Showing only posts in GCP Security. Show all posts.

Enabling keyless authentication from GitHub Actions

Source

GitHub Actions is a third-party CI/CD solution popular among many Google Cloud customers and developers. When a GitHub Actions Workflow needs to read or mutate resources on Google Cloud – such as publishing a container to Artifact Registry or deploying a new service with Cloud Run – it must first …

Innovating together to accelerate Germany’s digital transformation

Source

At Google Cloud, we are committed to supporting the next wave of growth for Europe’s businesses and organizations. Germany is one of the largest and most connected global economies, and it is undergoing digital transformation enabled by the use of cloud services. To further support that transformation, we …

Achieving Autonomic Security Operations: Reducing toil

Source

Almost two decades of Site Reliability Engineering (SRE) has proved the value of incorporating software engineering practices into traditional infrastructure and operations management. In a parallel world, we’re finding that similar principles can radically improve outcomes for the Security Operations Center (SOC), a domain plagued with infrastructure and …

Illicit coin mining, ransomware, APTs target cloud users in first Google Cybersecurity Action Team Threat Horizons report

Source

At Google we have an immense aperture into the global cybersecurity threat landscape and the means to mitigate risks that stem from those threats. With our recently launched Google Cybersecurity Action Team, we are bringing more of our security abilities and advisory services to our customers to increase their …

Security Command Center - Increasing operational efficiency with new mute findings capability

Source

Security Command Center (SCC) is Google Cloud’s security and risk management platform that helps manage and improve your cloud security and risk posture. It is used by organizations globally to protect their environments providing visibility into cloud assets, discovering misconfigurations and vulnerabilities, detecting threats, and helping to maintain …

Three reasons to peer SAP-managed apps with your Google Cloud services

Source

Over the past year, RISE with SAP has emerged as a valuable solution for SAP customers seeking a faster, simpler, and more affordable path to the cloud. RISE with SAP is a subscription-based offering that typically includes a number of fully managed cloud application options, including SAP S/4HANA …

Modernizing compliance: Introducing Risk and Compliance as Code

Source

Almost all publicly reported breaches in the cloud stem from misconfigurations, rather than from attacks that compromise underlying cloud infrastructure. Misconfigurations continue to be a source of security risk because most security and compliance practices play catchup - teams are involved later in the CI/CD process and misconfigurations are …

Zero trust workload security with GKE, Traffic Director, and CA Service

Source

At the core of a zero trust approach to security is the idea that trust needs to be established via multiple mechanisms and continuously verified. Internally, Google has applied this thinking to the end-to-end process of running production systems and protecting workloads on cloud-native infrastructure, an approach we call …

How Veolia protects its cloud environment across 31 countries with Security Command Center

Source

The world’s resources are increasingly scarce and yet too often they are wasted. At Veolia, we use waste to produce new resources, helping to build a circular economy that redefines growth with a focus on sustainability. Our sustainability mission transcends borders, and nearly 179,000 employees work in …

Build a more secure future with Google Cloud

Source

In every industry, in every part of the world, cybersecurity concerns continue to grow in the wake of attacks on critical infrastructure and the software supply chain. Governments and businesses of all sizes recognize that they must do more to protect their employees, customers and citizens. But doing more …

How Google Cloud secures the world with our people, platforms and products

Source

In every industry, in every part of the world, cybersecurity concerns continue to grow in the wake of attacks on critical infrastructure and the software supply chain. Governments and businesses of all sizes recognize that they must do more to protect their employees, customers and citizens. But doing more …

Automated onboarding: How USAA’s security team onboards users to GCP

Source

Since 1922, technology and innovation have played an integral role in USAA's ability to serve military members and their families. As membership has grown to over 13 million, the services required to meet members' needs have also evolved. As a result, application teams across our banking and insurance businesses …

Making public services more accessible with AI-powered translations from Google Cloud

Source

Editor’s note : This article has originally been published on our German blog. Imagine you’ve done your due diligence for your upcoming trip to the local authority office. You’ve filled out the relevant forms, booked the appointment, found the correct points of contact. But, as much as …

New data sovereignty controls for EU customers

Source

European organizations—in both the public and private sectors—want a cloud provider that can meet their requirements for security, privacy, and digital sovereignty, without compromising on functionality or innovation. As part of our ‘Cloud. On Europe’s Terms.’ initiative, we’ve been working diligently to provide solutions to …

Built-in transparency, automation, and interoperability for Cloud KMS

Source

Cloud KMS helps customers implement scalable, centralized, fast cloud key management for their projects and apps on Google Cloud. As use of Cloud KMS has grown, many organizations have looked for ways to better understand crypto assets and to make more informed decisions around data management and compliance. In …

Protect your apps from bots with Cloud Armor and reCAPTCHA Enterprise

Source

Unwelcome web traffic from bots has proliferated, becoming a significant contributor to business and operational risk. The motivations of bot controllers range from disruption of business through DDoS attacks to fraud such as credential stuffing, denial of inventory, scraping, and fraudulent card use. Google is well positioned to help …

« newer articles | page 21 | older articles »