Posts in category

Practices


What’s News This week, a U.S. Senate committee moved forward a bipartisan billed aimed at curbing the power of big tech by forbidding the large tech platforms from promoting their own products and services over those of smaller competitors. The day before, Federal Trade Commission Chair Lina Khan said in an interview that her department …

The uniqueness of each organization in the enterprise IT space creates interesting challenges in how they need to handle alerts. With many commercial tools in the IT Service Management (ITSM) market, and lots of custom internal tools, we equip teams with tools that are both flexible and powerful. This post is for Google Cloud customers …

Hybrid and multi-cloud environments produce a boundless array of logs including application and server logs, logs related to cloud services, APIs, orchestrators, gateways and just about anything else running in the environment. Due to this high volume, logging systems may become slow and unmanageable when you urgently need them to troubleshoot an issue, and even …

We are often asked if the cloud is more secure than on-premise infrastructure. The quick answer is that, in general, it is. The complete answer is more nuanced and is grounded in a series of cloud security “megatrends” that drive technological innovation and improve the overall security posture of cloud providers and customers. An on-prem …

As communication service providers (CSPs) continue to focus on capitalizing on the promise of 5G, I’ve been having more conversations with operators and network equipment providers on why and how it may make sense to adopt cloud-native approaches. More specifically, we often discuss best practices around accelerating the time to value of 5G and simplifying …

The stormy cybersecurity horizon will leave its mark on cloud-based assets next year. However, despite the looming threats, experts see no stopping on migration to the cloud. 2021 was a pivotal year in cybersecurity, with ransomware dominating the headlines. With the upward trend in cybercrime unlikely to change next year, the need to secure cloud-based …

Data teams across companies have continuous challenges of consolidating data, processing it and making it useful. They deal with challenges such as a mixture of multiple ETL jobs, long ETL windows capacity-bound on-premise data warehouses and ever-increasing demands from users. They also need to make sure that the downstream requirements of ML, reporting and analytics …

Our previous article provided tools and techniques to transform your productionalization process and make it ready for Cloud workloads. In this post, we will cover technical examples of GCP controls and how it can help your organization maintain your security and compliance posture in GCP. In comparison to on-prem infrastructure, GCP is a highly integrated …

Editor’s note: This post was updated on 12/22/21 at 6:23pm PST. In this post, we provide recommendations from the Google Cybersecurity Action Team and discuss Google Cloud and Chronicle solutions to help security teams to manage the risk of the Apache “Log4j 2” vulnerability (CVE-2021-44228 and CVE-2021-45046). For the latest updates on our assessment of …

Service accounts on Google Cloud are used when a workload needs to access resources or conduct actions without end-user involvement.  There are multiple methods of authenticating using service accounts, including using service accounts as part of Google Compute Engine instances, impersonating service accounts, or using service accounts with a key file — an option which …