Showing only posts tagged Security & Identity. Show all posts.

Google named a Strong Performer in The Forrester Wave for security analytics platforms

Source

We are excited to announce that Google has been named a Strong Performer in The Forrester WaveTM: Security Analytics Platforms, Q2 2025, in our first year of participation. The report acknowledges Google Cloud’s vision which relies heavily on Mandiant’s roots in threat-intelligence-driven security operations, which are evident …

Audit smarter: Introducing Google Cloud’s Recommended AI Controls framework

Source

As organizations build new generative AI applications and AI agents to automate business workflows, security and risk management management leaders face a new set of governance challenges. The complex, often opaque nature of AI models and agents, coupled with their reliance on vast datasets and potential for autonomous action …

Enhancing backup vaults with support for Persistent Disk, Hyperdisk, and multi-regions

Source

To help protect against evolving digital threats like ransomware and malicious deletions, last year, we introduced backup vault in the Google Cloud Backup and DR service, with support for Compute Engine VM backups. This provided immutable and indelible backup capabilities for mission-critical VMs, for both VM metadata and all …

How Google Cloud is securing open-source credentials at scale

Source

Credentials are an essential part of modern software development and deployment, granting bearers privileged access to systems, applications, and data. However, credential-related vulnerabilities remain the predominant entry point exploited by threat actors in the cloud. Stolen credentials “are now the second-highest initial infection vector, making up 16% of our …

Enhancing Google Cloud protection: 4 new capabilities in Security Command Center

Source

In today's cloud environments, security teams need more than just surface-level visibility; they require actionable insight to ensure that their cloud workloads are safe. Unlike third-party cloud security tools that rely on data available via public APIs, Security Command Center (SCC) is built directly into Google Cloud. This gives …

Cloud CISO Perspectives: How governments can use AI to improve threat detection and reduce cost

Source

Welcome to the second Cloud CISO Perspectives for May 2025. Today, Enrique Alvarez, public sector advisor, Office of the CISO, explores how government agencies can use AI to improve threat detection — and save money at the same time. As with all Cloud CISO Perspectives, the contents of this newsletter …

How Confidential Computing lays the foundation for trusted AI

Source

Confidential Computing has redefined how organizations can securely process their sensitive workloads in the cloud. The growth in our hardware ecosystem is fueling a new wave of adoption, enabling customers to use Confidential Computing to support cutting-edge uses such as building privacy-preserving AI and securing multi-party data analytics. We …

Cloud CISO Perspectives: How Google Cloud’s security team helps build securely

Source

Welcome to the first Cloud CISO Perspectives for May 2025. Today, Iain Mulholland, senior director, Security Engineering, pulls back the curtain on how Google Cloud approaches security engineering and how we take secure by design from mindset to production. As with all Cloud CISO Perspectives, the contents of this …

Advancing sovereignty, choice, and security in the cloud for our customers

Source

Like most organizations, Google Cloud is continually engaging with customers, partners, and policymakers to deliver technology capabilities that reflect their needs. When it comes to digital sovereignty solutions, Google Cloud has worked with customers for nearly a decade. Today, we’re pleased to announce significant technical and commercial updates …

Expanding our Risk Protection Program with new insurance partners and AI coverage

Source

Today’s businesses have a vital need to manage and, when appropriate, transfer cyber risk in their cloud environments — even with robust security measures in place. At Google Cloud Next last month, we unveiled significant advancements to our Risk Protection Program, an industry-first collaboration between Google and leading cyber …

Cloud CISO Perspectives: Data-driven insights into AI and cybersecurity

Source

Welcome to the second Cloud CISO Perspectives for April 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, will talk about the practical applications of AI in both attack and defense, adapted from her RSA Conference keynote. As with all Cloud CISO Perspectives, the contents of this newsletter are …

From insight to action: M-Trends, agentic AI, and how we’re boosting defenders at RSAC 2025

Source

Cybersecurity is facing a unique moment, where AI-enhanced threat intelligence, products, and services are poised to give defenders an advantage over the threats they face that’s proven elusive — until now. To empower security teams and business leaders in the AI era, and to help organizations proactively combat evolving …

Announcing cloud-native integration of security service edge (SSE) with Cloud WAN

Source

Last week at Google Cloud Next 25, we announced Cloud WAN, a fully managed, reliable, and secure solution for enterprise wide area network (WAN) architectures that’s built on Google’s planet-scale network. Today, we begin a series of deep dives into the products that power Cloud WAN, starting …

Driving secure innovation with AI and Google Unified Security

Source

Today at Google Cloud Next, we are announcing Google Unified Security, new security agents, and innovations across our security portfolio designed to deliver stronger security outcomes and enable every organization to make Google a part of their security team. Introducing Google Unified Security Enterprise infrastructure continues to grow in …

Cloud CISO Perspectives: How digital sovereignty builds better borders for the future

Source

Welcome to the second Cloud CISO Perspectives for March 2025. Today, Archana Ramamoorthy, senior director of product management, Google Cloud, explains our approach to digital sovereignty and we believe strongly in meeting this vital customer need. As with all Cloud CISO Perspectives, the contents of this newsletter are posted …

Secure backups with end-to-end workflows for threat detection and remediation

Source

Data backups are a lifeline and the ultimate safeguard when your organization is faced with unexpected disruption. Last year, we introduced backup vault, a powerful storage feature available as part of the Google Cloud Backup and Disaster Recovery (DR) service. Backup vault secures backups against tampering and unauthorized deletion …

Securing the future of football: Google Cloud and Atlético de Madrid expand cybersecurity partnership

Source

In an era where digital security is more important than ever, Atlético de Madrid is strengthening its defenses beyond the pitch. Known for their resilience and tactical discipline on the field, the club is taking the same proactive approach to securing its digital operations and fan experience. At Google …

Mastering secure AI on Google Cloud, a practical guide for enterprises

Source

Introduction As we continue to see rapid AI adoption across the industry, organizations still often struggle to implement secure solutions because of the new challenges around data privacy and security. We want customers to be successful as they develop and deploy AI, and that means carefully considering risk mitigation …

« newer articles | page 4 | older articles »