Showing only posts tagged Security & Identity. Show all posts.

New from Mandiant Academy: Protect your perimeter with practical network training

Source

For too long, network data analysis has felt less like a science and more like deciphering cryptic clues. To help close that gap, we’re introducing a new Mandiant Academy course from Google Cloud, designed to replace frustration with clarity and confidence. Protecting the Perimeter: Practical Network Enrichment focuses …

Google is named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM

Source

The evolving security landscape demands more than just speed. It requires an intelligent, automated defense. Google Security Operations is an AI-powered platform built to deliver a modern agentic security operations center (SOC), where generative AI is woven into the fabric of your operations. We go beyond traditional SIEM and …

Cloud CISO Perspectives: Disrupt ransomware with AI in Google Drive

Source

Welcome to the first Cloud CISO Perspectives for October 2025. Today, Kristina Behr, VP, Workspace Product Management, and Jorge Blanco, director, Office of the CISO, explain how a new AI-driven capability in Google Drive can help security and business leaders protect their data and minimize the impact of ransomware …

Build in-demand network security skills with the new Google Cloud learning path

Source

Protecting your organization from cyber threats is essential for ensuring smooth operations and meeting compliance requirements. Specialized defense has become more urgent as sensitive data and critical applications have migrated to the cloud. Security is no longer about perimeter firewalls; it’s about securing dynamic cloud networks. Recognizing the …

Mandiant Academy: Basic Static and Dynamic Analysis course now available

Source

Understanding malware functionality and analysis processes can be a thorny ball of string. To help IT and information security professionals, corporate investigators, and anyone else get started in pursuing malware analysis as a primary specialty, Mandiant Academy’s new "Basic Static and Dynamic Analysis" course can help enhance your …

Announcing quantum-safe Key Encapsulation Mechanisms in Cloud KMS

Source

Quantum computing presents a new frontier for technology, and a new set of security challenges, too. A sufficiently powerful quantum computer could break the public-key cryptography systems we rely on today, posing a significant risk to individuals and organizations. Although that threat might be years away, building appropriate defenses …

Cloud CISO Perspectives: Boards should be ‘bilingual’ in AI, security to gain advantage

Source

Welcome to the second Cloud CISO Perspectives for September 2025. Today, Google Cloud COO Francis deSouza offers his insights on how boards of directors and CISOs can thrive with a good working relationship, adapted from a recent episode of the Cyber Savvy Boardroom podcast. As with all Cloud CISO …

Strengthen GCE and GKE security with new dashboards powered by Security Command Center

Source

As cloud infrastructure evolves, so should how you safeguard that technology. As part of our efforts to help you maintain a strong security posture, we’ve introduced powerful capabilities that can address some of the thorniest challenges faced by IT teams who work with Google Compute Engine (GCE) virtual …

Partnering with Google Cloud MSSPs: Solving security challenges with expertise & speed

Source

Organizations today face immense pressure to secure their digital assets against increasingly sophisticated threats — without overwhelming their teams or budgets. Using managed security service providers (MSSPs) to implement and optimize new technology, and handle security operations, is a strategic delegation that can make internal security operations staff more efficient …

How to secure your remote MCP server on Google Cloud

Source

As enterprises increasingly adopt model context protocol (MCP) to extend capabilities of AI models to better integrate with external tools, databases, and APIs, it becomes even more important to ensure secure MCP deployment. MCP unlocks new capabilities for AI systems; it can also introduce new risks, such as tool …

Cloud CISO Perspectives: APAC security leaders speak out on AI and key topics

Source

Welcome to the first Cloud CISO Perspectives for September 2025. Today, Daryl Pereira and Hui Meng Foo, from our Office of the CISO’s Asia-Pacific office, share insights on AI from security leaders who attended our recent Google Cloud CISO Community event in Singapore. As with all Cloud CISO …

Prove your expertise with our Professional Security Operations Engineer certification

