Showing only posts tagged Security & Identity. Show all posts.

Confidential VMs on Intel CPUs: Your new intelligent defense

Source

For organizations who want to bring and process their most sensitive compute workloads in the cloud without any code changes, we offer Confidential virtual machines (VMs) that leverage the latest hardware-based security technology. Through our partnership with Intel, we are extending our Confidential VMs on the new C3 machines …

Confidential VMs on Intel CPUs: Your new intelligent defense

Source

For organizations who want to bring and process their most sensitive compute workloads in the cloud without any code changes, we offer Confidential virtual machines (VMs) that leverage the latest hardware-based security technology. Through our partnership with Intel, we are extending our Confidential VMs on the new C3 machines …

Introducing the unified Chronicle Security Operations platform

Source

At Google Cloud, our mission is to help organizations transform cybersecurity with frontline intelligence, expertise, and AI-powered innovation. Nowhere is this needed more than in security operations (SecOps), where understaffed and overwhelmed security teams struggle to defend against a threat landscape that is growing in volume and sophistication, often …

Introducing Mandiant Hunt for Chronicle to help you uncover hidden threats in real-time

Source

Chronicle Security Operations is an essential security suite for any organization that wants to stay on top of the threats that they face. As part of our security announcements today at Google Cloud Next, we’re introducing our always-on AI collaborator Duet AI in Chronicle. Available in preview and …

New AI capabilities that can help address your security challenges

Source

At Google Cloud, we continue to address pervasive and fundamental security challenges: the exponential growth in threats, the toil it takes for security teams to achieve desired outcomes, and the chronic shortage of security talent. At Google Cloud Next, we are leaning in to help solve these challenges by …

Chronicle CyberShield - Google Cloud’s Approach to Strengthen Nation-wide Cyber Defense

Source

One of the primary functions of any government is to protect its citizens, institutions, infrastructure and way of life. With the rise of the global Internet, the world is more connected and traditional borders do not exist, meaning those same citizens, institutions, infrastructure, and way of life are at …

Expanding our data processing commitments for Google Cloud and Google Workspace

Source

At Google Cloud, we are committed to meeting our customers’ evolving data processing and security requirements. To this end, we are pleased to announce the next version of the Cloud Data Processing Addendum (CDPA), which updates our data processing and security terms for Google Cloud, Google Workspace (including Workspace …

Why security professionals should attend Google Cloud Next ‘23

Source

Google Cloud Next ‘23 is coming to the Moscone Center in San Francisco starting Tuesday, August 29th. This year, we’re featuring a packed Security Professionals track, with more than 40 sessions covering the latest in threat intelligence, modern security operations, and advanced cloud security. Attendees will have the …

Announcing general availability of Cloud NAT support for network services Standard Tier

Source

We are excited to announce general availability of Cloud NAT support for network services Standard Tier. Standard Tier delivers traffic from Google Cloud resources to external systems by routing it over the internet. Premier and Standard are network service tiers that let you optimize connectivity between systems on the …

Chronicle CyberShield - Google Cloud’s Approach to Strengthen Nation-wide Cyber Defense

Source

One of the primary functions of any government is to protect its citizens, institutions, infrastructure and way of life. With the rise of the global Internet, the world is more connected and traditional borders do not exist, meaning those same citizens, institutions, infrastructure, and way of life are at …

CyberShield: helping governments stand united against cyber attacks

Source

At the Cyber Week conference in June, we were excited to announce our strategic partnership with the Israel National Cyber Directorate (INCD) to modernize security operations under the wider scope of Israel’s own Cyber Dome mission. Our teams worked together to leverage Google Cloud’s Chronicle Security Operations …

Additional IL5 services available for the DoD with Google Assured Workloads

Source

Department of Defense (DoD) customers can now deploy DoD SRG Impact Level 5 (IL5) workloads on Google Cloud through Assured Workloads, providing customers with unparalleled flexibility in any of Google’s U.S. regions including one of the world's largest publicly available machine learning hubs. Google provides the most …

Introducing new capabilities in Workforce Identity Federation to help you effectively manage identity and access to Google Cloud

Source

We are excited to announce new security features, management options, and product integrations for Workforce Identity Federation, our Identity and Access Management offering that allows you to rapidly onboard user identities from external identity providers (IdPs) for direct, secure access to Google Cloud services and resources. Workforce Identity Federation …

Networking and security at Google Cloud Next: A guide to must-attend sessions

Source

In just a few days, Google Cloud Next returns to San Francisco as a large, in-person, three-day event. There, you’ll learn all about the technologies you need to build, connect, and secure all your cloud-first, Kubernetes, and AI/ML workloads. You’ll gain hands-on experience on the latest …

Introducing predictable cost options for Cloud Data Loss Prevention

Source

Cloud Data Loss Prevention's Discovery service can help you discover, profile, and monitor sensitive data across your entire organization or just select projects. We've expanded the service to cover BigQuery and BigLake, with more cloud analytics services that manage sensitive data coming later this year. Continuous visibility of where …

How to better manage customer identities to support an engaging ecommerce user experience

Source

One of the fundamental questions that retailers constantly ask themselves is how well they know their customers and how they can build deeper relationships. Knowing who their customers are can have a direct impact on improving customer engagement, which can lead to increased conversion rates, customer loyalty, lifetime value …

How Wayfair uses BeyondCorp Enterprise with Microsoft Intune to build a Zero Trust environment

Source

A Zero Trust approach to security can help you safeguard your users, devices, apps and data. Using Google Cloud’s BeyondCorp Enterprise, organizations can enforce strict, context-aware access controls with authentication and authorization for a variety of devices, anywhere to help strengthen their security posture. The ability to craft …

Introducing Cloud Armor WAF enhancements to help protect your web application and API service

Source

Organizations migrating web applications and their APIs to the cloud need solutions to protect them from exploits and distributed denial of service (DDoS) attacks. Google Cloud Armor is a network security service that provides defenses against DDoS and OWASP Top 10 risks. We are excited to introduce several new …

Introducing time-bound key authentication for service accounts

Source

We’re continually working to improve Google Cloud’s Identity and Access Management (IAM) capabilities to help secure and govern your cloud environment. When organizations need to grant external applications permission to access Google Cloud APIs and resources there are several options. While many customers have embraced our updated …

Best Kept Security Secrets: Keeping secrets, the Secret Manager way

Source

Can you keep a secret? Many people struggle to keep secrets. So do organizations. An organization’s digital credentials — its passwords, API keys, tokens, and encryption keys baked into its software code — are its vital secrets, used to authenticate access to protected resources and services. The security of these …

Using Workforce Identity Federation with API-based web applications

Source

Workforce Identity Federation allows use of an external identity provider (IdP) to authenticate and authorize users (including employees, partners, and contractors) to Google Cloud resources without provisioning identities in Cloud Identity. Before its introduction, only identities existing within Cloud Identity could be used with Cloud Identity Access Management (IAM …

« newer articles | page 8 | older articles »