Showing only posts tagged Databases. Show all posts.

Introducing Spanner dual-region configurations that help maintain high availability and data residency

Source

Spanner is Google’s fully managed, globally distributed database with high throughput and virtually unlimited scale. Spanner processes over 4 billion queries per second at peak. With features such as automatic sharding, zero downtime, and strong consistency, Spanner powers demanding, global workloads — not only across customers in financial services …

Powering Google Cloud with Gemini

Source

We are excited to share with you that Gemini for Google Cloud is here. Generative AI’s capabilities have grown tremendously over the last year, and we have infused it throughout our product portfolio. Gemini for Google Cloud is a new generation of AI assistants for developers, Google Cloud …

Expanding Sensitive Data Protection to make it easier to protect data in Cloud SQL

Source

Organizations rely on data-driven insights to power their business, but unlocking the full potential of data comes with the responsibility to handle it securely. This can be a significant challenge when data growth can easily outpace the ability to manually inspect it, and data sprawl can lead to sensitive …

NetRise elevates their user experience with Google Cloud

Source

Editor’s note : NetRise, a cybersecurity company, has developed a platform to address software supply chain vulnerabilities, especially within the Extended Internet of Things (XIoT) and Cyber Physical Systems (CPS). Its latest solution, Trace, utilizes large language models and Cloud SQL for PostgreSQL for efficient vulnerability detection and code-origin …

Introducing Cloud SQL Authentication via IAM groups: Simplify database authentication and access at scale

Source

Managing and auditing data access can be very complex at scale, in particular, for a fleet of databases with a myriad of users. Today, we are introducing IAM group authentication for Cloud SQL. With this launch, you can take advantage of better security, simplify user management and database authentication …

The top five global data and AI trends in 2023

Source

How will your organization manage this year's data growth and business requirements? Your actions and strategies involving data and AI will improve or undermine your organization's competitiveness in the months and years to come. Our teams at Google Cloud have an eye on the future as we evolve our …

Application security with Cloud SQL IAM database authentication

Source

Hardening a complex application is a challenge, more so for applications that include multiple layers with different authentication schemes. One common question is “how to integrate Cloud SQL for PostgreSQL or MySQL within your authentication flow?” Cloud SQL has always supported password-based authentication. There are, however, many questions that …

Introducing easier de-identification of Cloud Storage data

Source

De-identification of Cloud Storage just got easier Many organizations require effective processes and techniques for removing or obfuscating certain sensitive information in the data they store. An important tool to achieve this goal is de-identification. Defined by NIST as a technique that “removes identifying information from a dataset so …

Introducing password policies for Cloud SQL for PostgreSQL and MySQL local users

Source

Preventing data breaches is an important priority when creating and managing database environments. Ensuring user and application passwords meet high security standards is crucial for reducing risk and helping to achieve compliance with best practices and regulatory standards. To address these concerns, we are thrilled to announce the general …

Automatic data risk management for BigQuery using DLP

Source

Protecting sensitive data and preventing unintended data exposure is critical for businesses. However, many organizations lack the tools to stay on top of where sensitive data resides across their enterprise. It’s particularly concerning when sensitive data shows up in unexpected places – for example, in logs that services generate …

Leak of Russian Censorship Data

Source

The transparency organization Distributed Denial of Secrets has released 800GB of data from Roskomnadzor, the Russian government censorship organization. Specifically, Distributed Denial of Secrets says the data comes from the Roskomnadzor of the Republic of Bashkortostan. The Republic of Bashkortostan is in the west of the country. [...] The data …

Millions of WordPress sites get forced update to patch critical plugin flaw

Source

Enlarge (credit: Getty Images) Millions of WordPress sites have received a forced update over the past day to fix a critical vulnerability in a plugin called UpdraftPlus. The mandatory patch came at the request of UpdraftPlus developers because of the severity of the vulnerability, which allows untrusted subscribers, customers …

Bunnie Huang’s Plausibly Deniable Database

Source

Bunnie Huang has created a Plausibly Deniable Database. Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size of encrypted files. This allows specific and enforceable demands to be made: “Give us the passwords for …

Cloud SQL for MySQL launches IAM database authentication

Source

When enterprise IT administrators design their data systems, security is among the most important considerations they have to make. Security is key to defining where data is stored and how users access it. Traditionally, IT administrators have managed user access to systems like SQL databases through issuing users a …

Dutch Insider Attack on COVID-19 Data

Source

Insider data theft : Dutch police have arrested two individuals on Friday for allegedly selling data from the Dutch health ministry’s COVID-19 systems on the criminal underground. [...] According to Verlaan, the two suspects worked in DDG call centers, where they had access to official Dutch government COVID-19 systems and …