Jump to Content

Security & Identity

How Google Cloud achieves confidentiality, data integrity, availability, non-repudiation and authentication of your data.

Security & Identity

Cloud CISO Perspectives: Phil Venables on CISO 2.0 and the CISO factory

How is AI affecting the role of the CISO, and how do CISO factories impact that? Phil Venables explains in this newsletter.

By Alicja Cade • 9-minute read

https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_CISO_Perspectives_header_4_Blue.max-1800x1800.png

Hear directly from our Office of the CISO in your inbox

Get original security insights, updates, and more from Google Cloud's Office of the CISO, twice a month!

Subscribe today

How Google Does It: Network security in a nutshell

At Google, we consider our fundamental network security perimeters to be state-of-the-art, in part because they rely on defense in depth. Here’s how we do it.

Read more

Blocking shadow agents won’t work. Here’s a more secure way forward

Shadow IT. Shadow AI. It’s human nature to use technology in the most expedient way possible, but shadow agents pose great risks. Here’s how to secure them, and your business.

Read more