Showing only posts in GCP Security. Show all posts.

Expanding our Risk Protection Program with new insurance partners and AI coverage

Source

Today’s businesses have a vital need to manage and, when appropriate, transfer cyber risk in their cloud environments — even with robust security measures in place. At Google Cloud Next last month, we unveiled significant advancements to our Risk Protection Program, an industry-first collaboration between Google and leading cyber …

Cloud CISO Perspectives: Data-driven insights into AI and cybersecurity

Source

Welcome to the second Cloud CISO Perspectives for April 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, will talk about the practical applications of AI in both attack and defense, adapted from her RSA Conference keynote. As with all Cloud CISO Perspectives, the contents of this newsletter are …

From insight to action: M-Trends, agentic AI, and how we’re boosting defenders at RSAC 2025

Source

Cybersecurity is facing a unique moment, where AI-enhanced threat intelligence, products, and services are poised to give defenders an advantage over the threats they face that’s proven elusive — until now. To empower security teams and business leaders in the AI era, and to help organizations proactively combat evolving …

Announcing cloud-native integration of security service edge (SSE) with Cloud WAN

Source

Last week at Google Cloud Next 25, we announced Cloud WAN, a fully managed, reliable, and secure solution for enterprise wide area network (WAN) architectures that’s built on Google’s planet-scale network. Today, we begin a series of deep dives into the products that power Cloud WAN, starting …

Driving secure innovation with AI and Google Unified Security

Source

Today at Google Cloud Next, we are announcing Google Unified Security, new security agents, and innovations across our security portfolio designed to deliver stronger security outcomes and enable every organization to make Google a part of their security team. Introducing Google Unified Security Enterprise infrastructure continues to grow in …

Cloud CISO Perspectives: How digital sovereignty builds better borders for the future

Source

Welcome to the second Cloud CISO Perspectives for March 2025. Today, Archana Ramamoorthy, senior director of product management, Google Cloud, explains our approach to digital sovereignty and we believe strongly in meeting this vital customer need. As with all Cloud CISO Perspectives, the contents of this newsletter are posted …

Secure backups with end-to-end workflows for threat detection and remediation

Source

Data backups are a lifeline and the ultimate safeguard when your organization is faced with unexpected disruption. Last year, we introduced backup vault, a powerful storage feature available as part of the Google Cloud Backup and Disaster Recovery (DR) service. Backup vault secures backups against tampering and unauthorized deletion …

Securing the future of football: Google Cloud and Atlético de Madrid expand cybersecurity partnership

Source

In an era where digital security is more important than ever, Atlético de Madrid is strengthening its defenses beyond the pitch. Known for their resilience and tactical discipline on the field, the club is taking the same proactive approach to securing its digital operations and fan experience. At Google …

Mastering secure AI on Google Cloud, a practical guide for enterprises

Source

Introduction As we continue to see rapid AI adoption across the industry, organizations still often struggle to implement secure solutions because of the new challenges around data privacy and security. We want customers to be successful as they develop and deploy AI, and that means carefully considering risk mitigation …

Cloud CISO Perspectives: 5 tips for secure AI success

Source

Welcome to the first Cloud CISO Perspectives for March 2025. Today, Royal Hansen, vice-president, Engineering, and Nick Godfrey, Office of the CISO senior director, discuss how new AI Protection capabilities in Security Command Center fit in with our overall approach to securing AI — and offer five tips on how …

Protecting your APIs from OWASP’s top 10 security threats

Source

APIs are an integral part of modern services, and the data they exchange is often highly sensitive. Without proper authentication, authorization, and protection against data leakage, your organization and your end users will face an increased risk of cyberattacks. The Open Worldwide Application Security Project ( OWASP ) develops and publishes …

Project Shield makes it easier to sign up, set up, automate DDoS protection

Source

As part of Google's commitment to making the world's information universally accessible, we offer Project Shield to at-risk organizations who need free distributed denial-of-service (DDoS) protection. Organizations in eligible categories, including news publishers, government elections, and human rights defenders, can use the power of Google Cloud’s networking services …

Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave

Source

We're pleased to announce that Google has been recognized as a Leader in The Forrester WaveTM: Data Security Platforms, Q1 2025 report. We believe this is a testament to our unwavering commitment to providing cutting-edge data security in the cloud. In today's AI era, comprehensive data security is paramount …

Cloud CISO Perspectives: Prepare early for PQC to be resilient against tomorrow’s cryptographic threats

Source

Welcome to the second Cloud CISO Perspectives for February 2025. Today, Christiane Peters from our Office of the CISO explains why post-quantum cryptography may seem like the future’s problem, but it will soon be ours if IT doesn’t move faster to prepare for it. Here’s what …

Announcing quantum-safe digital signatures in Cloud KMS

Source

The continued advancement of experimental quantum computing has raised concerns about the security of many of the world's widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential highlights the need for developers to build and implement quantum-resistant …

Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices

Source

Welcome to the first Cloud CISO Perspectives for February 2025. Stephanie Kiel, our head of cloud security policy, government affairs and public policy, discusses two parallel and important security conversations she had at the Munich Security Conference, following our new reports on AI and cybercrime. As with all Cloud …

Enhance Gemini model security with content filters and system instructions

Source

As organizations rush to adopt generative AI-driven chatbots and agents, it’s important to reduce the risk of exposure to threat actors who force AI models to create harmful content. We want to highlight two powerful capabilities of Vertex AI that can help manage this risk — content filters and …

« newer articles | page 4 | older articles »