How Confidential Accelerators can boost AI workload security
As artificial intelligence and machine learning workloads become more popular, it’s important to secure them with specialized data security measures. Confidential Computing can help protect sensitive data used in ML training to maintain the privacy of user prompts and AI/ML models during inference and enable…
How to choose a known, trusted supplier for open source software
Open-source software is used throughout the technology industry to help developers build software tools, apps, and services. While developers building with open-source software can (and often do) benefit greatly from the work of others, they should also conduct appropriate due diligence to protect against software supply…
Want your cloud to be more secure? Stop using service account keys
Securing cloud credentials has emerged as a challenge on the scale of Moby Dick: It presents an enormous problem, and simple solutions remain elusive. Credential security problems are also widespread: More than 69% of cloud compromises were caused by credential issues, including weak passwords, no…
Tips on building a network security policy in Google Cloud
Changing the network security perspective In a data center, network security engineers tend to spend the bulk of their time managing individual devices: creating strong passwords and hardening configurations for networking devices and creating firewall rules for each endpoint. Since nothing is physical in the…
Detecting data deletion and threats to backups with Security Command Center
The threat landscape is rapidly evolving, with data destruction attacks increasingly pervasive and more sophisticated than in years past. Today’s threat actors are constantly identifying new pathways to target data and to limit organizations’ ability to recover from attacks. Backups have long been the solution…
Introducing new ways Security Command Center Premium protects identities
After decades of managing and securing identities in data centers, security and IT operations teams face new challenges when detecting identity compromise in their public cloud environments. Protecting cloud service accounts against leaked keys, privilege escalation in complex authorization systems, and insider threats are vital…
Tips on building a network security policy in Google Cloud
Changing the network security perspective In a data center, network security engineers tend to spend the bulk of their time managing individual devices: creating strong passwords and hardening configurations for networking devices and creating firewall rules for each endpoint. Since nothing is physical in the…
Building core strength: New technical papers on infrastructure security
Google’s infrastructure security teams continue to advance the state of the art in securing distributed systems. As the scale, capabilities, and geographical locations of our data centers and compute platforms grow, Google continue to evolve the systems, controls, and technology used to secure them against…
Gain access visibility and control with Access Transparency and Access Approval
Organizations within regulated industries must balance cloud benefits with potential security and regulatory concerns. These include strict requirements to audit and control the cloud provider, especially when it comes to accessing the organization’s data and workloads. Google Cloud focused on providing our customers many ways…
Confidential Space: The future of privacy-preserving collaboration
Google are happy to announce that Confidential Space is Generally Available. Confidential Space builds on our Confidential Computing portfolio. It provides a secure enclave, also known as a Trusted Execution Environment (TEE), that our Google Cloud customers can leverage for privacy-focused use cases such as joint…
Categories
Recent Posts
- Vertex AI grounding: More reliable models, fewer hallucinations
- New ways to protect your sensitive data with Chrome Enterprise
- The modern marketer’s strategic advantage: AI-powered data clean rooms
- Now Available: Google Vids is bringing AI-powered video creation to work
- Generative AI use cases to inspire your Startup or Small Business
Recent Posts
- Vertex AI grounding: More reliable models, fewer hallucinations
- New ways to protect your sensitive data with Chrome Enterprise
- The modern marketer’s strategic advantage: AI-powered data clean rooms
- Now Available: Google Vids is bringing AI-powered video creation to work
- Generative AI use cases to inspire your Startup or Small Business
Categories
- Article (509)
- Case Studies (27)
- News (59)
- Press Release (21)
- Training (1)
- Uncategorized (4)
Recent Comments
Archives
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- December 2020
- November 2020
- October 2020
- August 2020
- July 2020
- June 2020
- February 2020
- January 2020
- December 2019
- May 2016