Showing only posts in GCP Security. Show all posts.

With software supply chain security, developers have a big role to play

Source

When it comes to security headlines, 2021 has unfortunately been one for the record books. Colonial Pipeline, which supplies nearly half the United States East Coast’s gasoline, was the victim of a ransomware attack that forced it to take down its systems. Several high-profile breaches, on Kaseya, SolarWinds …

New Paper: Assuring Compliance in the Cloud

Source

Cloud transformation and the adoption of modern DevOps technology presents both opportunities and challenges for IT compliance functions. With DevOps style application development, the feedback loop for developers and engineers is much tighter than with traditional application development pipelines, enabling speed and agility of application release cycles. While speedy …

Extending the power of Chronicle with BigQuery and Looker

Source

Chronicle, Google Cloud’s security analytics platform, is built on Google’s infrastructure to help security teams run security operations at unprecedented speed and scale. Today, we’re excited to announce that we’re bringing more industry-leading Google technology to security teams by integrating Chronicle with Looker and BigQuery …

Modernizing SOC ... Introducing Autonomic Security Operations

Source

Modernizing your Security Operations practice to protect against today’s and tomorrow’s threats is a significant undertaking that involves transforming how people approach security challenges, how workflows are engineered to achieve secure outcomes, and how technologies can be leveraged to maximize their value. Today, we’re thrilled to …

Advancing our trusted cloud with engineered-in, invisible security

Source

Security has risen to the forefront of concerns for enterprises and governments around the globe. Attacks ripping across the software supply chain, zero-day issues in widely used email services, and ransomware attacks on critical infrastructure industries all provide evidence that adversaries are getting bolder, more successful and more prevalent …

Extending our Trusted Cloud: Introducing Cloud IDS for Network-based Threat Detection

Source

Every day, Google Cloud helps customers around the world stay ahead of evolving threats and keep their workloads safe. Today, we’re advancing these efforts with Cloud IDS, our new network security offering, which is now available in preview. With Cloud IDS, we’re extending our trusted cloud with …

What you need to know about Confidential Computing

Source

This blog includes content from Episode One "Confidentially Speaking” of our Cloud Security Podcast, hosted by Anton Chuvakin (Head of Solutions Strategy) and Timothy Peacock (Product Manager). You should listen to the whole conversation for more insights and deeper context. Related Article Read Article We all deal with a …

Cloud Armor: enhancing security at the edge with Adaptive Protection, expanded coverage scope, and new rules

Source

Cloud Armor, Google Cloud’s DDoS defense service and web-application firewall (WAF) helps customers protect their websites and services from denial of service and web attacks every day using the same infrastructure, network, and technology that has protected Google’s own internet-facing properties from the largest DDoS attacks reported …

Reaffirming Google Cloud’s commitments to EU businesses in light of the EDPB’s Recommendations

Source

From retail companies to auto manufacturers and financial services institutions, organizations across Europe rely on our cloud services to run their businesses. We are committed to helping our customers meet stringent data protection requirements by offering industry-leading technical controls, contractual commitments, and continued transparency to support their risk assessments …

Advancing email security for Gmail and beyond with BIMI

Source

Creating a secure-by-default experience based on robust defenses has always been a core design principle for Gmail. That’s why we’ve established a strong baseline of security in Gmail, with built-in protections to help automatically filter out potentially malicious messages. While these defenses help keep Gmail users safe …

Cloud SQL for MySQL launches IAM database authentication

Source

When enterprise IT administrators design their data systems, security is among the most important considerations they have to make. Security is key to defining where data is stored and how users access it. Traditionally, IT administrators have managed user access to systems like SQL databases through issuing users a …

New research: Enterprises more confident than ever in cloud security

Source

Cloud-based solutions were a technology life raft for organizations during the COVID-19 pandemic as employees took to the virtual office and companies scrambled to adjust to a distributed, remote reality. However, these rapid and substantial changes in the role of cloud technologies on the business came with an increased …

Free your business from ransomware with Chrome OS

Source

We’ve ushered in the era of hybrid working, and the flexibility it allows has proven essential to both businesses and employees. However, a distributed workforce creates technology challenges that make it easier for cyber crime to thrive. Ransomware attacks skyrocketed 150% in 2020 ( Harvard Business Review, Group-IB ) with …

A blueprint for secure infrastructure on Google Cloud

Source

When it comes to infrastructure security, every stakeholder has the same goal: maintain the confidentiality and integrity of their company’s data and systems. Period. Developing and operating in the Cloud provides the opportunity to achieve these goals by being more secure and having greater visibility and governance over …

How HBO Max uses reCAPTCHA Enterprise to make its customer experience frictionless

Source

Editor’s note : Randy Gingeleski, Senior Staff Security Engineer for HBO Max and Brian Lozada, CISO for HBO Max, co-authored this blog to share their experiences with reCAPTCHA Enterprise and help other enterprises achieve the same level of security for their customer experiences. The COVID-19 pandemic gave audiences more …

Cloud CISO Perspectives: June 2021

Source

It's been another busy month for security teams around the globe with no signs of slowing down. Many of us virtually attended RSA, and ransomware attacks continue to dominate headlines. The Biden Administration's Executive Order on Cybersecurity is officially underway, with important milestones like the NIST workshops where many …

Google Workspace delivers new levels of trusted collaboration for a hybrid work world

Source

Today we shared more powerful ways for people to stay connected and get more done together with Google Workspace—at home, at school, and at work. As hybrid work becomes the norm for many employees, security, data privacy, and trust continue to be the foundation that make anywhere, anytime …

How Zebra Technologies manages security & risk using Security Command Center

Source

Zebra Technologies enables businesses around the world to gain a performance edge - our products, software, services, analytics and solutions are used principally in the manufacturing, retail, healthcare, transportation & logistics and public sectors. With more than 10,000 partners across 100 countries, our businesses and workflows operate across the interconnected …

New Cloud Asset Inventory capabilities help assess your Google Cloud environment

Source

Businesses that operate in complex cloud environments, large fleets, or sophisticated security operations all require visibility into their cloud assets in order to keep their teams nimble and their data secure. Cloud Asset Inventory (CAI) helps these teams understand their Google Cloud and Anthos environments by providing complete visibility …

Google Cloud welcomes EU’s new Standard Contractual Clauses for cross-border data transfers

Source

The European Commission (EC) has recently published new Standard Contractual Clauses (SCCs, also known as Model Contractual Clauses) to help safeguard European personal data. Following the applicable transition period, these new SCCs will replace the SCCs previously adopted by the EC. Google Cloud plans to incorporate the new SCCs …

Security Command Center now supports CIS 1.1 benchmarks and granular access control

Source

Security Command Center (SCC) is our native Google Cloud product that helps manage and improve your cloud security and risk posture. As a native offering, SCC is constantly evolving and adding new capabilities that deliver more insight to security practitioners. We’ve just released new capabilities in Security Command …

Zero-trust managed security for services with Traffic Director

Source

We created Traffic Director to bring to you a fully managed service mesh product that includes load balancing, traffic management and service discovery. And now, we’re happy to announce the availability of a fully-managed zero-trust security solution using Traffic Director with Google Kubernetes Engine (GKE) and Certificate Authority …

Best practices to protect your organization against ransomware threats

Source

Ransomware, a form of malware that encrypts a user’s or organization’s most important files or data rendering them unreadable, isn’t a novel threat in the world of computer security. These destructive, financially-motivated attacks where cybercriminals demand payment to decrypt data and restore access have been studied …

« newer articles | page 23 | older articles »