Showing only posts tagged Security & Identity. Show all posts.

Chrome Enterprise expands ecosystem to strengthen endpoint security and Zero Trust access

Source

The modern workplace relies on web-based applications and cloud services, making browsers and their sensitive data a primary target for attackers. While the risks are significant, Chrome Enterprise can help organizations simplify and strengthen their endpoint security with secure enterprise browsing. Following our recent Chrome Enterprise Premium launch, today …

Introducing Google Security Operations: Intel-driven, AI-powered SecOps

Source

In the generative AI-era, security teams are looking for a fully-operational, high-performing security operations solution that can drive productivity while empowering defenders to detect and mitigate new threats. Today at the RSA Conference in San Francisco, we’re announcing AI innovations across the Google Cloud Security portfolio, including Google …

Introducing Google Threat Intelligence: Actionable threat intelligence at Google scale

Source

For decades, threat intelligence solutions have had two main challenges: They lack a comprehensive view of the threat landscape, and to get value from intelligence, organizations have to spend excess time, energy, and money trying to collect and operationalize the data. Today at the RSA Conference in San Francisco …

Cloud CISO Perspectives: Tour the new Security Command Center Enterprise

Source

Welcome to the second Cloud CISO Perspectives for April 2024. In this update, my colleague Sunil Potti gives a leaders’ tour of Security Command Center Enterprise — and how it can help security teams better manage risk across their growing cloud deployments. As with all Cloud CISO Perspectives, the contents …

Ransomware Protection and Containment Strategies: Practical Guidance for Hardening and Protecting Infrastructure, Identities and Endpoints

Source

Written by: Matthew McWhirt, Omar ElAhdan, Glenn Staniforth, Brian Meyer Multi-faceted extortion via ransomware and/or data theft is a popular end goal for attackers, representing a global threat targeting organizations in all industries. The impact of a successful ransomware event can be material to an organization, including the …

From Assistant to Analyst: The Power of Gemini 1.5 Pro for Malware Analysis

Source

Executive Summary A growing amount of malware has naturally increased workloads for defenders and particularly malware analysts, creating a need for improved automation and approaches to dealing with this classic threat. With the recent rise in generative AI tools, we decided to put our own Gemini 1.5 Pro …

Your insider’s guide to Google Cloud Security at RSA Conference 2024

Source

At Google Cloud Security, our goal is to make it easier for organizations to adopt and protect themselves with advanced security capabilities. Instead of increasing complexity by adding new products every time a new threat or new requirement emerges, we introduce simplicity by removing parts: No more duplicative tools …

Poll Vaulting: Cyber Threats to Global Elections

Source

Written by: Kelli Vanderlee, Jamie Collier Executive Summary The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats. Elections attract threat activity from a variety of threat actors including: state-sponsored actors, cyber criminals, hacktivists, insiders, and information operations as-a-service entities. Mandiant assesses with high …

M-Trends 2024: Our View from the Frontlines

Source

Attackers are taking greater strides to evade detection. This is one of the running themes in our latest release: M-Trends 2024. This edition of our annual report continues our tradition of providing relevant attacker and defender metrics, and insights into the latest attacker tactics, techniques and procedures, along with …

Google Cloud offers new AI, cybersecurity, and data analytics training to unlock job opportunities

Source

Google Cloud is on a mission to help everyone build the skills they need for in-demand cloud jobs. Today, we're excited to announce new learning opportunities that will help you gain these in-demand skills through new courses and certificates in AI, data analytics, and cybersecurity. Even better, we’re …

Announcing the general availability of Next Gen Firewall Enterprise

Source

In today's ever-evolving threat landscape, organizations require robust network security solutions to protect their critical assets in the cloud. Google Cloud is committed to providing superior cloud-first security controls, and today at Google Cloud Next, we're thrilled to announce the general availability of Google Cloud NGFW Enterprise, our next-generation …

Introducing Isolator: Enabling secure multi-party collaboration with healthcare data

Source

With more than a decade of experience building AI and machine learning models, Google Cloud understands both the benefits and challenges that await those looking to take advantage of these new technologies. Organizations around the world are now looking to AI solutions to solve some of their thornier problems …

Expanded Confidential Computing portfolio and introducing Confidential Accelerators for AI workloads

Source

Confidential Computing can help organizations process sensitive data in the cloud with strong guarantees around confidentiality. We’ve continued to make strides in maturing this important technology, and are collaborating with industry leaders including Intel, AMD, and NVIDIA on advancing Confidential Computing solutions. Today at Google Cloud Next, we …

Introducing Shadow API detection for your Google Cloud environments

Source

Enterprises operate a large and growing number of APIs — more than 200 on average — each a potential front door to sensitive data. Even more challenging can be figuring out which of these APIs are not actively managed “shadow APIs”. Born from well-intended development initiatives and legacy systems, shadow APIs …

Introducing Chrome Enterprise Premium: The future of endpoint security

Source

Today at Google Cloud Next, we are announcing a new frontline of defense for organizations: Chrome Enterprise Premium, an offering that can help simplify and strengthen endpoint security. With Chrome Enterprise Premium, the latest evolution of the world’s most trusted enterprise browser, hundreds of millions of enterprise users …

Make Google part of your security team anywhere you operate, with defenses supercharged by AI

Source

Protecting people, data, and critical assets is a crucial responsibility for modern organizations, yet conventional security approaches often struggle to address the escalating velocity, breadth, and intricacy of modern cyberattacks. Bolting on more new security products is simply not a viable long-term strategy. What organizations need from their security …

Powering Google Cloud with Gemini

Source

We are excited to share with you that Gemini for Google Cloud is here. Generative AI’s capabilities have grown tremendously over the last year, and we have infused it throughout our product portfolio. Gemini for Google Cloud is a new generation of AI assistants for developers, Google Cloud …

What’s new with Google Cloud Networking at Next ’24

Source

Cross-Cloud Network has transformed how organizations connect and secure workloads across hybrid and multi-cloud networks. It simplifies complexity, strengthens security posture, and helps deliver faster business outcomes. Built on Google Cloud’s planet-scale network, Cross-Cloud Network enables you to deliver rich experiences, streamline operational efficiency, and lower TCO. AI …

Boosting data cyber-resilience for your Cloud Storage data with object retention lock

Source

Data retention is crucial for customers especially in regulated industries such as financial services, healthcare, and government. Customers can use write once, read many (WORM) storage to meet their data retention needs, keeping their data immutable, and comply with industry regulations set forth by governing bodies such as FINRA …

Cloud CISO Perspectives: Get ready for Next ‘24: What you need to know

Source

Welcome to the second Cloud CISO Perspectives for March 2024. Today, Brian Roddy, vice president of security product management, Google Cloud, talks about some of the important cybersecurity hot topics that will be driving our announcements at Google Cloud Next in April. As with all Cloud CISO Perspectives, the …

« newer articles | page 4 | older articles »