Tag: confidential computing
-
Cloud Blog: Driving secure innovation with AI and Google Unified Security
Source URL: https://cloud.google.com/blog/products/identity-security/driving-secure-innovation-with-ai-google-unified-security-next25/ Source: Cloud Blog Title: Driving secure innovation with AI and Google Unified Security Feedly Summary: Today at Google Cloud Next, we are announcing Google Unified Security, new security agents, and innovations across our security portfolio designed to deliver stronger security outcomes and enable every organization to make Google a part of their…
-
Cloud Blog: Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave
Source URL: https://cloud.google.com/blog/products/identity-security/google-named-leader-in-2025-forrester-data-security-platforms-wave/ Source: Cloud Blog Title: Google Cloud named a Leader in the 2025 Forrester Data Security Platforms Wave Feedly Summary: We’re pleased to announce that Google has been recognized as a Leader in The Forrester Wave™: Data Security Platforms, Q1 2025 report. We believe this is a testament to our unwavering commitment to…
-
Hacker News: AMD: Microcode Signature Verification Vulnerability
Source URL: https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w Source: Hacker News Title: AMD: Microcode Signature Verification Vulnerability Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a security vulnerability in AMD Zen-based CPUs identified by Google’s Security Team, which allows local administrator-level attacks on the microcode verification process. This is significant for professionals in infrastructure and hardware…
-
Cloud Blog: Privacy-preserving Confidential Computing now on even more machines and services
Source URL: https://cloud.google.com/blog/products/identity-security/privacy-preserving-confidential-computing-now-on-even-more-machines/ Source: Cloud Blog Title: Privacy-preserving Confidential Computing now on even more machines and services Feedly Summary: Organizations are increasingly using Confidential Computing to help protect their sensitive data in use as part of their data protection efforts. Today, we are excited to highlight new Confidential Computing capabilities that make it easier for…