Showing only posts in GCP Security. Show all posts.

How Google Cloud blocked the largest Layer 7 DDoS attack at 46 million rps

Source

Over the past few years, Google has observed that distributed denial-of-service (DDoS) attacks are increasing in frequency and growing in size exponentially. Today’s internet-facing workloads are at constant risk of attack with impacts ranging from degraded performance and user experience for legitimate users, to increased operating and hosting …

Helping European education providers navigate privacy assessments

Source

Every student and educator deserves access to learning tools that are private and secure. Google Workspace for Education and Chromebooks have positively transformed teaching and learning, while creating safe learning environments for more than 170 million students and educators around the world. Our education products are built with data …

Announcing curated detections in Chronicle SecOps Suite

Source

A critical component of any security operations team’s job is to deliver high-fidelity detections of potential threats across the breadth of adversary tactics. But increasingly sophisticated threat actors, an expanding attack surface, and an ever-present cybersecurity talent shortage make this task more challenging than ever. Google keeps more …

How a Vulnerability Exploitability eXchange can help healthcare prioritize cybersecurity risk

Source

Diagnosing and treating chronic pain can be complex, difficult, and full of uncertainties for a patient and their treating physician. Depending on the condition of the patient and the knowledge of the physician, making the correct diagnosis takes time, and experimenting with different treatments might be required. This trial-and-error …

Google Workspace and Google Cloud help build the future of work at Airbus

Source

“Any device, anytime, anywhere.” A cohort of CIOs within Airbus believed that the cloud, combined with new ways of working, could provide the foundation for this vision. Google Workspace and Google Cloud have played a pivotal role in helping Airbus realize this new path, transforming security, data management, and …

Introducing Google Cloud and Google Workspace support for multiple Identity providers with Single Sign-On

Source

Google is one of the largest identity providers on the Internet. Users rely on our identity systems to log into Google’s own offerings, as well as third-party apps and services. For our business customers, we provide administratively managed Google accounts that can be used to access Google Workspace …

Introducing easier de-identification of Cloud Storage data

Source

De-identification of Cloud Storage just got easier Many organizations require effective processes and techniques for removing or obfuscating certain sensitive information in the data they store. An important tool to achieve this goal is de-identification. Defined by NIST as a technique that “removes identifying information from a dataset so …

Announcing support for on-premises Windows workloads with Certificate Authority Service

Source

The use of digital certificates to establish trust across our digital infrastructure continues to grow at a rapid pace, driven by development and deployment of cloud-based, containerized, microservice-based applications and the proliferation of connected Internet of Things and smart devices. Google Cloud Certificate Authority Service (CAS) provides a highly …

Five must-know security and compliance features in Cloud Logging

Source

As enterprise and public sector cloud adoption continues to accelerate, having an accurate picture of who did what in your cloud environment is important for security and compliance purposes. Logs are critical when you are attempting to detect a breach, investigating ongoing security issues, or performing forensic investigations. These …

How to help ensure smooth shift handoffs in security operations

Source

Editor's note : This blog was originally published by Siemplify on Oct. 29, 2019. Much the same way that nursing teams need to share patient healthcare updates when their shift ends, security operations centers (SOC) need to have smooth shift-handoff procedures in place to ensure that continuous monitoring of their …

Introducing Cloud Analytics by MITRE Engenuity Center in collaboration with Google Cloud

Source

The cybersecurity industry is faced with the tremendous challenge of analyzing growing volumes of security data in a dynamic threat landscape with evolving adversary behaviors. Today’s security data is heterogeneous, including logs and alerts, and often comes from more than one cloud platform. In order to better analyze …

How Google Cloud can help stop credential stuffing attacks

Source

Google has more than 20 years of experience protecting its core service from Distributed Denial of Service (DDoS) attacks and from the most advanced web application attacks. With Cloud Armor, we have enabled our customers to benefit from our extensive experience of protecting our globally distributed products such as …

Introducing password policies for Cloud SQL for PostgreSQL and MySQL local users

Source

Preventing data breaches is an important priority when creating and managing database environments. Ensuring user and application passwords meet high security standards is crucial for reducing risk and helping to achieve compliance with best practices and regulatory standards. To address these concerns, we are thrilled to announce the general …

Achieving Autonomic Security Operations: Why metrics matter (but not how you think)

Source

What’s the most difficult question a security operations team can face? For some, is it, “Who is trying to attacks us?” Or perhaps, “Which cyberattacks can we detect?” How do teams know when they have enough information to make the “right” decision? Metrics can help inform our responses …

[Infographic] Achieving Autonomic Security Operations: Why metrics matter (but not how you think)

Source

What’s the most difficult question a security operations team can face? For some, is it, “Who is trying to attacks us?” Or perhaps, “Which cyberattacks can we detect?” How do teams know when they have enough information to make the “right” decision? Metrics can help inform our responses …

Providing our EU Education customers’ with data transfer protections to support privacy assessments

Source

Recently, Datatilsynet (the Danish Data Protection Authority) issued a ruling emphasizing the importance of conducting proper due diligence before implementing cloud services. We agree due diligence is an important step for customers since privacy assessments and outcomes can vary significantly based on the way customers have configured their system …

Google supports CSRB call for open source security improvements in wake of log4j report

Source

The U.S. Department of Homeland Security (DHS) recently announced the results of the first report from the Cyber Safety Review Board (CSRB) on the log4j software library vulnerabilities discovered in late 2021. Google welcomed the opportunity to participate in the development of the CSRB report and share our …

Standing shoulder to shoulder - building a resilient healthcare ecosystem with Health-ISAC

Source

Building a resilient healthcare ecosystem is not something done within a vacuum. It takes motivated organizations and people working together in a community of trust to build and defend effectively. We believe the more diverse these communities are, the more effective they can be. Last August, Google announced its …

How Google Cloud SecOps can help solve these 6 key MSSP conundrums

Source

Editor's note : This blog was originally published by Siemplify on October 6, 2021. The COVID-19 pandemic accelerated many organizations’ timelines to transition to the cloud and advance their digital transformation efforts. The potential attack surfaces for those organizations also grew as newly distributed workforces used unmanaged technologies. While some …

« newer articles | page 16 | older articles »