Showing only posts in GCP Security. Show all posts.

Government workers say Microsoft tech makes them less secure: new survey

Source

Prior to joining Google Cloud, I spent 20 years in the public sector serving in various security roles, most recently as the head of the cybersecurity division at the newly established Cybersecurity and Infrastructure Security Agency (CISA). I was responsible for delivering services and capabilities to about 100 civilian …

Automate Public Certificates Lifecycle Management via RFC 8555 (ACME)

Source

We’re excited to announce an enhancement of our preview of Certificate Manager which allows Google Cloud customers to acquire public certificates for their workloads that terminate TLS directly or for their cross-cloud and on-premise workloads. This is accomplished via the Automatic Certificate Management Environment ( ACME ) protocol which is …

An update on Google Cloud’s commitments to E.U. businesses in light of the new E.U.-U.S. data transfer framework

Source

Last week, the European Commission and U.S. Government agreed on a new E.U.-U.S. data transfer framework. Earlier today, Google shared that it welcomes these efforts by the U.S. government to enhance privacy protections for E.U. data and facilitate trusted transatlantic data flows. For …

The key role ‘visibility’ plays in healthcare’s cybersecurity resilience

Source

When technology just works, it's easy to trust. But too often, we place our trust in technology that doesn’t deserve it. When we do this with technology to provide healthcare, we put the safety of patients and the security and reliability of our global healthcare system at risk …

Federated workload identity at scale made easy with CA Service

Source

At the end of 2021, we announced the ability for Google Cloud Certificate Authority (CA) Service to issue certificates for workloads reflecting their federated identities, even if the workloads are hosted on-premises or in other clouds. We are excited to announce this capability is now generally available, advancing our …

In case you missed it: Google Cloud Security Talks, Threat Detection & Response Edition

Source

We recently held our first Google Cloud Security Talks event of 2022. The event focused on all things security operations (SecOps) across on-premises, cloud and hybrid environments. We shared product updates across the portfolio and talked about how threat detection, investigation and response fits into our invisible security vision …

Powering Security Operations with context-aware detections, alert prioritization and risk scoring in Google Chronicle

Source

With today’s rapidly escalating threat landscape, it is important that our customers have access to relevant context across their entire IT stack, whether it’s in the cloud, on-premise, or a combination of both, while responding to malicious threats. An alert in isolation does not provide sufficient information …

Introducing Community Security Analytics

Source

As more organizations embrace the principles of Autonomic Security Operations, we continue to research and develop new initiatives that can simplify the adoption of a continuous detection and continuous response (CD/CR) workflow for Security Operations teams. To this end, we’re excited to announce Community Security Analytics (CSA …

Protect your users’ accounts with reCAPTCHA Enterprise’s account defender

Source

reCAPTCHA Enterprise is Google’s online fraud detection service that leverages over a decade of experience defending the internet. reCAPTCHA Enterprise can be used to prevent fraud and attacks perpetrated by scripts, bot software, or humans. When installed on a web page at the point of action, such as …

Advancing Autonomic Security Operations: New resources for your modernization journey

Source

We launched our Autonomic Security Operations solution with a mission to accelerate the world's adoption of more modern threat management strategies. Ultimately, the goal is to shift the industry away from a product-centric approach to detection and response to a more principled approach focused on modernizing your Security Operations …

Accelerate Google Cloud vendor due diligence by leveraging third party risk management providers

Source

As organizations accelerate adoption of cloud services to deliver innovative solutions and experiences for their customers, risk and compliance teams are adjusting their due diligence programs to better understand and manage the risks associated with outsourcing of business critical workloads. At the core of these efforts is protecting sensitive …

Google Cloud’s security and resiliency measures for customers and partners

Source

As the tragic Russian invasion of Ukraine continues, we want to provide customers and partners with an update on how Google Cloud is providing resources for organizations, protecting against potential cyberattacks, and delivering network resiliency. We continue to work closely with U.S. and international officials in our approach …

Control access to microservices with gRPC and Traffic Director

Source

We are excited to announce Traffic Director’s general availability of client authorization by proxyless gRPC services. This release, in conjunction with Traffic Director’s capability for managing mutual TLS (mTLS) credentials for Google Kubernetes Engine (GKE), enables customers to centrally manage access between workloads using Traffic Director. With …

How healthcare can strengthen its own cybersecurity resilience

Source

With all the crises that have buffeted the healthcare and life sciences industries the past two years, one that often gets overlooked is the unceasing wave of cyberattacks aimed at medical, research, educational, and public health organizations. These attacks have shut down critical systems, attempted to steal vaccines and …

Achieving Autonomic Security Operations: Automation as a Force Multiplier

Source

As we discussed in “Achieving Autonomic Security Operations: Reducing toil”, your Security Operations Center (SOC) can learn lessons from Site Reliability Engineering (SRE) This means that applying software engineering practices to security operations challenges can radically improve an organization’s security. In this post, we discuss how you can …

Protecting customers against cryptomining threats with VM Threat Detection in Security Command Center

Source

As organizations move to the cloud, VM-based architectures continue to make up a significant portion of compute-centric workloads. To help ensure strong protection for these deployments, we are thrilled to announce a public preview of our newest layer of threat detection in Security Command Center (SCC): Virtual Machine Threat …

Strengthening our European data sovereignty offerings with Assured Workloads for EU

Source

European organizations, both public and private, are migrating their operations and data to the cloud in increasing numbers. In doing so, they need confidence they can meet their unique needs for security, privacy, and digital sovereignty. Key requirements include the ability to store data within a European geographic region …

Introducing Certificate Manager to simplify SaaS scale TLS and certificate management

Source

We’re excited to announce the public preview of Certificate Manager and its integration with External HTTPS Load Balancing. Certificate Manager enables you to use External HTTPS Load Balancing with as many certificates or domains as you need. You can bring your own TLS certificates and keys if you …

Encrypt Data Fusion data and metadata using Customer Managed Encryption Keys (CMEK)

Source

We are pleased to announce the general availability of Customer Managed Encryption Keys (CMEK) integration for Cloud Data Fusion. CMEK enables encryption of both user data and metadata at rest with a key that you can control through Cloud Key Management Service (KMS). This capability will help meet the …

« newer articles | page 19 | older articles »