aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering

Security Roundup – Stories And Launches From Second Quarter 2022

  • aster.cloud
  • October 19, 2022
  • 3 minute read

In the fast-moving world of security, Google Cloud continues to constantly update our products and services to help protect your data and your applications. In the second installment of this regular series, let’s dive into what’s new and cooking in Google Cloud Security.

 


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

For those of you curious to read the previous installment, we got you covered! 🙂

Security Roundup – stories and launches from first quarter 2022

 

Updates from Cloud External Key Manager

Whether you keep your secrets on-prem or in the cloud, they need to be well protected. To help protect your External keys, Cloud External Key Manager (EKM) recently launched EKM over VPC that will provide your application with an extra layer of security. You can now use asymmetric keys for signing as EKM recognizes both RSA and Elliptic curve asymmetric keys. EKM also provides an additional Organizational policy level that lets you define what type of key you want to use.

Evolving Cloud External Key Manager – What’s new with Cloud EKM

 

Automatic data risk management for BigQuery using DLP

When you have tons of potentially sensitive data that needs to be analyzed for its risk profile, you can use Automatic Data Loss Prevention (DLP) with BigQuery to reduce the risk of data leaks. With this feature, DLP can be configured to run as a cron job over BigQuery data, which will report the results in a DataStudio dashboard. Automatic sync with DLP also provides insights and risk scores for each table in Chronicle which can then be used for enhancing threat detections.

Read More  Vertex AI Example-Based Explanations Improve ML Via Explainability

Google launches Automatic DLP for BigQuery

 

reCAPTCHA Enterprise – Password leak detection

Passwords are one of the common forms of authentication and password reuse is a big threat to account protection. Never fear – reCAPTCHA Enterprise offers a simple way to verify if your passwords have been compromised. If reCAPTCHA finds out that your password has been leaked, it warns you so that you can secure your account. This feature coupled with Account Defender or multi-factor authentication can help secure your organization better.

Announcing reCAPTCHA Enterprise password leak detection in GA

 

Error Remediation with Security Command Center

Security Command Center (SCC) released new finding types that alert customers when SCC is either misconfigured or configured in a way that prevents it from protecting your resources as expected. These findings provide remediation steps to return SCC to an operational state. Learn more and see examples:

Remediating Security Command Center errors

 

What’s up with Cloud Armor?

Cloud Armor helps secure web applications by identifying DDoS and other web attacks. You can now customize the rate-limiting per client using new rule actions. Also, Cloud Armor provides capabilities to detect and manage bot traffic at network and application layers. reCAPTCHA Enterprise for WAF will help detect and manage bot activity at the network level, whereas Cloud Armor’s Adaptive Protection feature based on machine learning identifies Layer 7 attacks.

Announcing new Cloud Armor rate limiting, adaptive protection, and bot defense

 

GCP Security products <-> MITRE ATT&CK mappings

In our recent studies, we have released a comprehensive mapping between Google Cloud’s native security offerings and MITRE ATT&CK. This can help you choose the products for your security use cases. Read more about the mapping methodology here:

Read More  How The State Of Oklahoma Is Using Data To Fight The Opioid Epidemic

Announcing MITRE ATT&CK mappings for Google Cloud security capabilities

 

See you in the next installment of #SecurityRoundup!

 

 

By: Sita Lakshmi Sangameswaran (Developer Relations Engineer, Google Cloud)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • BigQuery;
  • Cloud Armor
  • Cloud External Key Manager
  • Google Cloud
  • reCaptcha
  • Security
You May Also Like
View Post
  • Engineering
  • Technology

Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design

  • June 9, 2025
View Post
  • Engineering

Just make it scale: An Aurora DSQL story

  • May 29, 2025
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
View Post
  • Engineering
  • Software Engineering

This Month in Julia World

  • January 17, 2025
View Post
  • Engineering
  • Software Engineering

Google Summer of Code 2025 is here!

  • January 17, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024

Stay Connected!
LATEST
  • 1
    Pure Accelerate 2025: All the news and updates live from Las Vegas
    • June 18, 2025
  • 2
    ‘This was a very purposeful strategy’: Pure Storage unveils Enterprise Data Cloud in bid to unify data storage, management
    • June 18, 2025
  • What is cloud bursting?
    • June 18, 2025
  • 4
    There’s a ‘cloud reset’ underway, and VMware Cloud Foundation 9.0 is a chance for Broadcom to pounce on it
    • June 17, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 8
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 9
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 10
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 3
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 5
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.