Showing only posts tagged Security & Identity. Show all posts.

Cloud CISO Perspectives: It’s a multicloud jungle out there. Here’s how your security can survive — and thrive

Source

Welcome to the second Cloud CISO Perspectives for October 2023. This month, David Stone and Anton Chuvakin, colleagues from our Office of the CISO, are talking about what security and business leaders need to know about securing our multicloud present and future. As with all Cloud CISO Perspectives, the …

New educational lab for Security Command Center can help address security talent gap

Source

To address the chronic shortage of security talent, Google Cloud has introduced a new virtual, lab-based training for Security Command Center, our flagship cloud security solution. The new lab, Mitigate Threats and Vulnerabilities with Security Command Center, has no security knowledge prerequisites and can be completed in just six …

Building core strength: New technical papers on infrastructure security

Source

Google’s infrastructure security teams continue to advance the state of the art in securing distributed systems. As the scale, capabilities, and geographical locations of our data centers and compute platforms grow, we continue to evolve the systems, controls, and technology used to secure them against external threats and …

Empowering all to be safer with AI this Cybersecurity Awareness Month

Source

Cybersecurity requires continual vigilance, including using built-in protections and providing resources for changing security threats. In acknowledgment of Cybersecurity Awareness Month, now in its 20th year, we recently shared our progress across a number of security efforts, and announced a few new technologies that help us keep more people …

What’s new with Cloud Firewall Standard

Source

Google Cloud Firewall is a fully distributed, stateful inspection next-generation firewall that is built into our software-defined networking fabric and enforced for each workload. With Cloud Firewall, you can enable advanced network threat protection with operational simplicity at cloud scale. Today, we are excited to announce the general availability …

Google Cloud and E-ISAC team up to advance security in the electricity industry

Source

Power generation and distribution networks are essential to modern life and must keep pace with dramatically increasing demand for electricity. The Energy sector is uniquely critical because it enables all other critical infrastructure sectors. Without reliable and secure electricity networks, economies and communities cannot function. Cybersecurity is particularly important …

Introducing Actions and Alerts in Advanced API Security

Source

APIs provide direct access to application functionality and data, making them a powerful developer tool. Unfortunately, that also makes them a favorite target for threat actors. Proactively identifying API security threats is top of mind for 60% of IT leaders according to Google Cloud’s 2022 API Security Research …

How we’ll build sustainable, scalable, secure infrastructure for an AI-driven future

Source

Editor’s note: Today, we hear from Parthasarathy Ranganathan, Google VP and Technical Fellow and Amin Vahdat, VP/GM. Partha delivered a keynote address today at the OCP Global Summit, an annual conference for leaders, researchers, and pioneers in the open hardware industry. Partha served on the OCP Board …

Cloud CISO Perspectives: How boards can help cyber-crisis communications

Source

Welcome to the first Cloud CISO Perspectives for October 2023. This month, I’ll be discussing the increasingly-important (and often undervalued) organizational skill of crisis communications — and how boards can help prepare their organizations for the inevitable. Effective crisis communications was a central pillar of our third Perspectives on …

Get a head start on 2024 with AI and more at Google Cloud Security Talks

Source

October marks the 20th anniversary of Cybersecurity Awareness Month, and the perfect time to hold Google Cloud Security Talks, our quarterly digital event on all things security. On October 25, we’ll bring together experts from Google Cloud and the broader Google security community to share insights, best practices …

How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack

Source

A number of Google services and Cloud customers have been targeted with a novel HTTP/2-based DDoS attack which peaked in August. These attacks were significantly larger than any previously-reported Layer 7 attacks, with the largest attack surpassing 398 million requests per second. The attacks were largely stopped at …

Google mitigated the largest DDoS attack to date, peaking above 398 million rps

Source

Over the last few years, Google's DDoS Response Team has observed the trend that distributed denial-of-service (DDoS) attacks are increasing exponentially in size. Last year, we blocked the largest DDoS attack recorded at the time. This August, we stopped an even larger DDoS attack — 71⁄2 times larger — that …

Deliver and secure your internet-facing application in less than an hour using Dev(Sec)Ops Toolkit

Source

We are excited to announce the preview of the Dev(Sec)Ops toolkit for global front-end internet-facing applications, which can help you launch new apps on Google Cloud in less than an hour. This toolkit is part of the recently announced Cross-Cloud Network solution to help customers scale and …

How Sensitive Data Protection can help secure generative AI workloads

Source

Generative AI models are a hot topic across nearly every industry. Enterprises are looking to leverage this technology to enrich their business services and engagement with customers, as well as streamline operations and speed up business processes. However, as with most AI/ML applications, generative AI models are fueled …

Deliver and secure your internet-facing application in less than an hour using Dev(Sec)Ops Toolkit

Source

We are excited to announce the preview of the Dev(Sec)Ops toolkit for global front-end internet-facing applications, which can help you launch new apps on Google Cloud in less than an hour. This toolkit is part of the recently announced Cross-Cloud Network solution to help customers scale and …

Introducing Advanced Vulnerability Insights for GKE

Source

Detecting vulnerabilities in open-source software requires a holistic approach, and security best practices recommend scanning early and often throughout your development lifecycle to help maintain an effective security posture. However, only scanning in the CI/CD pipeline or registry can miss artifacts and containers that are deployed to production …

New custom security posture controls and threat detections in Security Command Center

Source

Security Command Center Premium, Google Cloud’s built-in security and risk management solution, provides out-of-the-box security controls for cloud posture management and threat detection. As our customers build more complex environments with different risk profiles, cloud security teams may need to monitor for specific conditions and threats not covered …

Expanding GKE posture: Policy Controller violations now in Security Command Center

Source

Customers using Kubernetes at scale need consistent guardrails for how resources are used across their environments to improve security, resource management, and flexibility. Customers have told us that they need an easy way to apply and view those policy guardrails, so we launched the Policy Controller dashboard and added …

Go from logs to security insights faster with Dataform and Community Security Analytics

Source

Making sense of security logs such as audit and network logs can be a challenge, given the volume, variety and velocity of valuable logs from your Google Cloud environment. To help accelerate the time to get security insights from your logs, the open-source Community Security Analytics (CSA) provides pre-built …

Manage infrastructure with Workload Identity Federation and Terraform Cloud

Source

Introduction Terraform Cloud (TFC) can help manage infrastructure as code (IaC) development for large enterprises. As the number of Google Cloud projects grows, managing access controls for Terraform Cloud projects and workspaces can become complex. Don't worry, we have a solution that is designed to be more secure than …

« newer articles | page 7 | older articles »