Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud Security //

Google

3/22/2018
11:05 AM
Mitch Wagner
Mitch Wagner
News Analysis-Security Now
50%
50%

Google Launches DDoS Protection, Cloud Security Controls & More

Cloud Armor provides protection against Distributed Denial of Service (DDoS) attacks, and Google also provided improved controls for cloud security admins on both Google Cloud Platform and G Suite.

Google's security team has been busy.

The cloud provider debuted a broad range of services, including Cloud Armor protection against distributed denial-of-service (DDoS) attacks, as well as better controls for cloud security admins, for both Google Cloud Platform and G Suite.

Cloud Armor uses the technologies and infrastructure with which Google (Nasdaq: GOOG) protects Search, Gmail and YouTube to provide DDoS defenses to its Google Cloud Platform customers. Cloud Security Command Center provides a control panel to give users visibility into cloud assets across Google Cloud Platform, and how vulnerable those assets might be to attack. And Google also provided better controls for the perimeters of Virtual Private Cloud (VPC) services from Google.


You're invited to attend Light Reading’s Big Communications Event  -- the one event that delivers fresh perspective on the rapid transformation of the telecom industry and the road ahead. We'll see you May 14-16 in Austin -- communications service providers get in free!

G Suite users get enhanced anti-phishing protection, mobile device management for both Android and iOS and improvements to the security center for G Suite, which is a control panel for G Suite security.

For more information on the announcements, and perspective, visit Light Reading: Unknown Document 741647

Related posts:

— Mitch Wagner Follow me on Twitter Visit my LinkedIn profile Visit my blog Follow me on Facebook Editor, Enterprise Cloud, Light Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16961
PUBLISHED: 2021-01-15
SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.
CVE-2020-35733
PUBLISHED: 2021-01-15
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
CVE-2021-23836
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
CVE-2021-23837
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
CVE-2021-23838
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...