Showing only posts in GCP Security. Show all posts.

Additional IL5 services available for the DoD with Google Assured Workloads

Source

Department of Defense (DoD) customers can now deploy DoD SRG Impact Level 5 (IL5) workloads on Google Cloud through Assured Workloads, providing customers with unparalleled flexibility in any of Google’s U.S. regions including one of the world's largest publicly available machine learning hubs. Google provides the most …

Introducing new capabilities in Workforce Identity Federation to help you effectively manage identity and access to Google Cloud

Source

We are excited to announce new security features, management options, and product integrations for Workforce Identity Federation, our Identity and Access Management offering that allows you to rapidly onboard user identities from external identity providers (IdPs) for direct, secure access to Google Cloud services and resources. Workforce Identity Federation …

Networking and security at Google Cloud Next: A guide to must-attend sessions

Source

In just a few days, Google Cloud Next returns to San Francisco as a large, in-person, three-day event. There, you’ll learn all about the technologies you need to build, connect, and secure all your cloud-first, Kubernetes, and AI/ML workloads. You’ll gain hands-on experience on the latest …

Introducing predictable cost options for Cloud Data Loss Prevention

Source

Cloud Data Loss Prevention's Discovery service can help you discover, profile, and monitor sensitive data across your entire organization or just select projects. We've expanded the service to cover BigQuery and BigLake, with more cloud analytics services that manage sensitive data coming later this year. Continuous visibility of where …

How to better manage customer identities to support an engaging ecommerce user experience

Source

One of the fundamental questions that retailers constantly ask themselves is how well they know their customers and how they can build deeper relationships. Knowing who their customers are can have a direct impact on improving customer engagement, which can lead to increased conversion rates, customer loyalty, lifetime value …

How Wayfair uses BeyondCorp Enterprise with Microsoft Intune to build a Zero Trust environment

Source

A Zero Trust approach to security can help you safeguard your users, devices, apps and data. Using Google Cloud’s BeyondCorp Enterprise, organizations can enforce strict, context-aware access controls with authentication and authorization for a variety of devices, anywhere to help strengthen their security posture. The ability to craft …

Introducing Cloud Armor WAF enhancements to help protect your web application and API service

Source

Organizations migrating web applications and their APIs to the cloud need solutions to protect them from exploits and distributed denial of service (DDoS) attacks. Google Cloud Armor is a network security service that provides defenses against DDoS and OWASP Top 10 risks. We are excited to introduce several new …

Introducing time-bound key authentication for service accounts

Source

We’re continually working to improve Google Cloud’s Identity and Access Management (IAM) capabilities to help secure and govern your cloud environment. When organizations need to grant external applications permission to access Google Cloud APIs and resources there are several options. While many customers have embraced our updated …

Best Kept Security Secrets: Keeping secrets, the Secret Manager way

Source

Can you keep a secret? Many people struggle to keep secrets. So do organizations. An organization’s digital credentials — its passwords, API keys, tokens, and encryption keys baked into its software code — are its vital secrets, used to authenticate access to protected resources and services. The security of these …

Using Workforce Identity Federation with API-based web applications

Source

Workforce Identity Federation allows use of an external identity provider (IdP) to authenticate and authorize users (including employees, partners, and contractors) to Google Cloud resources without provisioning identities in Cloud Identity. Before its introduction, only identities existing within Cloud Identity could be used with Cloud Identity Access Management (IAM …

Google Cloud and CyberGRX collaborate to help scale and accelerate cloud assessments

Source

Risk managers know there is one assessment type that’s foundational for every risk management program: the vendor risk assessment. Understanding the risk posture of your vendors and third parties, including your cloud providers, is an important part of an effective risk management program. While collecting and analyzing information …

Configuring Workload Identity Federation for GitHub actions and Terraform Cloud

Source

Join us as we build on the concept and use cases of Workload Identity Federation, showcasing the security benefits of "keyless authentication.” We will dive into how Workload Identity Federation can be used in the context of CI/CD pipelines and tools that are commonly found in enterprise environments …

Google Workspace earns Dutch government's stamp of approval

Source

Editor's note : This post was originally published on the Google Workspace blog. At Google, we are committed to the privacy and security of our customers and to fostering trust in our cloud technologies. We regularly engage with customers, privacy regulators, and policymakers around the globe to understand evolving expectations …

Protect data from disasters using new Asynchronous Replication

Source

In today's business landscape, data availability and integrity are paramount. Disasters, whether natural or man-made, can disrupt operations and pose a significant risk to critical information. To address this, today we are introducing Persistent Disk Asynchronous Replication, which enables disaster recovery for Compute Engine workloads by replicating data between …

GKE Security Posture dashboard now generally available with enhanced features

Source

We are excited to announce that the Google Kubernetes Engine (GKE) Security Posture dashboard is now generally available. The interface is designed to streamline the security management of your GKE clusters, and now includes a range of powerful features such as misconfiguration detection and vulnerability scanning to help ensure …

How to migrate sensitive data with confidence using Google Cloud’s CDMC-certified architecture

Source

As enterprises accelerate adoption of cloud-based services and products, they face a common challenge: How can they effectively secure and govern rapidly expanding volumes of their most sensitive data in new environments? Today, Google Cloud released an architectural whitepaper and accompanying source code for a solution which successfully completed …

What’s new in Assured Workloads: Region expansion, TLS version restrictions, new supported services

Source

To maximize the benefits of digital transformation, organizations need to be comfortable bringing sensitive and regulated workloads to the cloud. Assured Workloads is a modern cloud solution that allows our customers to run regulated workloads in many of Google Cloud's global regions. Core to our strategy for Assured Workloads …

Introducing client authentication with Mutual TLS on Google Cloud Load Balancing

Source

We are excited to announce the Preview of front-end mutual TLS (mTLS) support, allowing you to offload client certificate authentication using External HTTPS Load Balancing. With TLS offload the load balancer presents a certificate on behalf of the server that the client uses to verify the server’s identity …

Why Snap chose BeyondCorp Enterprise to build a durable Zero Trust framework

Source

Snap Inc., creators of Snapchat, is a technology company that believes “the camera presents the greatest opportunity to improve the way people live and communicate.” Born in the cloud, Snap delivers its modern social media framework using Google Cloud. In 2023, Google Cloud and Snap announced an expanded relationship …

Expanding our Security AI ecosystem at Security Summit 2023

Source

Organizations large and small are realizing that digital transformation requires a ground-up approach to modernize security. However, that digital transformation is being threatened by increasingly disruptive cyber risks and threats. At our annual Google Cloud Security Summit today, we’re sharing the latest insights into how the threat landscape …

« newer articles | page 9 | older articles »