Showing only posts in GCP Security. Show all posts.

Announcing the general availability of Next Gen Firewall Enterprise

Source

In today's ever-evolving threat landscape, organizations require robust network security solutions to protect their critical assets in the cloud. Google Cloud is committed to providing superior cloud-first security controls, and today at Google Cloud Next, we're thrilled to announce the general availability of Google Cloud NGFW Enterprise, our next-generation …

Introducing Isolator: Enabling secure multi-party collaboration with healthcare data

Source

With more than a decade of experience building AI and machine learning models, Google Cloud understands both the benefits and challenges that await those looking to take advantage of these new technologies. Organizations around the world are now looking to AI solutions to solve some of their thornier problems …

Expanded Confidential Computing portfolio and introducing Confidential Accelerators for AI workloads

Source

Confidential Computing can help organizations process sensitive data in the cloud with strong guarantees around confidentiality. We’ve continued to make strides in maturing this important technology, and are collaborating with industry leaders including Intel, AMD, and NVIDIA on advancing Confidential Computing solutions. Today at Google Cloud Next, we …

Introducing Shadow API detection for your Google Cloud environments

Source

Enterprises operate a large and growing number of APIs — more than 200 on average — each a potential front door to sensitive data. Even more challenging can be figuring out which of these APIs are not actively managed “shadow APIs”. Born from well-intended development initiatives and legacy systems, shadow APIs …

Introducing Chrome Enterprise Premium: The future of endpoint security

Source

Today at Google Cloud Next, we are announcing a new frontline of defense for organizations: Chrome Enterprise Premium, an offering that can help simplify and strengthen endpoint security. With Chrome Enterprise Premium, the latest evolution of the world’s most trusted enterprise browser, hundreds of millions of enterprise users …

Make Google part of your security team anywhere you operate, with defenses supercharged by AI

Source

Protecting people, data, and critical assets is a crucial responsibility for modern organizations, yet conventional security approaches often struggle to address the escalating velocity, breadth, and intricacy of modern cyberattacks. Bolting on more new security products is simply not a viable long-term strategy. What organizations need from their security …

Powering Google Cloud with Gemini

Source

We are excited to share with you that Gemini for Google Cloud is here. Generative AI’s capabilities have grown tremendously over the last year, and we have infused it throughout our product portfolio. Gemini for Google Cloud is a new generation of AI assistants for developers, Google Cloud …

What’s new with Google Cloud Networking at Next ’24

Source

Cross-Cloud Network has transformed how organizations connect and secure workloads across hybrid and multi-cloud networks. It simplifies complexity, strengthens security posture, and helps deliver faster business outcomes. Built on Google Cloud’s planet-scale network, Cross-Cloud Network enables you to deliver rich experiences, streamline operational efficiency, and lower TCO. AI …

Boosting data cyber-resilience for your Cloud Storage data with object retention lock

Source

Data retention is crucial for customers especially in regulated industries such as financial services, healthcare, and government. Customers can use write once, read many (WORM) storage to meet their data retention needs, keeping their data immutable, and comply with industry regulations set forth by governing bodies such as FINRA …

Cloud CISO Perspectives: Get ready for Next ‘24: What you need to know

Source

Welcome to the second Cloud CISO Perspectives for March 2024. Today, Brian Roddy, vice president of security product management, Google Cloud, talks about some of the important cybersecurity hot topics that will be driving our announcements at Google Cloud Next in April. As with all Cloud CISO Perspectives, the …

Expanding Sensitive Data Protection to make it easier to protect data in Cloud SQL

Source

Organizations rely on data-driven insights to power their business, but unlocking the full potential of data comes with the responsibility to handle it securely. This can be a significant challenge when data growth can easily outpace the ability to manually inspect it, and data sprawl can lead to sensitive …

How to choose a known, trusted supplier for open source software

Source

Open-source software is used throughout the technology industry to help developers build software tools, apps, and services. While developers building with open-source software can (and often do) benefit greatly from the work of others, they should also conduct appropriate due diligence to protect against software supply chain attacks. With …

How Commerzbank safeguards its data with VPC Service Controls

Source

Google Cloud’s VPC Service Controls (VPC-SC) can help enterprises keep their sensitive data secure while using built-in storage and data processing capabilities. Since its inception, VPC-SC has been deployed as a foundational security control by many Google Cloud customers. As an integral part of a defense-in-depth solution, VPC-SC …

NetRise elevates their user experience with Google Cloud

Source

Editor’s note : NetRise, a cybersecurity company, has developed a platform to address software supply chain vulnerabilities, especially within the Extended Internet of Things (XIoT) and Cyber Physical Systems (CPS). Its latest solution, Trace, utilizes large language models and Cloud SQL for PostgreSQL for efficient vulnerability detection and code-origin …

How to improve resilience to DDoS attacks with Cloud Armor Advanced rate limiting capabilities

Source

In recent years, we've been seeing an exponential surge in the number, volume, and complexity of distributed denial-of-service (DDoS) attacks. In September 2023, we saw the largest DDoS attack to date, which peaked at 398 million requests per second. As the threat landscape evolves, enterprises face a pressing need …

How to set compliance controls for your Google Cloud Organization

Source

Assured Workloads is a modern cloud solution that allows companies to more easily run regulated workloads in many of Google Cloud’s global regions. Assured Workloads can help you ensure comprehensive data protection and regulatory compliance across your Google Cloud Organization. It allows you to apply specific security and …

Cloud CISO Perspectives: Easing the psychological burden of leadership

Source

Welcome to the first Cloud CISO Perspectives for March 2024. Today I’ll be highlighting a section from our newest Perspectives on Security for the Board report, focusing on the importance of developing psychological resilience in cybersecurity leadership. As with all Cloud CISO Perspectives, the contents of this newsletter …

Introducing Security Command Center Enterprise: The first multicloud risk management solution fusing AI-powered SecOps with cloud security

Source

The stakes have never been higher for managing cloud risks. With organizations of every size and in every industry pursuing cloud-first strategies, the cloud is now home to their most critical applications and data. Adversaries have picked up on this ongoing shift, too: APT groups known for regularly targeting …

Join our first Security Talks of 2024: Trends, gen AI security, and augmenting defenses

Source

As cyber threats and risks continue to evolve, robust security is more than just an IT issue — it is imperative for business success and continuity. To help you better understand the current cybersecurity landscape, including guidance on regulatory changes and the latest threat intelligence, we bring you the first …

Move-in ready Kubernetes security with GKE Autopilot

Source

Creating and managing the security of Kubernetes clusters is a lot like building or renovating a house. Both require making concessions across many areas when trying to find a balance between security, usability and maintainability. For homeowners, these choices include utility and aesthetic options, such as installing floors, fixtures …

Cloud CISO Perspectives: Building better cyber defenses with AI

Source

Welcome to the second Cloud CISO Perspectives for February 2024. Today, Charley Snyder, a Google expert on the intersection of security and public policy, talks about our announcements at February’s Munich Security Conference — and why the conference plays a vital role in public policy conversations. As with all …

How to prevent lateral movement techniques on Google Cloud

Source

Cybercriminals often use lateral movement techniques when exploring a compromised network to slide sideways, from devices to applications, as they hunt for vulnerabilities, escalate access privileges, and seek to reach their ultimate target. Research published today by Palo Alto Networks highlights several techniques that exploit misconfigurations which could allow …

« newer articles | page 5 | older articles »