Showing only posts in GCP Security. Show all posts.

Cloud CISO Perspectives: The high value of cross-industry communication

Source

Welcome to the first Cloud CISO Perspectives for September 2024. Today I’m taking a look at how our initiatives to drive cybersecurity collaboration across industries, regulators and governments, IT consortia, and researchers and universities can help make everyone safer online. As with all Cloud CISO Perspectives, the contents …

How EA Sports protects their game servers with Cloud Armor

Source

Electronic Arts (EA) is a global leader in digital interactive entertainment, known for its cutting-edge games, innovative services, and powerful technologies. So when EA Sports FC, a leading brand in the gaming industry, needed to choose a cloud provider to host its gaming infrastructure, they selected Google Cloud Armor …

Safer by default: Automate access control with Sensitive Data Protection and conditional IAM

Source

The first step towards protecting sensitive data begins with knowing where it exists. Continuous data monitoring can help you stay one step ahead of data security risks and set proper access controls to ensure data is used for the right reasons while minimizing unnecessary friction. Google Cloud’s Sensitive …

Cloud CISO Perspectives: What you’re missing when you miss out on mWISE Conference

Source

Welcome to the second Cloud CISO Perspectives for August 2024. Today Google Cloud Security’s Peter Bailey talks about our upcoming Mandiant Worldwide Information Security Exchange (mWISE) Conference, and why mWISE can be one of the most valuable events this year for CISOs, security leaders, and those looking to …

A guide to dual-region storage in Google Cloud Storage, now available in Frankfurt, London, Zurich and Belgium

Source

In today's digital landscape, data reliability, availability, and performance are paramount. Businesses and organizations rely on cloud storage solutions that not only ensure that data is safe, but that also provide uninterrupted access and low latency. Cloud Storage is a robust solution to these challenges, offering three distinct types …

Introducing delayed destruction for Secret Manager, a new way to protect your secrets

Source

Secret Manager is a fully-managed, scalable service for storing, operating, auditing and accessing secrets used across Google Cloud services including GKE and Compute Engine. A critical part of any secrets management strategy is managing deletion and destruction of secrets. To provide customers with advanced capabilities in this area, we …

Testing your LLMs differently: Security updates from our latest Cyber Snapshot Report

Source

Web-based large-language models (LLM) are revolutionizing how we interact online. Instead of well-defined and structured queries, people can engage with applications and systems in a more natural and conversational manner — and the applications for this technology continue to expand. While LLMs offer transformative business potential for organizations, their integration …

Google Cloud expands services in Saudi Arabia, delivering enhanced data sovereignty and AI capabilities

Source

Building on the launch of the Google Cloud region in the Kingdom of Saudi Arabia (KSA) in November 2023, we are excited to announce new data sovereignty, security, and AI capabilities for the Dammam region. These new offerings can help support the digital transformation journeys of organizations operating in …

What’s New in Assured Workloads: Enable updates and new control packages

Source

Compliance isn't a one-time goal; it's an ongoing process. As your organization and the regulatory environment evolve, so too does Assured Workloads. Here are the latest additions to our portfolio of software-defined controls and policies that can make supporting your compliance requirements easier on Google Cloud. Introducing Compliance Updates …

Cloud CISO Perspectives: How Google is preparing for post-quantum cryptography (and why you should, too)

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for post-quantum cryptography

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for PQC

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Experimenting with Gemini 1.5 Pro and vulnerability detection

Source

Unpatched software vulnerabilities can have serious consequences. At Google Cloud, we want developers to reduce the risks they face by focusing on developing code that is secure by design and secure by default. While secure development can be time-consuming, generative AI can be used responsibly to help make that …

Create a powerful Kubernetes security duo with Custom Org Policy and Policy Controller

Source

To help customers implement defense in depth strategies, Google Cloud offers multiple layers of centralized resource governance controls that can help organizations securely scale their Google Cloud adoption across thousands of projects, APIs, and developers. These controls can help administrators strengthen security and support compliance across their entire org …

Level up your Kubernetes security with the CIS GKE Benchmarks

Source

Compliance efforts can feel like a challenging endeavor in most organizations. Engineering teams routinely don’t understand how often-confusing requirements will actually make the organization more secure. Sometimes, even the words that define compliance requirements can be hard to comprehend. The entire exercise can feel overwhelming, like being on …

Join Google Cloud Security Summit 2024 for a masterclass in modernizing security

Source

As your organization works to strengthen your security program, two complementary initiatives can help make a major impact: taking advantage of secure cloud platforms, and integrating dynamic intelligence and security operations. We’re emphasizing both of these in the dual-track agenda at our annual Google Cloud Security Summit on …

mWISE Conference 2024: Your front-row seat to the future of cybersecurity

Source

The cybersecurity landscape is constantly evolving, and staying ahead of the curve requires the power of collective intelligence. mWISE Conference 2024 is your chance to immerse yourself in the latest threat intelligence, cutting-edge tools, and engage with the strategic minds that are shaping the future of cybersecurity. Now in …

Announcing VPC Service Controls with private IPs to extend data exfiltration protection

Source

Google Cloud’s VPC Service Controls can help organizations mitigate the risk of data exfiltration from their Google Cloud managed services. VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping you limit access to your sensitive data. Today, we are excited to …

Introducing Spanner dual-region configurations that help maintain high availability and data residency

Source

Spanner is Google’s fully managed, globally distributed database with high throughput and virtually unlimited scale. Spanner processes over 4 billion queries per second at peak. With features such as automatic sharding, zero downtime, and strong consistency, Spanner powers demanding, global workloads — not only across customers in financial services …

Cyber Public Health: A new approach to cybersecurity

Source

At Google, we believe the approach to cloud infrastructure should be informed, in part, by understanding the relative “health” of the Internet. Defining and measuring these vital statistics can help proactively and systemically identify and address conditions that make the internet unhealthy, unsafe and insecure. Crucially, they can be …

How to build user authentication into your gen AI app-accessing database

Source

Generative AI agents introduce immense potential to transform enterprise workspaces. Enterprises from almost every industry are exploring the possibilities of generative AI, adopting AI agents for purposes ranging from internal productivity to customer-facing support. However, while these AI agents can efficiently interact with data already in your databases to …

« newer articles | page 2 | older articles »