Google Cloud security foundations guide

April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Spotlight

Personam

Personam is an innovation-driven cyber-security company dedicated to safeguarding assets from threats that originate inside the trust perimeter of your network. Whether the danger is from an individual intent on exploiting a position of trusted access, a compromised mobile device attached to the network, or the unwitting victim of a spear phishing attack, our platform effectively detects these threats at the earliest stages of an attempted breach.

OTHER WHITEPAPERS
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More

Spotlight

Personam

Personam is an innovation-driven cyber-security company dedicated to safeguarding assets from threats that originate inside the trust perimeter of your network. Whether the danger is from an individual intent on exploiting a position of trusted access, a compromised mobile device attached to the network, or the unwitting victim of a spear phishing attack, our platform effectively detects these threats at the earliest stages of an attempted breach.

Events