Showing only posts tagged Security & Identity. Show all posts.

Cloud CISO Perspectives: How CISOs and boards can help fight cyber-enabled fraud

Source

Welcome to the second Cloud CISO Perspectives for August 2025. Today, David Stone and Marina Kaganovich, from our Office of the CISO, talk about the serious risk of cyber-enabled fraud — and how CISOs and boards can help stop it. As with all Cloud CISO Perspectives, the contents of this …

Google named a Leader in IDC MarketScape: Worldwide Incident Response 2025 Vendor Assessment

Source

Today's cybersecurity landscape requires partners with expertise and resources to handle any incident. Mandiant, a core part of Google Cloud Security, can empower organizations to navigate critical moments, prepare for future threats, build confidence, and advance their cyber defense programs. We're excited to announce that Google has been named …

From silos to synergy: New Compliance Manager, now in preview

Source

As organizations increase their focus on security and regulatory compliance, Google Cloud is helping our customers meet these obligations by fostering better collaboration between security and compliance teams, and the wider organization they serve. To help simplify and enhance how organizations manage security, privacy, and compliance in the cloud …

Going beyond basic data security with Google Cloud DSPM

Source

In the age of data democratization and generative AI, the way organizations handle data has changed dramatically. This evolution creates opportunities — and security risks. The challenge for security teams isn't just about protecting data; it's about scaling security and compliance to meet this new reality. While traditional security controls …

Announcing new capabilities for enabling defenders and securing AI innovation

Source

AI presents an unprecedented opportunity for organizations to redefine their security posture and reduce the greatest amount of risk for the investment. From proactively finding zero-day vulnerabilities to processing vast amounts of threat intelligence data in seconds to freeing security teams from toilsome work, AI empowers security teams to …

Now available: Cloud HSM as an encryption key service for Workspace client-side encryption

Source

Organizations in highly-regulated sectors, such as government, defense, financial services, and healthcare, are required to meet stringent standards to safeguard sensitive data. Client-side encryption (CSE) for Google Workspace is a unique, privacy-preserving offering that keeps customer data confidential and enables the customer to be the sole arbiter of their …

Cloud CISO Perspectives: New Threat Horizons details evolving risks — and defenses

Source

Welcome to the first Cloud CISO Perspectives for August 2025. Today, our Office of the CISO’s Bob Mechler and Anton Chuvakin dive into the key trends and evolving threats that we tracked in our just-published Cloud Threat Horizons report. As with all Cloud CISO Perspectives, the contents of …

Forrester study: Customers cite 240% ROI with Google Security Operations

Source

As part of Google Cloud’s fundamental belief that robust security can enable business resilience and innovation, we're committed to empowering security operations teams with solutions that deliver measurable value and demonstrable return on investment (ROI). That's why we're thrilled to announce a new, in-depth Forrester Consulting Total Economic …

Boosting defenders with AI: What’s coming at Security Summit 2025

Source

While AI can help empower defenders, it can also create new security challenges. Those two critical, interconnected themes are driving our announcements and presentations for this year's Google Cloud Security Summit. Join us live for Security Summit 2025 on August 19 to learn about the latest advancements in AI-powered …

Cloud CISO Perspectives: Going beyond 2FA to address fast-rising, emerging threats

Source

Welcome to the second Cloud CISO Perspectives for July 2025. Today, Andy Wen, director, product management, Workspace Security, discusses new efforts we’re making to defend against identity-based cyberattacks. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If you …

Too many threats, too much data, say security and IT leaders. Here’s how to fix that

Source

An overwhelming volume of threats and data combined with the shortage of skilled threat analysts has left many security and IT leaders believing that their organizations are vulnerable to cyberattacks and stuck in a reactive state. That’s according to the new Threat Intelligence Benchmark, a commissioned study conducted …

Your guide to Google Cloud Security at Black Hat USA 2025

Source

At Google Cloud Security, our mission is to empower organizations to strengthen their defenses with innovative security capabilities, all while simplifying and modernizing their cybersecurity. In a world of evolving threats and increasing complexity, we believe true security comes from clarity, not more noise. We're excited to bring this …

How SUSE and Google Cloud collaborate on Confidential Computing

Source

Securing sensitive data is a crucial part of moving workloads to the cloud. While encrypting data at rest and in transit are standard security practices, safeguarding data in use — while it's actively being processed in memory — can present unique security and privacy challenges. To make sure that data in …

Innovate with Confidential Computing: Attestation, Live Migration on Google Cloud

Source

Since its debut on Google Cloud, Confidential Computing has evolved at an incredible pace, offering customers robust protection for sensitive data processed in the cloud and ensuring higher levels of security and privacy. Driven by the ever-increasing need to protect sensitive data in the cloud, we’ve innovated continuously …

How to enable Secure Boot for your AI workloads

Source

As organizations race to deploy powerful GPU-accelerated workloads, they might overlook a foundational step: ensuring the integrity of the system from the very moment it turns on. Threat actors, however, have not overlooked this. They increasingly target the boot process with sophisticated malware like bootkits, which seize control before …

Cloud CISO Perspectives: Our Big Sleep agent makes a big leap, and other AI news

Source

Welcome to the first Cloud CISO Perspectives for July 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, talks about an incredible milestone with our Big Sleep AI agent, as well as other news from the intersection of security and AI. As with all Cloud CISO Perspectives, the contents …

Engineering Deutsche Telekom's sovereign data platform

Source

Imagine transforming a sprawling, 20-year-old telecommunications data ecosystem, laden with sensitive customer information and bound by stringent European regulations, into a nimble, cloud-native powerhouse. That's precisely the challenge Deutsche Telekom tackled head-on, explains Ashutosh Mishra. By using Google Cloud's Sovereign Cloud offerings, they've built a groundbreaking "One Data Ecosystem …

London Summit: agentic AI leaders, training 100,000 civil servants, AI sovereignty, and more

Source

There’s a buzz of excitement here at Tobacco Dock as we welcome our customers and partners to the Google Cloud Summit London. Together, we’re exploring the essential role Google Cloud is playing in driving AI innovation and adoption across the UK. Today is about shining a spotlight …

Chat with confidence: Unpacking security in Looker Conversational Analytics

Source

The landscape of business intelligence is evolving rapidly, with users expecting greater self-service and natural language capabilities, powered by AI. Looker’s Conversational Analytics empowers everyone in your organization to access the wealth of information within your data. Select the data you wish to explore, ask questions in natural …

Powering public sector innovation: New networking features in GDC air-gapped

Source

For organizations with stringent sovereignty and regulatory requirements, Google Distributed Cloud (GDC) air-gapped delivers a fully-managed experience with critical advanced networking capabilities. But operating in a completely isolated environment presents some unique networking challenges. Routine tasks become significantly more complex and manual, demanding more planning and bespoke solutions than …

Cloud CISO Perspectives: The global threats facing EU healthcare

Source

Welcome to the second Cloud CISO Perspectives for June 2025. Today, Thiébaut Meyer and Bhavana Bhinder from Google Cloud’s Office of the CISO discuss our work to help defend European healthcare against cyberattacks. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the …

Just say no: Build defense in depth with IAM Deny and Org Policies

Source

In today's cloud landscape, safeguarding your cloud environment requires bolstering your Identity and Access Management (IAM) approach with more than allow policies and the principle of least privilege. To bolster your defenses, we offer a powerful tool: IAM Deny Policies. Relying only on IAM Allow policies leaves room for …

« newer articles | page 3 | older articles »