Showing only posts tagged Security & Identity. Show all posts.

Want your cloud to be more secure? Stop using service account keys

Source

Securing cloud credentials has emerged as a challenge on the scale of Moby Dick: It presents an enormous problem, and simple solutions remain elusive. Credential security problems are also widespread: More than 69% of cloud compromises were caused by credential issues, including weak passwords, no passwords, and exposed APIs …

Wrangle your alerts with open source Falco and the gcpaudit plugin

Source

Monitoring microservices in the cloud has become an increasingly cumbersome exercise for teams struggling to keep pace with developers’ rapid application release velocity. One way to make things easier for overloaded security teams is to use the open-source runtime security platform Falco to quickly identify suspicious behavior in Linux …

Cloud CISO Perspectives: Guidance from our latest Threat Horizons report

Source

Welcome to the first Cloud CISO Perspectives for February 2024. Today I’ll be looking at our latest Threat Horizons report, which provides a forward-thinking view of cloud security with intelligence on emerging threats and actionable recommendations from Google's security experts. As with all Cloud CISO Perspectives, the contents …

How Gov Market helps to create economic opportunity in Germany with digital sovereignty

Source

In Germany, public procurement can be a highly complex and time-consuming process. More than 30,000 procurement entities vie for contracts across a fragmented regulatory landscape, with different rules applying at the federal, state, and municipal levels. Since public procurement procedures are often time-consuming, particularly for large or high-value …

How GovMarket helps to create economic opportunity in Germany with digital sovereignty

Source

In Germany, public procurement can be a highly complex and time-consuming process. More than 30,000 procurement entities vie for contracts across a fragmented regulatory landscape, with different rules applying at the federal, state, and municipal levels. Since public procurement procedures are often time-consuming, particularly for large or high-value …

Synthesized creates accurate synthetic data to power innovation with BigQuery

Source

Editor’s note : The post is part of a series showcasing partner solutions that are Built with BigQuery. Today, it’s data that powers the enterprise, helping to provide competitive advantage, inform business decisions, and drive innovation. However, accessing high-quality data can be costly and time-consuming, and using it …

Announcing general availability of Custom Org Policy to help tailor resource guardrails with confidence

Source

Google Cloud’s Organization Policy Service can help you control resource configurations and establish guardrails in your cloud environment. And with custom organization policies, a powerful new extension to Organization (Org) Policy Service, you can now create granular resource policies to help address your cloud governance requirements. This new …

IDC study: Customers cite 407% ROI with Chronicle Security Operations

Source

How effective is security technology at keeping your organization safe? While quantifying the investment return on security technology can be tricky, understanding the ROI of security products is crucial information for organizations to make informed decisions about resource allocation, strategy adjustments, and to get buy-in from financial approvers. With …

Introducing automated credential discovery to help secure your cloud environment

Source

Storing credentials in plaintext can make your organization less secure. Risks include exposing your credentials to unauthorized users, including threat actors. Improperly secured credentials can also be collected, propagated, and further exposed in various systems, such as logs or inventory systems. We recommend organizations protect their stored credentials with …

How European organizations are innovating with Google Sovereign Cloud solutions

Source

European organizations continue to embrace cloud-based solutions to support their ongoing digital transformation. But the adoption of breakthrough technologies like generative AI and data analytics to drive new innovations will only accelerate if organizations are confident that when they use cloud services their data will remain secure, private, and …

Cloud CISO Perspectives: How the AI megatrend can help manage threats, reduce toil, and scale talent

Source

Welcome to the first Cloud CISO Perspectives for December 2023. Today I’ll be providing an update to our cloud security megatrends blog. First published in January 2022, the premise of cloud security megatrends is that there were eight “megatrends” that drive technological innovation. It’s become clear that …

Announcing General Availability of Duet AI for Developers and Duet AI in Security Operations

Source

At Google Cloud, we are infusing the power of AI throughout our products and solutions to build AI services that can help all of our users. Duet AI in Google Cloud provides you with AI-powered collaborators to boost your productivity, gain competitive insights, and improve your bottom line. Today …

Introducing Cloud SQL Authentication via IAM groups: Simplify database authentication and access at scale

Source

Managing and auditing data access can be very complex at scale, in particular, for a fleet of databases with a myriad of users. Today, we are introducing IAM group authentication for Cloud SQL. With this launch, you can take advantage of better security, simplify user management and database authentication …

Announcing general availability of Cloud Armor for regional application load balancers

Source

Google Cloud Armor provides our customers with advanced DDoS defense and Web Application Firewall (WAF) capabilities. Today, we’re excited to announce the general availability of Cloud Armor for Regional External Application Load Balancers, which can help create regionally-scoped Cloud Armor security policies. In these policies, rules are evaluated …

Cloud CISO Perspectives: How security validations can help organizations stay secure

Source

Welcome to the second Cloud CISO Perspectives for November 2023. This month, Mandiant Consulting’s Earl Matthews discusses Security Validation, a vital tool that can give CISOs better information for making security decisions, and can help organizations understand their true security posture and risk profile. As with all Cloud …

Cloud CISO Perspectives: Why ISACs are valuable security partners

Source

Welcome to the first Cloud CISO Perspectives for November 2023. Google Cloud has announced multiple collaborations with sector-specific information sharing and analysis centers over the past 18 months, and in my column today I’ll be discussing why these ISACs are valuable partners for Google Cloud and our industry …

What’s new in Assured Workloads: Japan regions, move analysis capability

Source

Assured Workloads is Google Cloud’s solution that allows our customers to run regulated workloads in many of our global regions without the need for sector-focused isolated regions or infrastructure. It can help our customers address their security and compliance requirements, without compromising on cloud innovations and security capabilities …

Google researchers discover 'Reptar,’ a new CPU vulnerability

Source

This year, Google has seen an increase in the number of vulnerabilities impacting central processing units (CPU) across hardware systems. Two of the most notable of these vulnerabilities were disclosed in August, when Google researchers discovered Downfall ( CVE-2022-40982 ) and Zenbleed ( CVE-2023-20593 ), affecting Intel and AMD CPUs, respectively. This trend …

« newer articles | page 6 | older articles »