Google security whitepaper

January 16, 2019

Traditionally, organizations have looked to the public cloud for cost savings, or to augment private data center capacity. However, organizations are now primarily looking to the public cloud for security, realizing that providers can invest more in people and processes to deliver secure infrastructure. As a cloud pioneer, Google fully understands the security implications of the cloud model. Our cloud services are designed to deliver better security than many traditional on-premises solutions.

Spotlight

Satelles

Satelles provides unique timing and location solutions delivered over the Iridium® constellation of 66 low-earth-orbiting satellites. These timing and location signals are available anywhere on Earth, without the need for local infrastructure, making the system perfect for augmenting GPS and other location-based technologies. Unlike standard GPS, these high-power signals can reach into many building structures. Most importantly, Satelles has customized the Iridium signal-in-space to provide a location-specific signature that can reliably prove (or authenticate) the location of a mobile device or other equipment, while being virtually impervious to spoofing and other attacks.

OTHER WHITEPAPERS
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More

Spotlight

Satelles

Satelles provides unique timing and location solutions delivered over the Iridium® constellation of 66 low-earth-orbiting satellites. These timing and location signals are available anywhere on Earth, without the need for local infrastructure, making the system perfect for augmenting GPS and other location-based technologies. Unlike standard GPS, these high-power signals can reach into many building structures. Most importantly, Satelles has customized the Iridium signal-in-space to provide a location-specific signature that can reliably prove (or authenticate) the location of a mobile device or other equipment, while being virtually impervious to spoofing and other attacks.

Events