aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering

Security Roundup – Stories And Launches From Second Quarter 2022

  • aster.cloud
  • October 19, 2022
  • 3 minute read

In the fast-moving world of security, Google Cloud continues to constantly update our products and services to help protect your data and your applications. In the second installment of this regular series, let’s dive into what’s new and cooking in Google Cloud Security.

 


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

For those of you curious to read the previous installment, we got you covered! 🙂

Security Roundup – stories and launches from first quarter 2022

 

Updates from Cloud External Key Manager

Whether you keep your secrets on-prem or in the cloud, they need to be well protected. To help protect your External keys, Cloud External Key Manager (EKM) recently launched EKM over VPC that will provide your application with an extra layer of security. You can now use asymmetric keys for signing as EKM recognizes both RSA and Elliptic curve asymmetric keys. EKM also provides an additional Organizational policy level that lets you define what type of key you want to use.

Evolving Cloud External Key Manager – What’s new with Cloud EKM

 

Automatic data risk management for BigQuery using DLP

When you have tons of potentially sensitive data that needs to be analyzed for its risk profile, you can use Automatic Data Loss Prevention (DLP) with BigQuery to reduce the risk of data leaks. With this feature, DLP can be configured to run as a cron job over BigQuery data, which will report the results in a DataStudio dashboard. Automatic sync with DLP also provides insights and risk scores for each table in Chronicle which can then be used for enhancing threat detections.

Read More  Doctors Notes To Data Insights: How Natural Language Processing Helps Decode Healthcare

Google launches Automatic DLP for BigQuery

 

reCAPTCHA Enterprise – Password leak detection

Passwords are one of the common forms of authentication and password reuse is a big threat to account protection. Never fear – reCAPTCHA Enterprise offers a simple way to verify if your passwords have been compromised. If reCAPTCHA finds out that your password has been leaked, it warns you so that you can secure your account. This feature coupled with Account Defender or multi-factor authentication can help secure your organization better.

Announcing reCAPTCHA Enterprise password leak detection in GA

 

Error Remediation with Security Command Center

Security Command Center (SCC) released new finding types that alert customers when SCC is either misconfigured or configured in a way that prevents it from protecting your resources as expected. These findings provide remediation steps to return SCC to an operational state. Learn more and see examples:

Remediating Security Command Center errors

 

What’s up with Cloud Armor?

Cloud Armor helps secure web applications by identifying DDoS and other web attacks. You can now customize the rate-limiting per client using new rule actions. Also, Cloud Armor provides capabilities to detect and manage bot traffic at network and application layers. reCAPTCHA Enterprise for WAF will help detect and manage bot activity at the network level, whereas Cloud Armor’s Adaptive Protection feature based on machine learning identifies Layer 7 attacks.

Announcing new Cloud Armor rate limiting, adaptive protection, and bot defense

 

GCP Security products <-> MITRE ATT&CK mappings

In our recent studies, we have released a comprehensive mapping between Google Cloud’s native security offerings and MITRE ATT&CK. This can help you choose the products for your security use cases. Read more about the mapping methodology here:

Read More  Benchmarking Your Dataflow Jobs For Performance, Cost And Capacity Planning

Announcing MITRE ATT&CK mappings for Google Cloud security capabilities

 

See you in the next installment of #SecurityRoundup!

 

 

By: Sita Lakshmi Sangameswaran (Developer Relations Engineer, Google Cloud)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • BigQuery;
  • Cloud Armor
  • Cloud External Key Manager
  • Google Cloud
  • reCaptcha
  • Security
You May Also Like
View Post
  • Engineering

Just make it scale: An Aurora DSQL story

  • May 29, 2025
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
View Post
  • Engineering
  • Software Engineering

This Month in Julia World

  • January 17, 2025
View Post
  • Engineering
  • Software Engineering

Google Summer of Code 2025 is here!

  • January 17, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024
IBM and Ferrari Premium Partner
View Post
  • Data
  • Engineering

IBM Selected as Official Fan Engagement and Data Analytics Partner for Scuderia Ferrari HP

  • November 7, 2024

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.