Showing only posts tagged Identity & Security. Show all posts.

Google Cloud and FS-ISAC team up to advance financial services security

Source

Google Cloud is committed to strengthening the security and resiliency of financial services organizations and making the Internet a safer place for all organizations to conduct transactions and business. While building a secure and resilient ecosystem is a joint responsibility, we want to ensure that we’re working together …

Be threat ready for 2023: Join us for Google Cloud Security Talks in March

Source

At Google Cloud, our north star for security success today is to help customers apply cloud-scale, modern security everywhere they operate. As part of our mission to help customers achieve these objectives, we host a quarterly digital discussion event, Google Cloud Security Talks, where we bring together experts from …

Introducing time-bound Session Length defaults to improve your security posture

Source

Google Cloud provides many layers of security for protecting your users and data. Session length is a configuration parameter that administrators can set to control how long users can access Google Cloud without having to reauthenticate. Managing session length is foundational to cloud security and it ensures access to …

How to improve your Kubernetes security posture with GKE Dataplane V2 network policies

Source

As more organizations adopt Kubernetes, they also embrace new paradigms for connecting and protecting their workloads. Relying on perimeter defense alone is no longer an effective strategy. With microservice architecture patterns continuing to evolve rapidly, it is imperative that organizations adopt a defense-in-depth strategy to keep their applications and …

Why you should migrate to network firewall policies from VPC Firewall rules

Source

In the fall of 2022, we announced new policy constructs for Google Cloud Firewall, a scalable, cloud-first firewall service that helps secure traffic flow to and from workloads in Google Cloud, and whose distributed architecture enables simplified, granular control including micro-segmentation. Whereas legacy VPC firewall rules included network tags …

How Google Cloud Armor helps Broadcom block DDoS Attacks

Source

Technology leader Broadcom is a worldwide provider of enterprise security solutions that leverages its expertise in hardware and software to offer a broad portfolio of embedded security solutions, including integrated Symantec cybersecurity software. In 2021, Broadcom received the Google Cloud DevOps Award. As Broadcom migrated its enterprise security solution …

The top five global data and AI trends in 2023

Source

How will your organization manage this year's data growth and business requirements? Your actions and strategies involving data and AI will improve or undermine your organization's competitiveness in the months and years to come. Our teams at Google Cloud have an eye on the future as we evolve our …

What you can do to protect your software supply chain today

Source

“What are things we can do today to protect our software supply chains?” This is one of the top questions our team often gets when talking to IT leaders and practitioners about protecting their software supply chains – the code, people, systems, and processes that contribute to development and delivery …

Securing Cloud Run Deployments with Least Privilege Access

Source

With Cloud Run, developers can quickly deploy production web applications and APIs on a serverless environment that runs on top of Google’s scalable infrastructure. While development teams can leverage Cloud Run to improve development agility and iterate quickly, many overlook their infrastructure’s security posture. In particular, one …

Confidential GKE Nodes are now available on Compute Optimized C2D VMs

Source

Today, we are happy to announce that Confidential GKE Nodes are available on compute optimized C2D VMs. Many companies have adopted Google Kubernetes Engine (GKE) as a key component in their application infrastructure. In some cases, the advantages of using containers and Kubernetes can surpass those of traditional architectures …

How Google Cloud is preparing for NIS2 and supporting a stronger European cyber ecosystem

Source

Online data theft is a significant risk for organizations around the world and in Europe. European businesses stand to lose roughly 10 terabytes of data each month to cyber theft, according to a July 2022 report from the European Union Agency for Cybersecurity (ENISA). Meanwhile, cyberattacks cost European businesses …

Health-ISAC and Google Cloud partner to build more resilient healthcare, one threat indicator at a time

Source

Google Cloud is committed to helping healthcare and life sciences organizations defend themselves from threats that disrupt their ability to care for patients. The pandemic showed how vulnerable this industry is to attacks, and the real-life impacts that shutting down hospital systems and affecting drug makers can have on …

How Anthos helps improve your platform and application security and governance

Source

Security has become a critical component in every modern application and platform today. As IT admins try to implement security policies required to protect applications across distributed platforms, they often run into issues such as the lack of effective policy enforcement and lack of visibility into the policy violations …

Google Cloud Firewall capabilities to enhance your security posture and simplify configuration

Source

Google Cloud Firewall is a scalable, built-in service with advanced protection capabilities that helps enhance and simplify security posture, and implement zero trust networking, for cloud workloads. Its fully-distributed architecture provides micro-segmentation and granular control independent of network structure. Our unique architectural approach offers several advantages over the network …

Application security with Cloud SQL IAM database authentication

Source

Hardening a complex application is a challenge, more so for applications that include multiple layers with different authentication schemes. One common question is “how to integrate Cloud SQL for PostgreSQL or MySQL within your authentication flow?” Cloud SQL has always supported password-based authentication. There are, however, many questions that …

Google Cloud to join Catena-X and help build a sovereign data ecosystem in the automotive industry

Source

The automotive industry has a long history of being at the forefront of automation and digitalization in many areas, be it digital design or digital shop floor. In parallel, carmakers have grown into broad partnerships within their ecosystem, with a special focus on their suppliers in the value chain …

Improved gVisor file system performance for GKE, Cloud Run, App Engine and Cloud Functions

Source

Flexible application architectures, CI/CD pipelines, and container workloads often run untrusted code and hence should be isolated from sensitive infrastructure. One common solution has been to deploy defense-in-depth products (like GKE Sandbox which uses gVisor ) to isolate workloads with an extra layer of protection. Google Cloud’s serverless …

Introducing Security Command Center’s project-level, pay-as-you-go options

Source

One of the toughest challenges security teams can face occurs when IT leaders recognize the urgency to secure their organization’s cloud workloads and data, but operational hurdles create delays that can leave resources vulnerable to cyberattacks. Giving security teams the flexibility to rapidly apply security controls to their …

How Iron Mountain uses Assured Workloads to serve our customers’ compliance needs

Source

Editor’s note: Data storage experts Iron Mountain turned to Google Cloud when they wanted to scale their digital business. David Williams, cloud manager at Iron Mountain, explains in this post how Assured Workloads helped Iron Mountain’s InSight product achieve and maintain compliance with government standards and better …

How Confidential Space and multi-party computation can help manage digital assets more securely and efficiently

Source

Managing digital asset transactions and their often-competing requirements to be secure and timely can be daunting. Human errors can lead to millions in assets being instantly lost, especially when managing your own encryption keys. This is where multi-party computation (MPC) can help reduce risk stemming from single points of …

[Infographic] Navigating secure digital transformation in financial services

Source

Adopting cloud computing technologies and services presents financial services institutions with opportunities to address many forms of security risks in new, innovative, and more effective ways. However, firms often lack the tools required to map out their digital transformation journey in the context of security and risk governance. That …

How to deploy Tink for BigQuery encryption on-prem and in the cloud

Source

Data security is a key focus for organizations moving their data warehouses from on-premises to cloud-first systems, such as BigQuery. In addition to storage-level encryption, whether using Google-managed or customer-managed keys, BigQuery also provides column-level encryption. Using BigQuery's SQL AEAD functions, organizations can enforce a more granular level of …

page 1 | older articles »