Showing only posts tagged Security & Identity. Show all posts.

Activating your defender's advantage at mWISE ‘24

Source

To stay ahead of evolving threats, security leaders and practitioners must tap into a vital but underutilized tool to strengthen their defenses: collaboration. The power of communication and knowledge-sharing among peers can help defenders seize the advantage when fighting threat actors who repeat the same tactics, techniques, and procedures …

How to prevent account takeovers with new certificate-based access

Source

Stolen credentials are one of the top attack vectors used by attackers to gain unauthorized access to user accounts and steal information. At Google, we’re continually evolving security capabilities and practices to make our cloud the most trusted cloud. To help protect your organization from stolen credentials, cookie …

Cloud CISO Perspectives: The high value of cross-industry communication

Source

Welcome to the first Cloud CISO Perspectives for September 2024. Today I’m taking a look at how our initiatives to drive cybersecurity collaboration across industries, regulators and governments, IT consortia, and researchers and universities can help make everyone safer online. As with all Cloud CISO Perspectives, the contents …

How EA Sports protects their game servers with Cloud Armor

Source

Electronic Arts (EA) is a global leader in digital interactive entertainment, known for its cutting-edge games, innovative services, and powerful technologies. So when EA Sports FC, a leading brand in the gaming industry, needed to choose a cloud provider to host its gaming infrastructure, they selected Google Cloud Armor …

Safer by default: Automate access control with Sensitive Data Protection and conditional IAM

Source

The first step towards protecting sensitive data begins with knowing where it exists. Continuous data monitoring can help you stay one step ahead of data security risks and set proper access controls to ensure data is used for the right reasons while minimizing unnecessary friction. Google Cloud’s Sensitive …

Cloud CISO Perspectives: What you’re missing when you miss out on mWISE Conference

Source

Welcome to the second Cloud CISO Perspectives for August 2024. Today Google Cloud Security’s Peter Bailey talks about our upcoming Mandiant Worldwide Information Security Exchange (mWISE) Conference, and why mWISE can be one of the most valuable events this year for CISOs, security leaders, and those looking to …

A guide to dual-region storage in Google Cloud Storage, now available in Frankfurt, London, Zurich and Belgium

Source

In today's digital landscape, data reliability, availability, and performance are paramount. Businesses and organizations rely on cloud storage solutions that not only ensure that data is safe, but that also provide uninterrupted access and low latency. Cloud Storage is a robust solution to these challenges, offering three distinct types …

Introducing delayed destruction for Secret Manager, a new way to protect your secrets

Source

Secret Manager is a fully-managed, scalable service for storing, operating, auditing and accessing secrets used across Google Cloud services including GKE and Compute Engine. A critical part of any secrets management strategy is managing deletion and destruction of secrets. To provide customers with advanced capabilities in this area, we …

Testing your LLMs differently: Security updates from our latest Cyber Snapshot Report

Source

Web-based large-language models (LLM) are revolutionizing how we interact online. Instead of well-defined and structured queries, people can engage with applications and systems in a more natural and conversational manner — and the applications for this technology continue to expand. While LLMs offer transformative business potential for organizations, their integration …

Google Cloud expands services in Saudi Arabia, delivering enhanced data sovereignty and AI capabilities

Source

Building on the launch of the Google Cloud region in the Kingdom of Saudi Arabia (KSA) in November 2023, we are excited to announce new data sovereignty, security, and AI capabilities for the Dammam region. These new offerings can help support the digital transformation journeys of organizations operating in …

What’s New in Assured Workloads: Enable updates and new control packages

Source

Compliance isn't a one-time goal; it's an ongoing process. As your organization and the regulatory environment evolve, so too does Assured Workloads. Here are the latest additions to our portfolio of software-defined controls and policies that can make supporting your compliance requirements easier on Google Cloud. Introducing Compliance Updates …

Cloud CISO Perspectives: How Google is preparing for post-quantum cryptography (and why you should, too)

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for post-quantum cryptography

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Cloud CISO Perspectives: Why we need to get ready for PQC

Source

Welcome to the first Cloud CISO Perspectives for August 2024. Today I’m adapting our upcoming Perspectives on Security for the Board report. It examines three key cybersecurity topics from the vantage of the board of directors: multifactor authentication, digital sovereignty, and — the one I’ll be focusing on …

Experimenting with Gemini 1.5 Pro and vulnerability detection

Source

Unpatched software vulnerabilities can have serious consequences. At Google Cloud, we want developers to reduce the risks they face by focusing on developing code that is secure by design and secure by default. While secure development can be time-consuming, generative AI can be used responsibly to help make that …

Create a powerful Kubernetes security duo with Custom Org Policy and Policy Controller

Source

To help customers implement defense in depth strategies, Google Cloud offers multiple layers of centralized resource governance controls that can help organizations securely scale their Google Cloud adoption across thousands of projects, APIs, and developers. These controls can help administrators strengthen security and support compliance across their entire org …

Level up your Kubernetes security with the CIS GKE Benchmarks

Source

Compliance efforts can feel like a challenging endeavor in most organizations. Engineering teams routinely don’t understand how often-confusing requirements will actually make the organization more secure. Sometimes, even the words that define compliance requirements can be hard to comprehend. The entire exercise can feel overwhelming, like being on …

Join Google Cloud Security Summit 2024 for a masterclass in modernizing security

Source

As your organization works to strengthen your security program, two complementary initiatives can help make a major impact: taking advantage of secure cloud platforms, and integrating dynamic intelligence and security operations. We’re emphasizing both of these in the dual-track agenda at our annual Google Cloud Security Summit on …

mWISE Conference 2024: Your front-row seat to the future of cybersecurity

Source

The cybersecurity landscape is constantly evolving, and staying ahead of the curve requires the power of collective intelligence. mWISE Conference 2024 is your chance to immerse yourself in the latest threat intelligence, cutting-edge tools, and engage with the strategic minds that are shaping the future of cybersecurity. Now in …

Announcing VPC Service Controls with private IPs to extend data exfiltration protection

Source

Google Cloud’s VPC Service Controls can help organizations mitigate the risk of data exfiltration from their Google Cloud managed services. VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping you limit access to your sensitive data. Today, we are excited to …

Introducing Spanner dual-region configurations that help maintain high availability and data residency

Source

Spanner is Google’s fully managed, globally distributed database with high throughput and virtually unlimited scale. Spanner processes over 4 billion queries per second at peak. With features such as automatic sharding, zero downtime, and strong consistency, Spanner powers demanding, global workloads — not only across customers in financial services …

« newer articles | page 3 | older articles »