Cloud Computing

Securing Cryptocurrency Organizations

Written by: Joshua Goddard The Rise of Crypto Heists and the Challenges in Preventing Them Cryptocurrency crime encompasses a wide range of illegal activities, from theft and hacking to fraud, money laundering, and even terrorist financing, all exploiting the unique characteristics of digital currencies. Cryptocurrency heists, specifically, refer to the large-scale theft of cryptocurrencies or

Securing Cryptocurrency Organizations Read More »

The EU’s DORA regulation has arrived. Google Cloud is ready to help

As the Digital Operational Resilience Act (DORA) takes effect today, financial entities in the EU must rise to a new level of operational resilience in the face of ever-evolving digital threats. At Google Cloud, we share your commitment to the goals of DORA. We believe in building a more resilient and secure financial sector, and

The EU’s DORA regulation has arrived. Google Cloud is ready to help Read More »

GKE delivers breakthrough Horizontal Pod Autoscaler performance

At Google Cloud, we are committed to providing the fastest and most reliable Kubernetes platform, Google Kubernetes Engine (GKE). Today, we are excited to announce an improved Horizontal Pod Autoscaler (HPA), the Kubernetes feature that automatically updates workload resources to match demand. We rearchitected the HPA stack, resulting in a significant improvement in scaling performance.

GKE delivers breakthrough Horizontal Pod Autoscaler performance Read More »

Cloud CISO Perspectives: Talk cyber in business terms to win allies

Welcome to the first Cloud CISO Perspectives for January 2025. We’re starting off the year at the top with boards of directors, and how talking about cybersecurity in business terms can help us better convey the costs and priority and priority of the cybersecurity risks we face. As with all Cloud CISO Perspectives, the contents

Cloud CISO Perspectives: Talk cyber in business terms to win allies Read More »

The developer skill you might be neglecting

Ben and Ryan talk with Geoffrey (Jef) Huck, a software developer turned public speaking coach, about the importance of soft skills in the tech industry—in particular, speaking and communication skills. Their conversation touches on how Huck’s experiences with anxiety shaped his efforts to become a better communicator, practical techniques for dispelling anxiety and connecting with

The developer skill you might be neglecting Read More »

Bitly: Protecting users from malicious links with Web Risk

Bitly’s partnership with Google Web Risk helps enhance Bitly’s ability to protect users and build trust as they generate millions of links and QR Codes daily.  Over the last decade, Bitly has solidified its reputation as a multiproduct connections platform, generating millions of links, QR codes, and mobile landing pages every day. Bitly enables users

Bitly: Protecting users from malicious links with Web Risk Read More »

C4A, the first Google Axion Processor, now GA with Titanium SSD

Today, we are thrilled to announce the general availability of C4A virtual machines with Titanium SSDs custom designed by Google for cloud workloads that require real-time data processing, with low-latency and high-throughput storage performance. Titanium SSDs on C4A VMs deliver storage performance of up to 2.4M random read IOPS, up to 10.4 GiB/s of read

C4A, the first Google Axion Processor, now GA with Titanium SSD Read More »

Get started with Google Cloud’s built-in tokenization for sensitive data protection

In many industries including finance and healthcare, sensitive data such as payment card numbers and government identification numbers need to be secured before they can be used and shared. A common approach is applying tokenization to enhance security and manage risk. A token is a substitute value that replaces sensitive data during its use or

Get started with Google Cloud’s built-in tokenization for sensitive data protection Read More »