, and deploy public Transport Layer Security (TLS) certificates at scale for use with your Google Cloud workloads. TLS certificates are required to secure browser connections …

« newer articles | page 15 | older articles »