Showing only posts tagged Security & Identity. Show all posts.

How Apigee can help government agencies adopt Zero Trust

Source

Securely sharing data is critical to building an effective government application ecosystem. Rather than building new applications, APIs can enable government leaders to gather data-driven insights within their existing technical environments. With the help of APIs, agencies can bring application-based information together to support their objectives. U.S. government …

Partnering with Health-ISAC to strengthen the European healthcare system

Source

Last July, Google Cloud launched our ambassador partnership with the Health Information Sharing and Analysis Center (Health-ISAC) and committed to working with industry leaders to better protect our healthcare ecosystem. Securing healthcare technology and data is a global challenge, and to meet it security professionals need to have better …

How Broadcom simplifies compliance for federal customers with Assured Workloads

Source

Broadcom is a global technology leader that designs, develops, and supplies many semiconductor and infrastructure software solutions. Broadcom’s category-leading product portfolio serves critical markets including data center, networking, software, broadband, wireless, storage, and industrial sectors. Our customers, many of whom operate in the federal public sector, need ready-made …

Cloud Data Loss Prevention’s sensitive data intelligence service is now available in Security Command Center

Source

Our Cloud Data Loss Prevention (Cloud DLP) discovery service can monitor and profile your data warehouse to bring awareness of where sensitive data is stored and processed. Profiling is also useful for confirming that data is not being stored and processed where you don’t want it. But how …

Game-changing IT security with Unity, Orca Security, and Google Cloud

Source

Every month, more than 1 million creators worldwide use Unity’s expansive platform to develop games, create beautiful visual effects, and design everything from electric cars to skyscrapers. The company’s comprehensive suite of solutions makes it easier to create, run, and monetize 2D and 3D content. Unity has …

How to solve customer challenges when security patching Google Kubernetes Engine

Source

Editor's note: This blog post has been adapted from the April 2023 Threat Horizons Report. Cloud customers are increasingly running their compute workloads in Kubernetes clusters due to the availability, flexibility, and security they provide. Just like other IT assets, these clusters need to be routinely patched to keep …

Introducing Organization Restrictions, a new way to keep threat actors out

Source

In Google Cloud, IAM Policies provide administrators with fine-grained control over who can use resources within their Google Cloud organization. With Organization Restrictions, a new generally available Google Cloud security control, administrators can restrict users’ access to only resources and data in specifically authorized Google Cloud organizations. It does …

New asset query simplifies asset inventory management in Security Command Center

Source

As our cloud customers scale their environments, they need to manage cloud resources and policies. Our biggest customers have millions of assets in their Google Cloud environments. Securing growing environments requires tools to help discover, monitor, and secure cloud assets. To help, Security Command Center (SCC), our security and …

3 new ways to authorize users to your private workloads on Cloud Run

Source

More and more organizations are building applications on Cloud Run, a fully managed compute platform that lets you run containerized applications on top of Google’s infrastructure. Think web applications, real-time dashboards, APIs, microservices, batch data processing, testing and monitoring tools, data science inference models, and more. Today, we're …

Accelerating cybersecurity resilience through the expanded Accenture-Google Cloud partnership

Source

Accenture and Google Cloud have partnered since 2018 to help the world’s largest organizations digitally transform their enterprises by harnessing our data analytics, AI/ML, and services expertise to build stronger digital cores. Today at the RSA Conference 2023 in San Francisco, we’re excited to announce that …

How Google and Intel make Confidential Computing more secure

Source

Confidential Computing has quickly emerged as a critical technology to ensure confidentiality and security of sensitive data while it’s being processed. It performs computation in a hardware isolated environment that is encrypted with keys managed by the processor and unavailable to the operator. These isolated environments help prevent …

Introducing AI-powered investigation in Chronicle Security Operations

Source

Leveraging recent advances in artificial intelligence (AI) and large language models (LLM), Google Cloud Security AI Workbench sets out to address three of the biggest challenges in cybersecurity: threat overload, toilsome tools, and the talent gap. These could not be more relevant for security operations. At the RSA Conference …

Introducing AI-powered risk summaries in Security Command Center

Source

Cloud security teams need expert guidance to protect against an increasing number of threats, and to help pinpoint where they are most at risk. They also need to make security issues understandable so that non-security specialists can help keep their organization safe. To meet both requirements, we will integrate …

Supercharging security with generative AI

Source

At Google Cloud, we continue to invest in key technologies to progress towards our true north star on invisible security : making strong security pervasive and simple for everyone. Our investments are based on insights from our world-class threat intelligence teams and experience helping customers respond to the most sophisticated …

Announcing API abuse detection powered by machine learning

Source

API security incidents are increasingly common and disruptive. With the growth of API traffic, enterprises across the world are also experiencing an uptick in malicious API attacks, making API security a heightened priority. According to our latest API Security Research Report, 50% of organizations surveyed have experienced an API …

« newer articles | page 10 | older articles »