Showing only posts in GCP Security. Show all posts.

Improve your security posture with new Overly Permissive Firewall Rule Insights

Source

Are you a network security engineer managing large shared VPCs with many projects and applications deployed, and struggling to clean up hundreds of firewall rules accumulated overtime in the VPC firewall rule set? Are you a network admin setting up open firewall rules to accelerate cloud migration, but later …

Tales from the (en)crypt: What's new for Cloud Storage security

Source

Encryption is critical for securing sensitive data while it is stored and transits the cloud. Today, Cloud Storage encrypts data server-side with standard Google-managed encryption keys by default, and can also encrypt data with customer-managed encryption keys that are stored and managed by Cloud Key Management Service (Cloud KMS …

Updated data processing terms to reflect new EU Standard Contractual Clauses

Source

For years, Google Cloud customers who are subject to European data protection laws 1 have relied on our Standard Contractual Clauses (SCCs), as previously approved by regulators, to legitimize overseas transfers of their customer personal data when using our services. Today, we are glad to announce an update to …

Network security threat detection - Comparison of analytics methods

Source

Jaliesha is responsible for cybersecurity within the DevOps team at her cloud-native software service company – they call it DevSecOps. She has several requirements pressing down on her as their offering explodes in popularity and they take in their second round of VC funding: Meet compliance requirements for Intrusion Detection …

Helping build the digital future. On Europe’s terms.

Source

Cloud computing is globally recognized as the single most effective, agile and scalable path to digitally transform and drive value creation. It has been a critical catalyst for growth, allowing private organizations and governments to support consumers and citizens alike, delivering services quickly without prohibitive capital investment. European organizations …

How Caribou Coffee uses reCAPTCHA Enterprise to create safe and frictionless digital experiences

Source

Like most businesses, we are constantly evolving and innovating to keep pace with the digital world. Last year, many experiences we had with our customers shifted to being online. And while our virtual customer interactions increased, so did attempted attacks. We needed to secure our customers’ experiences while simultaneously …

Protecting Healthcare data with DLP: A guide for getting started

Source

Protecting patient data is of paramount importance to any healthcare provider. This is not only because of the many laws and regulations in different countries around the world requiring this data to be safeguarded, but it is a foundational requirement for trust between a provider and their patient. This …

Shift security left with on-demand vulnerability scanning

Source

Detection and remediation of security vulnerabilities before they reach deployment is critical in a cloud-native world. This makes scanning for vulnerabilities early and often an important part of continuous integration and delivery (CI/CD) processes. The earlier a problem is detected, the fewer downstream issues will occur. The process …

What's the key to a more secure Cloud Function? It's a secret!

Source

Google Cloud Functions provides a simple and intuitive developer experience to execute code from Google Cloud, Firebase, Google Assistant, or any web, mobile, or backend application. Oftentimes that code needs secrets—like API keys, passwords, or certificates—to authenticate to or invoke upstream APIs and services. While Google Secret …

Introducing security configuration for gRPC apps with Traffic Director

Source

Developers use the gRPC RPC framework for use cases like backend service-to-service communications or client-server communications between web, mobile and cloud. In July 2020, we announced support for proxyless gRPC services to reduce operational complexity and improve performance of service meshes with Traffic Director, our managed control plane for …

Manage data exfiltration risks in Cloud Run with VPC Service Controls

Source

Enterprises looking to take advantage of the scalability and ease-of-use associated with cloud technology have often turned to serverless computing architectures. In these systems, a cloud provider allocates resources on-demand as required by a particular workload, and abstracts much of the management of an application or system for a …

Introducing Unattended Project Recommender: discover, reclaim, or deprecate abandoned projects under your organization

Source

In fast-moving organizations, it's not uncommon for cloud resources, including entire projects, to occasionally be forgotten about. Not only such unattended resources can be difficult to identify, but they also tend to create a lot of headaches for product teams down the road, including unnecessary waste and security risks …

Compliance Engineering - From manual attestation to continuous compliance

Source

Risk Management and Compliance is as important in the cloud as it is in conventional on-premises environments. To help organizations in regulated industries meet their compliance requirements, Google Cloud offers automated capabilities that ensure the effectiveness of productionalization processes. Continuous compliance in the banking industry Banks have a formidable …

Getting the most out of Cloud IDS for advanced network threat detection

Source

Google Cloud IDS, now available in preview, delivers cloud-native, managed, network-based threat detection, built with Palo Alto Networks’ industry-leading threat detection technologies to provide high levels of security efficacy. Cloud IDS can help customers gain deep insight into network-based threats and support industry-specific compliance goals that call for the …

Securing the software development lifecycle with Cloud Build and SLSA

Source

One of the biggest challenges for software developers is the need to make informed choices about the external software and products they use in their own software systems. Evaluating whether a given system is appropriately secured can be challenging, especially if it’s external or owned by a third …

Why retailers should run in our trusted cloud

Source

Whether they were ready for it or not, the COVID-19 pandemic transformed many retailers into digital businesses. Retailers made huge investments into commerce technologies, customer experience tools, sales and fulfillment technology, and improving digital experiences to continue providing their goods and services to their customers. Now, more than a …

« newer articles | page 22 | older articles »