Showing only posts in GCP Security. Show all posts.

10 questions to help boards safely maximize cloud opportunities

Source

The accelerating pursuit of cloud-enabled digital transformations brings new growth opportunities to organizations, but also raises new challenges. To ensure that they can lock in newfound agility, quality improvements, and marketplace relevance, boards of directors must prioritize safe, secure, and compliant adoption processes that support this new technological environment …

Raising the bar in Security Operations: Google Acquires Siemplify

Source

At Google Cloud, we are committed to advancing invisible security and democratizing security operations for every organization. Today, we’re proud to share the next step in this journey with the acquisition of Siemplify, a leading security orchestration, automation and response (SOAR) provider. Siemplify shares our vision in this …

In case you missed it: Google Cloud Security Talks, Zero Trust Edition

Source

Yesterday we held our final Google Cloud Security Talks event of 2021. Our event focused on zero trust and covered everything from Google’s history with BeyondCorp to our strategic thinking when it comes to applying zero trust principles to production environments. We shared product updates across the portfolio …

Compliance Engineering - Continuous Compliance GCP case studies

Source

Our previous article provided tools and techniques to transform your productionalization process and make it ready for Cloud workloads. In this post, we will cover technical examples of GCP controls and how it can help your organization maintain your security and compliance posture in GCP. In comparison to on-prem …

Google Cloud recommendations for investigating and responding to the Apache “Log4j 2” vulnerability

Source

Editor's note : This post was updated on 12/15/21 at 12:45pm PST. In this post, we provide recommendations from the Google Cybersecurity Action Team and discuss Google Cloud and Chronicle solutions to help security teams to manage the risk of the Apache “Log4j 2” vulnerability ( CVE-2021-44228 and …

Google Cloud recommendations for investigating and responding to the Apache “Log4j 2” vulnerability (CVE-2021-44228)

Source

In this post, we’ll provide recommendations from the Google Cybersecurity Action Team and discuss solutions available to Google Cloud customers and security teams to manage the risk of the Apache “Log4j 2” vulnerability ( CVE-2021-44228 ). Please visit Google Cloud’s advisory page for the latest updates on our assessment …

Investigating the usage of GCP Service Accounts

Source

Service accounts on Google Cloud are used when a workload needs to access resources or conduct actions without end-user involvement. There are multiple methods of authenticating using service accounts, including using service accounts as part of Google Compute Engine instances, impersonating service accounts, or using service accounts with a …

Google Cloud IDS signature updates help detect Apache Log4j vulnerabilities CVE-2021-44228, CVE-2021-45046, CVE-2021-4104 & CVE-2021-45105

Source

Editor’s note : As of 12/21/2021 2:45pm PST, this post was updated to indicate that detections for CVE-2021-45105 are now present in production As of 12/20/2021 at 2:15pm PST, this post was updated to indicate that detections for CVE-2021-4104 are present in production …

Google Cloud IDS signature updates help detect Apache Log4j vulnerabilities CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105 & CVE-2021-44832

Source

Editor’s note : As of 1/4/2022 3:00pm PST, this post was updated to indicate that detections for CVE-2021-44832 are now present in production. Full change log can be found in the footnotes. NIST has announced recent vulnerabilities ( CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105 & CVE-2021-44832 ) in the Apache Log4j …

Google Cloud IDS signature updates help detect CVE-2021-44228 & CVE-2021-45046 Apache Log4j vulnerability

Source

Editor's note : As of 12/16/2021 at 3:45pm PST, this post was updated to include information about detections for CVE-2021-45046. NIST has announced a recent vulnerability ( CVE-2021-44228 ) in the Apache Log4j library. To help with detection, Google Cloud IDS customers can now monitor and detect attempted exploits …

Google Cloud IDS signature updates help detect CVE-2021-44228, CVE-2021-45046, & CVE-2021-4104 Apache Log4j vulnerabilities

Source

Editor’s note : As of 12/20/2021 at 2:15pm PST, this post was updated to indicate that detections for CVE-2021-4104 are present in production As of 12/19/2021 at 1:51pm PST, this post was updated to indicate that detections for CVE-2021-45046 are now present in …

Google Cloud IDS signature updates to help detect CVE-2021-44228 Apache Log4j vulnerability

Source

NIST has announced a recent vulnerability ( CVE-2021-44228 ) in the Apache Log4j library. To help with detection, Google Cloud IDS customers can now monitor and detect attempted exploits of CVE-2021-44228. Background The Apache Log4j utility is a commonly used component for logging requests. On December 9, 2021, a vulnerability was …

Google Cloud Armor WAF rule to help mitigate CVE-2021-44228 Apache Log4j vulnerability

Source

NIST has announced a recent vulnerability ( CVE-2021-44228 ) in the Apache Log4j library. To help mitigate the effects of this vulnerability, Google Cloud Armor customers can now deploy a new preconfigured WAF rule that will help detect and, optionally, block attempted exploits of CVE-2021-44228. Background The Apache Log4j utility is …

Software-Defined community cloud - a new way to “Government Cloud”

Source

Google has a long history and deep commitment to innovation in the public sector and regulated markets including healthcare, financial services, and telecommunications, to name a few. Recently, we’ve made significant advances in our security and compliance offerings and capabilities in order to better enable government and government …

Cloud IDS for network-based threat detection is now generally available

Source

As more and more applications move to the cloud, cloud network security teams have to keep them secure against an ever-evolving threat landscape. Shielding applications against network threats is also one of the most important criteria for regulatory compliance. For example, effective intrusion detection is a requirement of the …

How MEDITECH adds advanced security to its cloud-based healthcare solutions with Cloud IDS

Source

MEDITECH develops electronic health record (EHR) systems solutions that enhance the interactions of physicians and clinicians with patients. The company empowers healthcare organizations large and small to deliver secure, cost-effective patient care. MEDITECH's intuitive and mobile offerings include software for health information management, patient care and patient safety, emergency …

How Vuclip safeguards its cloud environment across 100+ projects with Security Command Center

Source

Entertainment has never been more accessible. As our phones are now an inextricable part of our lives, there’s an increasing appetite for mobile video content, and that is what Vuclip delivers. Vuclip is a leading video-on-demand service for mobile devices with more than 41 million monthly active users …

« newer articles | page 20 | older articles »