Zoro Achieves Clean Data & Strong Security with DataDome & Google Cloud

Zoro Achieves Clean Data & Strong Security with DataDome & Google Cloud

Zoro chose DataDome to block increasing unwanted bot traffic that was negatively impacting their web analytics and customer experience. The bot solution highly improved their data accuracy and reduced operational costs ...
street light

IONIX Extends ASM Reach to Cloud Computing Platforms

IONIX extended the reach of its attack surface management platform into cloud computing environments, including AWS, Microsoft Azure and GCP ...
Security Boulevard
someone taking notes on a digital pad

Google Extends Generative AI Reach Deeper into Security

The Google Chronicle cybersecurity platform extensions are based on the Gemini LLM with the addition of cybersecurity data ...
Security Boulevard
Figure 1: comparison of metadata services in the various of computing services of the providers 

The Default Toxic Combination of GCP Compute Engine Instances

| | gcp
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix The post The Default Toxic Combination of GCP Compute ...
How Attackers Can Exploit GCP’s Multicloud Workload Solution

How Attackers Can Exploit GCP’s Multicloud Workload Solution

| | gcp
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations. The post How Attackers Can Exploit GCP’s Multicloud Workload Solution ...
zero-trust Cloud Requires a New Approach to Security

Data Reveals GCP Users Lagging in Cross-Cloud Security

Increasingly, Google Cloud Platform users are recognizing the business benefits of multi-cloud. That’s not surprising since a multi-cloud approach allows organizations to enjoy each platform’s benefits, avoid vendor lock-in and accelerate cloud-native ...
Security Boulevard
Best Practices for Identity and Access Management When Using Google Cloud Provider

Best Practices for Identity and Access Management When Using Google Cloud Provider

At Praetorian, one of our top priorities is looking over each client’s Identity and Access Management (IAM) structure. Several of our large clients use Google Cloud Provider (GCP), which is one of ...
Bindings created automatically for principals with project-level basic roles

The Advanced Risk of Basic Roles In GCP IAM

| | gcp
Basic roles in GCP allow data-level actions, even though at first glance it might seem like they don’t. Avoid using basic roles, and if you must use them, make a special effort ...
illustration of the objects relevant to IAM in GCP

Introduction to IAM in Google Cloud Platform (GCP)

| | gcp
An introduction for anyone getting started with GCP or even experienced professionals who are looking for a structured overview. The post Introduction to IAM in Google Cloud Platform (GCP) appeared first on ...
IAM policy of a project

Hidden Risk in the Default Roles of Google-Managed Service Accounts

| | gcp
Some Google-managed service accounts are binded by default to a role granting access to storage.objects.read. This hidden risk is (yet another) great reason to use customer-managed KMS keys to encrypt your sensitive ...