Showing only posts in GCP Security. Show all posts.

Google mitigated the largest DDoS attack to date, peaking above 398 million rps

Source

Over the last few years, Google's DDoS Response Team has observed the trend that distributed denial-of-service (DDoS) attacks are increasing exponentially in size. Last year, we blocked the largest DDoS attack recorded at the time. This August, we stopped an even larger DDoS attack — 71⁄2 times larger — that …

Deliver and secure your internet-facing application in less than an hour using Dev(Sec)Ops Toolkit

Source

We are excited to announce the preview of the Dev(Sec)Ops toolkit for global front-end internet-facing applications, which can help you launch new apps on Google Cloud in less than an hour. This toolkit is part of the recently announced Cross-Cloud Network solution to help customers scale and …

How Sensitive Data Protection can help secure generative AI workloads

Source

Generative AI models are a hot topic across nearly every industry. Enterprises are looking to leverage this technology to enrich their business services and engagement with customers, as well as streamline operations and speed up business processes. However, as with most AI/ML applications, generative AI models are fueled …

Deliver and secure your internet-facing application in less than an hour using Dev(Sec)Ops Toolkit

Source

We are excited to announce the preview of the Dev(Sec)Ops toolkit for global front-end internet-facing applications, which can help you launch new apps on Google Cloud in less than an hour. This toolkit is part of the recently announced Cross-Cloud Network solution to help customers scale and …

Introducing Advanced Vulnerability Insights for GKE

Source

Detecting vulnerabilities in open-source software requires a holistic approach, and security best practices recommend scanning early and often throughout your development lifecycle to help maintain an effective security posture. However, only scanning in the CI/CD pipeline or registry can miss artifacts and containers that are deployed to production …

New custom security posture controls and threat detections in Security Command Center

Source

Security Command Center Premium, Google Cloud’s built-in security and risk management solution, provides out-of-the-box security controls for cloud posture management and threat detection. As our customers build more complex environments with different risk profiles, cloud security teams may need to monitor for specific conditions and threats not covered …

Expanding GKE posture: Policy Controller violations now in Security Command Center

Source

Customers using Kubernetes at scale need consistent guardrails for how resources are used across their environments to improve security, resource management, and flexibility. Customers have told us that they need an easy way to apply and view those policy guardrails, so we launched the Policy Controller dashboard and added …

Go from logs to security insights faster with Dataform and Community Security Analytics

Source

Making sense of security logs such as audit and network logs can be a challenge, given the volume, variety and velocity of valuable logs from your Google Cloud environment. To help accelerate the time to get security insights from your logs, the open-source Community Security Analytics (CSA) provides pre-built …

Manage infrastructure with Workload Identity Federation and Terraform Cloud

Source

Introduction Terraform Cloud (TFC) can help manage infrastructure as code (IaC) development for large enterprises. As the number of Google Cloud projects grows, managing access controls for Terraform Cloud projects and workspaces can become complex. Don't worry, we have a solution that is designed to be more secure than …

Confidential VMs on Intel CPUs: Your new intelligent defense

Source

For organizations who want to bring and process their most sensitive compute workloads in the cloud without any code changes, we offer Confidential virtual machines (VMs) that leverage the latest hardware-based security technology. Through our partnership with Intel, we are extending our Confidential VMs on the new C3 machines …

Confidential VMs on Intel CPUs: Your new intelligent defense

Source

For organizations who want to bring and process their most sensitive compute workloads in the cloud without any code changes, we offer Confidential virtual machines (VMs) that leverage the latest hardware-based security technology. Through our partnership with Intel, we are extending our Confidential VMs on the new C3 machines …

Introducing the unified Chronicle Security Operations platform

Source

At Google Cloud, our mission is to help organizations transform cybersecurity with frontline intelligence, expertise, and AI-powered innovation. Nowhere is this needed more than in security operations (SecOps), where understaffed and overwhelmed security teams struggle to defend against a threat landscape that is growing in volume and sophistication, often …

Introducing Mandiant Hunt for Chronicle to help you uncover hidden threats in real-time

Source

Chronicle Security Operations is an essential security suite for any organization that wants to stay on top of the threats that they face. As part of our security announcements today at Google Cloud Next, we’re introducing our always-on AI collaborator Duet AI in Chronicle. Available in preview and …

New AI capabilities that can help address your security challenges

Source

At Google Cloud, we continue to address pervasive and fundamental security challenges: the exponential growth in threats, the toil it takes for security teams to achieve desired outcomes, and the chronic shortage of security talent. At Google Cloud Next, we are leaning in to help solve these challenges by …

Chronicle CyberShield - Google Cloud’s Approach to Strengthen Nation-wide Cyber Defense

Source

One of the primary functions of any government is to protect its citizens, institutions, infrastructure and way of life. With the rise of the global Internet, the world is more connected and traditional borders do not exist, meaning those same citizens, institutions, infrastructure, and way of life are at …

Expanding our data processing commitments for Google Cloud and Google Workspace

Source

At Google Cloud, we are committed to meeting our customers’ evolving data processing and security requirements. To this end, we are pleased to announce the next version of the Cloud Data Processing Addendum (CDPA), which updates our data processing and security terms for Google Cloud, Google Workspace (including Workspace …

Why security professionals should attend Google Cloud Next ‘23

Source

Google Cloud Next ‘23 is coming to the Moscone Center in San Francisco starting Tuesday, August 29th. This year, we’re featuring a packed Security Professionals track, with more than 40 sessions covering the latest in threat intelligence, modern security operations, and advanced cloud security. Attendees will have the …

Announcing general availability of Cloud NAT support for network services Standard Tier

Source

We are excited to announce general availability of Cloud NAT support for network services Standard Tier. Standard Tier delivers traffic from Google Cloud resources to external systems by routing it over the internet. Premier and Standard are network service tiers that let you optimize connectivity between systems on the …

Chronicle CyberShield - Google Cloud’s Approach to Strengthen Nation-wide Cyber Defense

Source

One of the primary functions of any government is to protect its citizens, institutions, infrastructure and way of life. With the rise of the global Internet, the world is more connected and traditional borders do not exist, meaning those same citizens, institutions, infrastructure, and way of life are at …

CyberShield: helping governments stand united against cyber attacks

Source

At the Cyber Week conference in June, we were excited to announce our strategic partnership with the Israel National Cyber Directorate (INCD) to modernize security operations under the wider scope of Israel’s own Cyber Dome mission. Our teams worked together to leverage Google Cloud’s Chronicle Security Operations …

« newer articles | page 8 | older articles »