Showing only posts tagged Security & Identity. Show all posts.

How Chronicle can help advance security product development and overcome data lake challenges

Source

Building your cybersecurity product’s data platform to automatically process massive volumes of data and deliver high-speed search, rich contextual insight, threat detection, and context-aware response automation can be difficult, even with modern day data lakes. One option to avoid the challenges of data lakes and enable your engineers …

Take control of your supply chain with Artifact Registry remote and virtual repositories

Source

Dev : "I need that library's functionality for the new feature!" Sec : "I can't approve it if I don't know that it's safe to deploy!" Dev : "And when will we know?" Sec : "My queue is 11 weeks long...." The most contentious conversations between security and development teams often involve the …

Understanding Nasuni’s new ransomware protection service on Google Cloud

Source

Open ecosystems and collaborative partnerships matter, particularly with cloud infrastructure solutions. Google Cloud maintains a robust partner ecosystem that encourages companies like file-data-services provider Nasuni to create innovative solutions that run on its infrastructure. Partners can leverage what Google Cloud has built and advanced over many years to offer …

How to secure content production on Google Cloud with CSAP

Source

Content production is increasingly happening in the cloud. While moving a creative process that spans three centuries into the modern era brings challenges and risks, MovieLabs is one organization that takes digital transformation seriously. A nonprofit research and development group founded by a consortium of the major Hollywood studios …

Google Cloud Assured Open Source Software service is now generally available

Source

Threats to the software supply chain and open source software (OSS) security continue to be major areas of concern for organizations creating apps and their developers. According to Mandiant’s M-Trends 2022 report, 17% of all security breaches start with a supply chain attack, the initial infection vector second …

Best Kept Security Secrets: How Assured Workloads accelerates security and compliance

Source

Digital transformation is now a strategic imperative for organizations across every industry. For governments and regulated businesses, moving services to the cloud poses a unique set of challenges. As a vital enabler of transformation, the cloud can unlock innovation and help keep pace with the accelerating pace of digital …

Google Public Sector achieves CJIS compliance in Florida

Source

Google Public Sector has completed the process with Florida Department of Law Enforcement (FDLE) to ensure Google Cloud supports the requirements necessary to store, process, and support criminal justice information (CJI). As part of this process, Google Public Sector worked with FDLE to conduct physical audits of facilities nationally …

Announcing Firewall Insights support for firewall policies and trend-based analysis

Source

Firewall Insights helps you understand and optimize your Cloud Firewall rules by providing insights, recommendations, and metrics about how your firewall rules are being used. We are excited to announce new enhancements for Firewall Insights that support hierarchical firewall policies and network firewall policies. These enhancements are now generally …

Realize policy-as-code with Pulumi through CrossGuard on Google Cloud

Source

When it comes to creating and deploying cloud infrastructure on Google Cloud, more organizations are using CrossGuard from Pulumi. This policy-as-code offering lets you set guardrails to enforce compliance for resources, so you can provision your own infrastructure while sticking to best practices and baseline your organization’s security …

Google named a 2023 Strong Performer in the Gartner Peer Insights™ Voice of the Customer for Security Information and Event Management

Source

In 2016, Google’s "X", the moonshot factory, began working on a project aimed to take on cybersecurity. The belief that we could increase the speed and impact of security teams if it were much easier, faster, and more cost-effective for them to capture and analyze security-related clues from …

How Dataplex can improve data auditing, security, and access management

Source

Data is one of the most important assets of any enterprise. It is essential for making informed decisions, improving efficiency, and providing a competitive edge. However, managing data comes with the responsibility of preventing data misuse. Especially in regulated industries, mishandling data can lead to significant financial and reputational …

How to secure digital assets with multi-party computation and Confidential Space

Source

In a previous blog post, we introduced how multi-party computation (MPC) can help reduce risk from single points of compromise and can facilitate instant, policy-compliant digital asset transactions. One of the quickest and easiest ways companies can implement MPC solutions is with Google Cloud's Confidential Space. This solution offers …

Confidential Space: The future of privacy-preserving collaboration

Source

Today, we are happy to announce that Confidential Space is Generally Available. Confidential Space builds on our Confidential Computing portfolio. It provides a secure enclave, also known as a Trusted Execution Environment (TEE), that our Google Cloud customers can leverage for privacy-focused use cases such as joint data analysis …

Helping U.S.-based financial services firms manage third-party due diligence requirements when using Google Cloud

Source

Financial services institutions increasingly rely on external service providers for a variety of technology-related services, including cloud computing. This trend materialized as firms recognized the value in focusing on their core competencies while using third party solutions to gain business, operational, security, resiliency, and other efficiencies. As the financial …

Workload Identity for GKE made easy with open source tools

Source

Google Cloud offers a clever way of allowing Google Kubernetes Engine (GKE) workloads to safely and securely authenticate to Google APIs with minimal credentials exposure. I will illustrate this method using a tool called kaniko. What is kaniko? kaniko is an open source tool that allows you to build …

Gleaning security insights from audit logs with Log Analytics

Source

Cloud Audit logs serve a vital purpose in Google Cloud by helping customers meet their compliance and security requirements. Log Analytics, a recent feature addition to Cloud Logging, brings new capabilities to search, aggregate and transform logs at query time using the power of SQL. Together with predefined queries …

How AI can improve digital security

Source

AI is having a transformative moment and causing profound shifts in what’s possible with technology. It has the power to unlock the potential of communities, companies, and countries around the world, bringing meaningful and positive change that could improve billions of peoples’ lives. Similarly, as these technologies advance …

Why (and how) Google Cloud is adding attack path simulation to Security Command Center

Source

As cloud environments scale and evolve based on changing business priorities, security teams may struggle to understand where their biggest risks are and where to focus their security controls. Some cloud security products have begun to incorporate attack path analysis to address this prioritization problem. Attack path analysis is …

Google is named a Leader in Forrester Data Security Platforms Wave

Source

To help organizations confidently move their sensitive data to the cloud, Google Cloud works diligently to earn and maintain customer trust. Our Trusted Cloud is committed to giving you a secure foundation that you can verify and independently control. Discovery and protection of sensitive data are integral parts of …

Announcing Google Cloud’s new Digital Sovereignty Explorer

Source

Digital sovereignty continues to be a top priority for organizations working to advance or begin their digital transformation efforts. Over the past few years, Google Cloud has worked extensively with customers, partners, policy makers and governments around the world to understand evolving sovereignty requirements. In Europe, this has resulted …

Expanding Cloud Armor DDoS protection to Network Load Balancing and VMs with Public IP addresses

Source

Over the past few years, Google has observed that distributed denial-of-service (DDoS) attacks are increasing in frequency and growing exponentially in size. Google Cloud customers have been using Cloud Armor and leveraging the scale and capacity of Google’s network edge to protect their environment from some of the …

« newer articles | page 11 | older articles »