Showing only posts in GCP Security. Show all posts.

How to protect your site from DDoS attacks with the power of Google Cloud networking and network security

Source

Google Cloud constantly innovates and invests significantly in our capabilities to stop cyberattacks such as distributed denial-of-service attacks from taking down websites, apps, and services. It’s an essential part of protecting our customers. Our Project Shield offering, which uses Google's Cloud networking and our Global Front End infrastructure …

Announcing new Confidential Computing updates for even more hardware security options

Source

Google Cloud is committed to ensuring that your data remains safe, secure, and firmly under your control. This begins with fortifying the very foundation of your compute infrastructure — your Compute Engine virtual machines (VMs) — with the power of Confidential Computing. Confidential Computing protects data while it’s being used …

How virtual red team technology can find high-risk security issues before attackers do

Source

Cloud security teams use cloud-native application protection platforms (CNAPPs) to find misconfigurations and vulnerabilities in their multi-cloud environments. While these solutions can discover thousands of potential security issues in large cloud environments, many fail to answer two fundamental cloud security questions: “Where am I most at risk?” and “What …

Cloud CISO Perspectives: How CISOs can work with cloud providers to improve incident response

Source

Welcome to the second Cloud CISO Perspectives for September 2024. Today, Google Cloud’s Vinod D’Souza and Chris Cornillie examine the vital role that CISOs play in working with cloud providers to improve their organization’s incident preparedness. As with all Cloud CISO Perspectives, the contents of this …

Google named a Leader in IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment

Source

Security information and event management (SIEM) systems are the backbone of most security operations centers and security teams rely on them for effective threat detection, investigation, and response. We’re thrilled to share that Google has been named a Leader in the IDC MarketScape: Worldwide SIEM for Enterprise 2024 …

How to get started with automatic password rotation on Google Cloud

Source

Introduction Password rotation is a broadly-accepted best practice, but implementing it can be a cumbersome and disruptive process. Automation can help ease that burden, and in this guide we offer some best practices to automate password rotation on Google Cloud. As an example, we share a reference architecture to …

Introduction to Threat Intelligence and Attribution course, now available on-demand

Source

Ask 10 cybersecurity experts to define “attribution” and they would likely provide as many different answers. The term has become an industry buzzword for the process by which evidence of a breach is converted into a public disclosure naming the attackers responsible. In reality, attribution is the result of …

Announcing expanded CIEM support to reduce multicloud risk in Security Command Center

Source

Identities can be a major source of cloud risk when they’re not properly managed. Compromised credentials are frequently used to gain unauthorized access to cloud environments, which often magnifies that risk since many user and service accounts are granted access to cloud services and assets beyond their required …

Activating your defender's advantage at mWISE ‘24

Source

To stay ahead of evolving threats, security leaders and practitioners must tap into a vital but underutilized tool to strengthen their defenses: collaboration. The power of communication and knowledge-sharing among peers can help defenders seize the advantage when fighting threat actors who repeat the same tactics, techniques, and procedures …

How to prevent account takeovers with new certificate-based access

Source

Stolen credentials are one of the top attack vectors used by attackers to gain unauthorized access to user accounts and steal information. At Google, we’re continually evolving security capabilities and practices to make our cloud the most trusted cloud. To help protect your organization from stolen credentials, cookie …

Cloud CISO Perspectives: The high value of cross-industry communication

Source

Welcome to the first Cloud CISO Perspectives for September 2024. Today I’m taking a look at how our initiatives to drive cybersecurity collaboration across industries, regulators and governments, IT consortia, and researchers and universities can help make everyone safer online. As with all Cloud CISO Perspectives, the contents …

How EA Sports protects their game servers with Cloud Armor

Source

Electronic Arts (EA) is a global leader in digital interactive entertainment, known for its cutting-edge games, innovative services, and powerful technologies. So when EA Sports FC, a leading brand in the gaming industry, needed to choose a cloud provider to host its gaming infrastructure, they selected Google Cloud Armor …

Safer by default: Automate access control with Sensitive Data Protection and conditional IAM

Source

The first step towards protecting sensitive data begins with knowing where it exists. Continuous data monitoring can help you stay one step ahead of data security risks and set proper access controls to ensure data is used for the right reasons while minimizing unnecessary friction. Google Cloud’s Sensitive …

Cloud CISO Perspectives: What you’re missing when you miss out on mWISE Conference

Source

Welcome to the second Cloud CISO Perspectives for August 2024. Today Google Cloud Security’s Peter Bailey talks about our upcoming Mandiant Worldwide Information Security Exchange (mWISE) Conference, and why mWISE can be one of the most valuable events this year for CISOs, security leaders, and those looking to …

A guide to dual-region storage in Google Cloud Storage, now available in Frankfurt, London, Zurich and Belgium

Source

In today's digital landscape, data reliability, availability, and performance are paramount. Businesses and organizations rely on cloud storage solutions that not only ensure that data is safe, but that also provide uninterrupted access and low latency. Cloud Storage is a robust solution to these challenges, offering three distinct types …

Introducing delayed destruction for Secret Manager, a new way to protect your secrets

Source

Secret Manager is a fully-managed, scalable service for storing, operating, auditing and accessing secrets used across Google Cloud services including GKE and Compute Engine. A critical part of any secrets management strategy is managing deletion and destruction of secrets. To provide customers with advanced capabilities in this area, we …

Testing your LLMs differently: Security updates from our latest Cyber Snapshot Report

Source

Web-based large-language models (LLM) are revolutionizing how we interact online. Instead of well-defined and structured queries, people can engage with applications and systems in a more natural and conversational manner — and the applications for this technology continue to expand. While LLMs offer transformative business potential for organizations, their integration …

Google Cloud expands services in Saudi Arabia, delivering enhanced data sovereignty and AI capabilities

Source

Building on the launch of the Google Cloud region in the Kingdom of Saudi Arabia (KSA) in November 2023, we are excited to announce new data sovereignty, security, and AI capabilities for the Dammam region. These new offerings can help support the digital transformation journeys of organizations operating in …

What’s New in Assured Workloads: Enable updates and new control packages

Source

Compliance isn't a one-time goal; it's an ongoing process. As your organization and the regulatory environment evolve, so too does Assured Workloads. Here are the latest additions to our portfolio of software-defined controls and policies that can make supporting your compliance requirements easier on Google Cloud. Introducing Compliance Updates …

Cloud CISO Perspectives: How Google is preparing for post-quantum cryptography (and why you should, too)

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for post-quantum cryptography

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for PQC

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

« newer articles | page 2 | older articles »