Identity and Security
Detect, investigate, and protect against threats with security best practices for cloud, on-premises, or hybrid deployments.
- 84 Topics
- 61 Replies
Audit logs are very powerful, and you should have them enabled on all your production services. In some instances, the audit logs can also proactively alert you to abnormal or anomalous behavior, allowing you to get ahead of a potential security incident.Security engineering is an ever-evolving space. While prevention and planning are still very important, we also need to invest in detection and response.Read here the articleSeth Vargo (author) is going to talk at C2C France Community Group (in English) on May 21. Have you used the Secret Manager?
Network Connectivity Center (NCC), which delivers planet-scale network management to simplify complex networks for your on-prem and cloud connectivity needs.NCC provides a single management experience to easily create, connect, and manage heterogeneous on-prem and cloud networks leveraging Google’s global infrastructure.NCC serves as a vantage point to seamlessly connect VPNs, partner and dedicated interconnects, as well as third-party routers and Software-Defined WANs, helping you optimize connectivity, reduce the operational burden and lower costs—wherever your applications or users may be.NCC delivers:Single connectivity model Flexible cloud connectivity VPN-based multicloud connectivity SD-WAN Integration/Third-party router Real-time visibility for your global network Article hereMore about Network Connectivity CenterOverviewWorking Guide
Forrester names Google Cloud a Leader in The Forrester Wave™: Infrastructure as a Service (IaaS) Platform Native Security, Q4 2020 report
Forrester names @GoogleCloud a Leader in IaaS Platform Native Security.Google has been steadily investing in its offering and has added many new security features, including #Anthos (a service to manage non-Google public and private clouds) and #Security Command Center Premium” and notes that the Google Cloud features of “data leak prevention (#DLP) capabilities, integration support for external hardware security modules (HSMs), and third-party threat intelligence source integration are also nice.Read the report to see how #GoogleCloud's native security capabilities compare to those of other cloud providers and what contributed to the highest over all score in the category
Data protection experts have a vital role to play in this team effort. With Google Cloud backup and storage administrators have multiple tools to safeguard their organization’s data during and after cloud migration.Google Cloud Storage was architected to address two common administrator needs - for multi-region storage and for performant, low-latency cold storage - and to ensure conventional RTO, RPO, and compliance requirements can easily be met. All of this facilitates team-wide adoption of cloud storage for backup use cases. Chris Schilling is writing about it and a number of offerings that allow GCP customers to architect a data protection strategy that meets their compliance and operational requirements. https://cloud.google.com/blog/products/storage-data-transfer/guide-data-protection-offerings-google-cloud
Watch On Demand Now: Security Talks 2021GOOGLE CLOUD. Security Talks 2021As more and more organizations migrate to the cloud, it’s vital that you take every step possible to protect your data. Get the latest insights by joining us for Google Cloud SecurityTalks. You’ll get a variety of expert insights into the Google Cloud security ecosystem, including: Cloud risk management Breakdowns of new features and research projects Ways to implement this cutting-edge security in your own organizationOriginal air date:March 3, 2021 12:00 PM
In January, Google published a new whitepaper: Designing and deploying a data security strategy with Google Cloud.In this blog summary, one of the authors -- Anton Chuvakin, Head of Solutions Strategy -- lays out the vision for the white paper as:Specifically, we wanted to explore both the question of starting a data security program in a cloud-native way, as well as adjusting your existing daily security program when you start utilizing cloud computing.Imagine you are migrating to the cloud and you are a traditional company. You have some data security capabilities, and most likely you have an existing daily security program, part of your overall security program. Perhaps you are deploying tools like DLP, encryption, data classification and possibly others. Suddenly, or perhaps not so suddenly, you're migrating some of your data processing and some of your data to the cloud. What to do? Do my controls still work? Are my practices current? Am I looking at the right threats? How do I ma
Great read for professionals building and managing data security programs, especially as you start to navigate your shift to the cloud. A few core questions unpacked:● How does my data security strategy need to change to accommodate a shift to the cloud?● What new security challenges for data protection do I need to be aware of in the cloud?● What does my cloud provider offer that could streamline or replace my on-premise controls? Designing and Deploying Data Security Strategy White Paper
In this article from Forbes, Anton Chuvakin, Head of Solutions Strategy, Google Cloud, provides a “look at the cloud/trust paradox, and what your business can take away from it.”Here’s an idea of what’s covered: In the decade since the rise of cloud computing, a lot of research has been generated on the topic of cloud trust. Today, the very concept of “using public cloud” is inseparably connected to “trusting your cloud provider.” One of the clear paradoxes that has emerged is that to be able to trust cloud computing, you need to be able to trust it less. Here’s a look at what that means, and what your business can take away from it.
Login to the community
Social LoginLogin With Your C2C Credentials
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.