Showing only posts tagged Identity & Security. Show all posts.

CISO Survival Guide: Vital questions to help guide transformation success

Source

Part of being a security leader whose organization is taking on a digital transformation is preparing for hard questions – and complex answers – on how to implement a transformation strategy. In our previous CISO Survival Guide blog, we discussed how financial services organizations can more securely move to the cloud …

Secure your life sciences data from the ground up

Source

With the rapid growth in the quantity of healthcare data available, organizations are able to unlock deeper insights, advance innovation, and increase experimentation. The sector is now in a position to take advantage of cloud technology to accelerate clinical trials, expand research and development, and optimize supply chains. However …

Best Kept Security Secrets: How VPC Service Controls can help build defense in depth

Source

While cloud security skeptics might believe that data in the cloud is just one access configuration mistake away from a breach, the reality is that a well-designed set of defense in depth controls can help minimize the risk of configuration mistakes and other security issues. Our Virtual Private Cloud …

ICYMI: Security Talks goes deep on SolarWinds, Chrome, Zero Trust, and today’s toughest SOC challenges

Source

Security operations teams are facing a “perfect storm” of challenges from nation-state actors turning their attention to financial crime, to rising uncertainty and potential complexities because of rapidly advancing cloud migration and IoT adoption, to the long-lamented skills shortage. Now imagine having to face this trifecta without visibility into …

How SolarWinds still affects supply chain threats, two years later

Source

Our quarterly Security Talks series brings together experts from Google Cloud Security teams and the industry to share information on our latest security products, innovations and best practices. Below is an introduction to Mandiant’s Security Talks presentation on Dec. 7, Mandiant Tales from the Front Lines: Activate Cyber …

Build your API security strategy on these 4 pillars

Source

Savvy leaders at organizations around the world know that digital transformations can create a virtuous flywheel of more and faster innovation, driven by the power of software integration. APIs can facilitate the necessary software integration and communication, and that requires serious consideration of the organization’s API security posture …

Announcing Google Cloud support for Impact Level 5 (IL5) workloads

Source

Google Cloud is committed to serving public sector customers around the world, and has made significant progress in building products and services designed specifically to meet your needs. Today, Google Cloud is proud to announce Department of Defense Impact Level 5 (IL5) provisional authorization (PA) — another important milestone that …

4 new features of Active Assist to help automate idle resource management

Source

Unattended Project Recommender makes identifying idle cloud projects easy, and helps you mitigate associated security issues, reduce unnecessary spend and environmental impact. In order to implement a scalable and repeatable resource lifecycle management process, it’s important to have the right tools for the job. Today, we’re announcing …

Securing tomorrow today: Why Google now protects its internal communications from quantum threats

Source

Editor's note : The ISE Crypto PQC working group is comprised of Google Senior Cryptography Engineers Stefan Kölbl, Rafael Misoczki, and Sophie Schmieg. When you visit a website and the URL starts with HTTPS, you’re relying on a secure public key cryptographic protocol to shield the information you share …

How the year’s final Google Cloud Security Talks will ready you for security and cloud success in 2023

Source

As we help our customers evolve their security approaches for the cloud era, two key objectives based on Google’s experience defending our own infrastructure and systems, emerge: trust nothing and detect everything. These can seem like daunting tasks for even the most capable security teams, especially in today …

Introducing Cloud Armor features to help improve efficacy: advanced rule tuning and auto deploy

Source

At Google Cloud Next in October, we announced the Preview release of advanced rule tuning for Cloud Armor which can provide customers more granular control over how they apply our pre-configured Web Application Firewall (WAF) rules. We also announced the Preview of our auto-deploy option for proposed mitigating rules …

« newer articles | page 2 | older articles »