Showing only posts tagged Security & Identity. Show all posts.

How Virgin Media O2 uses Privileged Access Manager to achieve principle of least privilege

Source

Editor’s note : Virgin Media O2 provides internet and communications services to more than 48.5 million subscribers, and teams are also responsible for supporting more than 16,000 employees. Virgin Media O2 is committed to empowering customers with outstanding customer-centered products and essential connectivity — all powered behind the …

The Cyber Threat Intelligence Program Design Playbook is now available

Source

As cybersecurity threats have grown more sophisticated and prevalent, we’ve seen organizations develop robust cyber threat intelligence (CTI) programs to help bolster defenses. However, creating and maturing a CTI program remains a challenge because it requires people, processes, technologies, and metrics to validate success. To help organizations better …

Google Cloud first CSP to join BRC, MFG-ISAC, and affiliates to advance security

Source

The AI phase of industrial evolution is marked by a profound transformation in how humans and intelligent machines collaborate. The blurring of boundaries between physical and digital systems across the manufacturing landscape is accelerating, driven by advancements in automation, robotics, artificial intelligence, and the Internet of Things. This interconnectedness …

How Google Cloud helps navigate your DPIA and AI privacy compliance journey

Source

At Google, we understand that new technology applications such as artificial intelligence driven innovation can introduce new questions about data privacy. We are committed to helping our customers meet their data protection obligations while using AI offerings integrated in Google Cloud services (which includes Google Workspace services.) Some customers …

Improve your security posture with expanded Custom Org Policy

Source

When it comes to securing cloud resources, one of the most important tools for administrators is the ability to set guardrails for resource configurations that can be applied consistently across the environment, centrally managed, and safely rolled out. Google Cloud's custom Organization Policy is a powerful tool that can …

Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud

Source

Conventional fraud detection methods have a hard time keeping up with increasingly sophisticated criminal tactics. Existing systems often rely on the limited data of individual institutions, and this hinders the detection of intricate schemes that span multiple banks and jurisdictions. To better combat fraud in cross-border payments, Swift, the …

To avoid “bill shocks,” Palo Alto Networks deploys custom AI-powered cost anomaly detection

Source

In today's fast-paced digital world, businesses are constantly seeking innovative ways to leverage cutting-edge technologies to gain a competitive edge. AI has emerged as a transformative force, empowering organizations to automate complex processes, gain valuable insights from data, and deliver exceptional customer experiences. However, with the rapid adoption of …

Securing AI: Advancing the national security mission

Source

Artificial intelligence is not just a technological advancement; it's a national security priority. In this new era, AI is both a powerful technology that can bolster any organization’s cybersecurity capabilities and also a critical part of the technology infrastructure that we need to defend and protect. Google recently …

Cloud CISO Perspectives: To end ransomware scourge, start with more reporting — not blocking cyber-insurance

Source

Welcome to the second Cloud CISO Perspectives for November 2024. Today, Monica Shokrai, head of business risk and insurance, Google Cloud, and Kimberly Goody, cybercrime analysis lead, Google Threat Intelligence Group, explore the role cyber-insurance can play in combating the scourge of ransomware. As with all Cloud CISO Perspectives …

Make IAM for GKE easier to use with Workload Identity Federation

Source

At Google Cloud, we work to continually improve our platform’s security capabilities to deliver the most trusted cloud. As part of this goal, we’re helping our users move away from less secure authentication methods such as long-lived, unauditable, service account keys towards more secure alternatives when authenticating …

Shift-left your cloud compliance auditing with Audit Manager

Source

Cloud compliance can present significant regulatory and technical challenges for organizations. These complexities often include delineating compliance responsibilities and accountabilities between the customer and cloud provider. At Google Cloud, we understand these challenges faced by our customers’ cloud engineering, compliance, and audit teams, and want to help make them …

Secure your data ecosystem: a multi-layered approach with Google Cloud

Source

It’s an exciting time in the world of data and analytics, with more organizations harnessing the power of data and AI to help transform and grow their businesses. But in a threat landscape with increasingly sophisticated attacks around every corner, ensuring the security and integrity of that data …

Google Cloud deepens its commitment to security and transparency with expanded CVE program

Source

At Google Cloud, we recognize that helping customers and government agencies keep tabs on vulnerabilities plays a critical role in securing consumers, enterprises, and software vendors. We have seen the Common Vulnerabilities and Exposure (CVE) system evolve into an essential part of building trust across the IT ecosystem. CVEs …

Mandatory MFA is coming to Google Cloud. Here’s what you need to know

Source

At Google Cloud, we’re committed to providing the strongest security for our customers. As pioneers in bringing multi-factor authentication (MFA) to millions of Google users worldwide, we've seen firsthand how it strengthens security without sacrificing a smooth and convenient online experience. That’s why we will soon require …

Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient

Source

Welcome to the second Cloud CISO Perspectives for October 2024. Today, Anton Chuvakin, senior security consultant for our Office of the CISO, offers 10 leading indicators to improve cyber-physical systems, guided by our analysis of the White House’s new PCAST report. As with all Cloud CISO Perspectives, the …

Highlights from the 10th DORA report

Source

The DORA research program has been investigating the capabilities, practices, and measures of high-performing technology-driven teams and organizations for more than a decade. It has published reports based on data collected from annual surveys of professionals working in technical roles, including software developers, managers, and senior executives. Today, we …

Introducing Google Cloud’s new Vulnerability Reward Program

Source

Vulnerability reward programs play a vital role in driving security forward. By incentivizing security research, vulnerabilities can be found and fixed by vendors before they are potentially exploited by malicious actors, protecting users and strengthening security posture. Also known as bug bounties, Google has long been a leader in …

Secure the new endpoint: Check out Chrome Enterprise Premium's latest innovations

Source

The modern workplace revolves around the browser. It's where employees access critical applications, handle sensitive data, and collaborate with colleagues. This makes the browser a critical point for enforcing security. Chrome Enterprise, the most trusted enterprise browser, recently introduced powerful new capabilities for Chrome Enterprise Premium designed to further …

From AI to Zero Trust: Google Cloud Security delivers comprehensive solutions for the public sector

Source

Government organizations and agencies face significant challenges from threat actors seeking to compromise data and critical infrastructure, and impact national and economic stability. These attacks target a broad range of industries and organizations, from water security to rural health care, via external targeting and insider threats. Government organizations are …

Cloud CISO Perspectives: AI vendors should share vulnerability research. Here’s why

Source

Welcome to the first Cloud CISO Perspectives for October 2024. Today I’m discussing new AI vulnerabilities that Google’s security teams discovered and helped fix, and why it’s important for AI vendors to share vulnerability research impacting their technology. As with all Cloud CISO Perspectives, the contents …

How Google Cloud supports telecom security and compliance

Source

Operating a telecommunications network is more than just connecting phone calls, or helping people share funny videos online. Telecom networks are critical components of our society’s infrastructure. Telecom operators face a wide array of risks to the critical communication services they provide and the sensitive data they protect …

Project Shield expands free DDoS protection to even more organizations and nonprofits

Source

Project Shield has helped news, human rights, and elections-related organizations defend against distributed denial of service (DDoS) attacks since 2013 as part of Google's commitment to keep online content universally accessible. The solution has helped keep election resources online, supported news reporting during pivotal geopolitical events, and helped governments …

page 1 | older articles »