Showing only posts tagged Identity & Security. Show all posts.

Introducing new, faster search and investigative experience in Chronicle Security Operations

Source

In cybersecurity, speed matters. Whether a security analyst is trying to understand the details of an alert that was triggered by an indicator of compromise (IoC), or find additional context for a suspicious asset, speed is often the critical factor that will help thwart a cyberattack before threat actors …

How to migrate on-premises Active Directory users to Google Cloud Managed Microsoft AD

Source

One benefit of cloud migration is having access to managed services, which can reduce operational overhead. For organizations operating in Microsoft-centered environments, Google Cloud offers a highly-available, hardened Managed Service for Microsoft Active Directory running on Windows virtual machines. Managed Microsoft AD provides benefits such as automated AD server …

Google Public Sector announces continuity-of-operations offering for government entities under cyberattack

Source

Cyberattacks that target our government are all too common these days. From SolarWinds, to hacks against widely used email servers, to attacks against the defense industrial base, we know that cyberattacks against the public and private sectors continue to be an issue. Our latest VirusTotal malware trends report illustrates …

CISO Survival Guide: How financial services organizations can more securely move to the cloud

Source

It’s not just children and adults who face excitement and nervousness on the first day of school. The first day in the cloud can be daunting for financial services organizations, too. Chief Information Security Officers must lead the cloud security component of their organization’s digital transformation, a …

For a successful cloud transformation, change your culture first

Source

Twenty years ago, organizations discovered the magic of server virtualization. Among the many benefits of virtualization, it heralded the end of the need for one physical server per application and the beginning of managing software-defined infrastructure. It helped automate building and installing systems, and it helped lay foundations for …

When should I use Cloud Armor?

Source

Google Cloud Armor is a well known enterprise-grade DDoS defense and web application firewall service that provides additional security for your applications and websites running on Google Cloud, on-prem or on other platforms. Cloud Armor helps protect against broken access controls, security misconfigurations, cryptographic failures and more. Cloud Armor …

From the FBI to Google Cloud, meet CISO Director MK Palmore

Source

Editor's note : MK Palmore is a director in Google Cloud's Office of the Chief Information Security Officer, or CISO, a group that works with private- and public-sector organizations to understand and guard against cybersecurity threats. He came to Google Cloud in 2021 from Palo Alto Networks, which he joined …

Introducing reCAPTCHA Enterprise’s Mobile SDK to help protect iOS, Android apps

Source

reCAPTCHA Enterprise is Google’s online fraud detection service that leverages more than a decade of experience defending the internet. reCAPTCHA Enterprise can be used to prevent fraud and attacks perpetrated by scripts, bot software, and humans. When installed inside a mobile app at the point of action, such …

Cloud CISO Perspectives: October 2022

Source

Welcome to October’s Cloud CISO Perspectives. This month, we're focusing on our just-completed Google Cloud Next conference and Mandiant’s inaugural mWise Conference, and what our slate of cybersecurity announcements can reveal about how we are approaching the thorniest cybersecurity challenges facing the industry today. As I wrote …

Introducing Assured Workloads in Canada and Australia, and new features for all

Source

At Google Cloud, we continue to invest in our vision of invisible security where advanced capabilities are engineered into our platforms, operations are simplified, and stronger outcomes can be achieved. Assured Workloads is a Google Cloud service that helps customers create and maintain controlled environments that accelerate running more …

Announcing new GKE functionality for streamlined security management

Source

At Google Cloud, we’re driven by a vision of invisible security, where advanced security capabilities are engineered into our platforms, operations are simplified, and stronger security outcomes can be achieved. As we pursue this ideal, we want to help make security easier to use and manage. Our new …

Cloud makes it better: What's new and next for data security

Source

Today’s digital economy offers a wealth of opportunities, but those opportunities come with growing risks. It has become increasingly important to manage the risks posed by the intersection of digital resilience and today's risk landscape. Organizations around the world should be asking themselves: If a risk becomes a …

Best kept security secrets: How Cloud EKM can help resolve the cloud trust paradox

Source

Whether driven by government policy, industry regulation, or geo-political considerations, the evolution of cloud computing has led organizations to want even more control over their data and more transparency from their cloud services. At Google Cloud, one of the best tools for achieving that level of control and transparency …

At Next ’22, introducing new capabilities for secure transformations

Source

Organizations large and small are realizing that digital transformation and the changing threat landscape require a grounds up effort to transform security. At Google Cloud, we continue to invest in our vision of invisible security where advanced capabilities are engineered into our platforms, operations are simplified, and stronger security …

Introducing Software Delivery Shield for end-to-end software supply chain security

Source

Organizations and their software delivery pipelines are continually exposed to growing cyberattack vectors. Coupled with the massive adoption of open source software, which now helps power nearly all of our public infrastructure and is highly prevalent in most proprietary software, businesses around the world are more vulnerable than ever …

Advancing digital sovereignty on Europe's terms

Source

In September 2021, we unveiled “ Cloud. On Europe’s Terms,” an ambitious commitment to deliver cloud services that provide the highest levels of digital sovereignty while enabling the next wave of growth and transformation for European organizations. We’ve since seen increasing demand from customers and policymakers for digital …

Introducing Chronicle Security Operations: Detect, investigate, and respond to cyberthreats with the speed, scale, and intelligence of Google

Source

Staying ahead of rising security threats and incidents are among the most vital discussions any organization can have, yet too many alerts and shifting threat trends make security operations notoriously difficult. The recent mass pivot to remote and hybrid work, coupled with increasingly sophisticated threat actors, make threat detection …

Introducing Confidential Space to help unlock the value of secure data collaboration

Source

Business partnerships across many industries strain under rules and requirements that prevent them from sharing sensitive data. Organizations also recognize that collaboration can accelerate innovation, but meaningful collaboration can be limited or even prevented by the need to protect intellectual property or regulated data. Rising to meet today’s …

Google Cloud Next for security: 6 essential sessions

Source

Zero Trust. Securing the software supply chain. Policy controls. And what about Mandiant? We have so many cool and interesting security sessions coming this week at Google Cloud Next, it can be hard to know where to start. Fortunately, we’ve got you covered with these six must-watch security …

How to secure APIs against fraud and abuse with reCAPTCHA Enterprise and Apigee X

Source

A comprehensive API security strategy requires protection from fraud and abuse. To better protect our publicly-facing APIs from malicious software that engages in abusive activities, we can deploy CAPTCHAs to disrupt abuse patterns. Developers can prevent attacks, reduce their API security surface area, and minimize disruption to users by …

Secure streaming data with Private Service Connect for Confluent Cloud

Source

Data speed and security should not be mutually exclusive, which is why Confluent Cloud, a cloud-first data streaming platform built by the founders of Apache Kafka, secures your data through encryption at rest and enables secure data in motion. However, for the most sensitive data — particularly data generated by …

« newer articles | page 3 | older articles »