How To Introduce More Empathy Into Security Operations

New Google Cloud Marketplace Private Offers Features To Help Our Partners Grow

Improve Responsiveness With Session Affinity On Cloud Run

Identity & Access Management: Authentication With Cloud Identity

Introducing Cloud Analytics By MITRE Engenuity Center In Collaboration With Google Cloud

Sharing Is Caring: How NVIDIA GPU Sharing On GKE Saves You Money

Easily Connect SaaS Platforms To Google Cloud With Eventarc

Five Must-Know Security And Compliance Features In Cloud Logging

Why Automation And Scalability Are The Most Important Traits Of Your Kubernetes Platform

KPIs Drive Behavior: So Get Them Right!

New 20+ Pipeline Operators For BQML

Quick Access: Intelligence Behind The Google Cloud’s New Homepage

Providing Our EU Education Customers’ With Data Transfer Protections To Support Privacy Assessments

SAP Backup, The Blended Way

Google Supports CSRB Call For Open Source Security Improvements In Wake Of Log4j Report

Using Pacemaker For SAP High Availability On Google Cloud – Part 1




How To Introduce More Empathy Into Security Operations

New Google Cloud Marketplace Private Offers Features To Help Our Partners Grow

Improve Responsiveness With Session Affinity On Cloud Run

LATEST POSTS

Recently, Datatilsynet (the Danish Data Protection Authority) issued a ruling emphasizing the importance of conducting proper due diligence before implementing cloud services. We agree due diligence is an important step for customers since privacy assessments and outcomes can vary significantly based on the way customers have configured their system. Although this ruling is limited to …

Share

An SAP architect designing a backup solution is faced with questions towards the business (what needs to be done) and delivery (how it can be accomplished). This blog gives an overview of the challenges, available options, their advantages and disadvantages. As a conclusion, a blended backup concept will be proposed that uses cloud technology to …

Share

The U.S. Department of Homeland Security (DHS) recently announced the results of the first report from the Cyber Safety Review Board (CSRB) on the log4j software library vulnerabilities discovered in late 2021. Google welcomed the opportunity to participate in the development of the CSRB report and share our own experiences responding to this and other …

Share

Problem Statement Maintaining business continuity of your mission critical systems usually demands high availability (HA) solutions that will failover without human intervention. If you are running SAP HANA or SAP NetWeaver (SAP NW) on Google Cloud, the OS-native high availability (HA) cluster capability provided by Red Hat Enterprise Linux (RHEL) for SAP and SUSE Linux …

Share

Kubernetes has been a revelation for companies working with containers. It makes container orchestration consistent, which can streamline development and make CI/CD processes more reliable. However, your success depends on more than developing containerized applications and integrating Kubernetes into your CI tooling. You still need to consider how you will deploy your containers into a …

Share

A Platform Orchestrator sits at the core of a dynamic Internal Developer Platform. It enables dynamic configuration management and developer self-service, allowing for low cognitive load on engineers. It drives standardization by design and has a vastly positive impact on the productivity and health of engineering organizations. Introduction A Platform Orchestrator is the centerpiece of …

Share

VMware, Inc. (NYSE: VMW) today introduced VMware Carbon Black Workload for Amazon Web Services (AWS) to deliver advanced protection purpose-built for securing both traditional and modern workloads. Using a single unified console that integrates into existing infrastructure, security and information technology (IT) teams can reduce attack surface and strengthen security postures, while achieving consistent and unified visibility for workloads running …

Share

Sensitive data can show up in unexpected places—for example, customers might inadvertently send you sensitive data in a customer support chat or file upload. And if you’re using data for analytics and machine learning, it’s imperative that sensitive data be handled appropriately to protect users’ privacy. It’s important to take a holistic look at where …

Share

Over the past couple of years, businesses across every industry have faced unexpected challenges in keeping their enterprise IT systems safe, secure, and available to users. Many have experienced sudden spikes or drops in demand for their products and services and most are now operating in a hybrid work environment. In such changing conditions, with …

Share

IBM mainframes have been around since the 1950s and are still vital for many organizations. In recent years many companies that rely on mainframes have been working towards migrating to the cloud. This is motivated by the need to stay relevant, the increasing shortage of mainframe experts and the cost savings offered by cloud solutions. …

Share

The cybersecurity industry is faced with the tremendous challenge of analyzing growing volumes of security data in a dynamic threat landscape with evolving adversary behaviors. Today’s security data is heterogeneous, including logs and alerts, and often comes from more than one cloud platform. In order to better analyze that data, we’re excited to announce the …

Share

You probably already know that Kubernetes is the leading container orchestration system. And according to the most recent CNCF study, you’re likely already using it for production workloads or considering it for the year ahead. The 2021 study found that an astounding 96% of respondents are using Kubernetes or are planning to use it in the near future …

Share

With Google Kubernetes Engine (GKE), customers get a fully managed environment to automatically deploy, manage, and scale containerized applications on Google Cloud. Kubernetes has become a preferred choice for running not only stateless workloads (e.g. Web Services) but also for stateful applications (e.g. databases). According to the Data on Kubernetes report, over 70% of Kubernetes users run …

Share

This article is going to tackle the installation of VMware Tanzu Application Platform and securing the UI with transport layer security (TLS) and Microsoft Windows Azure Active Directory (Azure AD). But first, what is the Tanzu Application Platform? VMware Tanzu Application Platform is a modular, application-aware platform that provides a rich set of developer tooling and …

Share






MENU

Back