Showing only posts in GCP Security. Show all posts.

Compliance with confidence: Introducing Assured Workloads Support

Source

As organizations in regulated industries modernize and adopt cloud technologies, ensuring the security, privacy, and regulatory compliance of their sensitive workloads is an essential part of choosing a cloud provider. Regulated customers have specific compliance needs around data locality and personnel access to customer data. In the US specifically …

The cloud trust paradox: 3 scenarios where keeping encryption keys off the cloud may be necessary

Source

As we discussed in “The Cloud trust paradox: To trust cloud computing more, you need the ability to trust it less” and hinted at in “ Unlocking the mystery of stronger security key management,” there are situations where the encryption keys must be kept away from the cloud provider environment …

Limiting public IPs on Google Cloud

Source

You’ve heard this saying: Hope is not a strategy when it comes to security. You have to approach security from all angles, while minimizing the burden on dev and SecOps. But with an ever increasing number of endpoints, networks, and attack surfaces, setting automated and trickle down security …

BeyondCorp Enterprise: Introducing a safer era of computing

Source

Security issues continue to disrupt the status quo for global enterprises. Recent incidents highlight the need to re-think our security plans and operations; attackers are getting smarter, attacks are more sophisticated, and assumptions about what is and isn’t locked down no longer hold. The challenge, however, is to …

New whitepaper: Designing and deploying a data security strategy with Google Cloud

Source

William Gibson said it best: “The future is already here—it’s just not evenly distributed.” The cloud has arrived. Data security in the cloud is too often a novel problem for our customers. Well-worn paths to security are lacking. We often see customers struggling to adapt their data …

Enforcing least privilege by bulk-applying IAM recommendations

Source

Imagine this scenario: Your company has been using Google Cloud for a little while now. Things are going pretty well—no outages, no security breaches, and no unexpected costs. You've just begun to feel comfortable when an email comes in from a developer. She noticed that the project she …

How we’re helping to reshape the software supply chain ecosystem securely

Source

As we start the new year, we see ongoing revelations about an attack involving SolarWinds and others, that in turn led to the compromise of numerous other organizations. Software supply chain attacks like this pose a serious threat to governments, companies, non-profits, and individuals alike. At Google, we work …

4 best practices for ensuring privacy and security of your data in Cloud Storage

Source

Cloud storage enables organizations to reduce costs and operational burden, scale faster, and unlock other cloud computing benefits. At the same time, they must also ensure they meet privacy and security requirements to restrict access and protect sensitive information. Security is a common concern we hear from companies as …

« newer articles | page 26