Source

Security leaders are clear about their priorities: After AI, cloud security is the top training topic for decision-makers. As threats against cloud workloads become more sophisticated, organizations are looking for highly-skilled professionals to help defend against these attacks. To help organizations meet their need for experts who can manage …

Introducing no-cost, multicloud Data Transfer Essentials for EU and U.K. customers

Source

At Google Cloud, our services are built with interoperability and openness in mind to enable customer choice and multicloud strategies. W e pioneered a multicloud data warehouse, enabling workloads to run across clouds. We were the first company to provide digital sovereignty solutions for European governments and to waive …

Announcing partner-built AI security innovations on Google Cloud

Source

Securing AI systems is a fundamental requirement for business continuity and customer trust, and Google Cloud is at the forefront of driving secure AI innovations and working with partners to meet the evolving needs of customers. Our secure-by-design cloud platform and built-in security solutions are continuously updated with the …

Introducing the Agentic SOC Workshops for security professionals

Source

The security operations centers of the future will use agentic AI to enable intelligent automation of routine tasks, augment human decision-making, and streamline workflows. At Google Cloud, we want to help prepare today’s security professionals to get the most out of tomorrow’s AI agents. As we build …

From clicks to clusters: Expanding Confidential Computing with Intel TDX

Source

Privacy-protecting Confidential Computing has come a long way since we introduced Confidential Virtual Machines (VMs) five years ago. The technology, which can protect data while in use, strengthens a security gap beyond data encryption at rest and in transit. Since then, customers have used Confidential Computing to protect patient …

Cloud CISO Perspectives: How CISOs and boards can help fight cyber-enabled fraud

Source

Welcome to the second Cloud CISO Perspectives for August 2025. Today, David Stone and Marina Kaganovich, from our Office of the CISO, talk about the serious risk of cyber-enabled fraud — and how CISOs and boards can help stop it. As with all Cloud CISO Perspectives, the contents of this …

Google named a Leader in IDC MarketScape: Worldwide Incident Response 2025 Vendor Assessment

Source

Today's cybersecurity landscape requires partners with expertise and resources to handle any incident. Mandiant, a core part of Google Cloud Security, can empower organizations to navigate critical moments, prepare for future threats, build confidence, and advance their cyber defense programs. We're excited to announce that Google has been named …

From silos to synergy: New Compliance Manager, now in preview

Source

As organizations increase their focus on security and regulatory compliance, Google Cloud is helping our customers meet these obligations by fostering better collaboration between security and compliance teams, and the wider organization they serve. To help simplify and enhance how organizations manage security, privacy, and compliance in the cloud …

Going beyond basic data security with Google Cloud DSPM

Source

In the age of data democratization and generative AI, the way organizations handle data has changed dramatically. This evolution creates opportunities — and security risks. The challenge for security teams isn't just about protecting data; it's about scaling security and compliance to meet this new reality. While traditional security controls …

Announcing new capabilities for enabling defenders and securing AI innovation

Source

AI presents an unprecedented opportunity for organizations to redefine their security posture and reduce the greatest amount of risk for the investment. From proactively finding zero-day vulnerabilities to processing vast amounts of threat intelligence data in seconds to freeing security teams from toilsome work, AI empowers security teams to …

Now available: Cloud HSM as an encryption key service for Workspace client-side encryption

Source

Organizations in highly-regulated sectors, such as government, defense, financial services, and healthcare, are required to meet stringent standards to safeguard sensitive data. Client-side encryption (CSE) for Google Workspace is a unique, privacy-preserving offering that keeps customer data confidential and enables the customer to be the sole arbiter of their …

Cloud CISO Perspectives: New Threat Horizons details evolving risks — and defenses

Source

Welcome to the first Cloud CISO Perspectives for August 2025. Today, our Office of the CISO’s Bob Mechler and Anton Chuvakin dive into the key trends and evolving threats that we tracked in our just-published Cloud Threat Horizons report. As with all Cloud CISO Perspectives, the contents of …

page 1 | older articles »