Showing only posts tagged Security & Identity. Show all posts.

Announcing quantum-safe digital signatures in Cloud KMS

Source

The continued advancement of experimental quantum computing has raised concerns about the security of many of the world's widely-used public-key cryptography systems. Crucially, there exists the potential for sufficiently large, cryptographically-relevant quantum computers to break these algorithms. This potential highlights the need for developers to build and implement quantum-resistant …

Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices

Source

Welcome to the first Cloud CISO Perspectives for February 2025. Stephanie Kiel, our head of cloud security policy, government affairs and public policy, discusses two parallel and important security conversations she had at the Munich Security Conference, following our new reports on AI and cybercrime. As with all Cloud …

Enhance Gemini model security with content filters and system instructions

Source

As organizations rush to adopt generative AI-driven chatbots and agents, it’s important to reduce the risk of exposure to threat actors who force AI models to create harmful content. We want to highlight two powerful capabilities of Vertex AI that can help manage this risk — content filters and …

5 ways Google Cloud can help you minimize credential theft risk

Source

Threat actors who target cloud environments are increasingly focusing on exploiting compromised cloud identities. A compromise of human or non-human identities can lead to increased risks, including cloud resource abuse and sensitive data exfiltration. These risks are exacerbated by the sheer number of identities in most organizations; as they …

Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats

Source

Welcome to the second Cloud CISO Perspectives for January 2025. Iain Mulholland, senior director, Security Engineering, shares insights on the state of ransomware in the cloud from our new Threat Horizons Report. The research and intelligence in the report should prove helpful to all cloud providers and security professionals …

Privacy-preserving Confidential Computing now on even more machines and services

Source

Organizations are increasingly using Confidential Computing to help protect their sensitive data in use as part of their data protection efforts. Today, we are excited to highlight new Confidential Computing capabilities that make it easier for organizations of all sizes to adopt this important privacy-preserving technology. 1. Confidential GKE …

How we’re making GKE more transparent with supply-chain attestation and SLSA

Source

What goes into your Kubernetes software? Understanding the origin of the software components you deploy is crucial for mitigating risks and ensuring the trustworthiness of your applications. To do this, you need to know your software supply chain. Google Cloud is committed to providing tools and features that enhance …

Get started with Google Cloud's built-in tokenization for sensitive data protection

Source

In many industries including finance and healthcare, sensitive data such as payment card numbers and government identification numbers need to be secured before they can be used and shared. A common approach is applying tokenization to enhance security and manage risk. A token is a substitute value that replaces …

Introducing Google Cloud Abuse Event Logging to enable automated incident remediation

Source

At Google Cloud, we are deeply committed to partnering with our customers to help achieve stronger security outcomes. As a part of this commitment, we're excited to announce that Google Cloud customers can now track Cloud Abuse Events using Cloud Logging. These events can include leaked service account keys …

« newer articles | page 4