Jump to Content

Security & Identity

How Google Cloud achieves confidentiality, data integrity, availability, non-repudiation and authentication of your data.

Security & Identity

Cloud CISO Perspectives: Why PQC is the next Y2K, and what you can do about it

Much like Y2K 25 years ago, post-quantum cryptography may seem like the future’s problem — but it will soon be ours if IT doesn’t move faster, explains Google Cloud’s Christiane Peters. Here's how to get started on PQC preparations.

By Phil Venables • 6-minute read

https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_CISO_Perspectives_header_4_Blue.max-1800x1800.png

Hear bi-monthly from our CISO in your inbox

Get security updates, insights, and more from Google Cloud CISO Phil Venables direct to your inbox, twice a month.

Subscribe today

The ultimate insider threat: North Korean IT workers

Employers can take concrete steps to mitigate the risk of North Korean IT workers. Here’s what security and business leaders need to know.

Read more

How Google Does It: Using threat intelligence to uncover and track cybercrime

How does Google use threat intelligence to uncover and track cybercrime? Google Threat Intelligence Group’s Kimberly Goody takes you behind the scenes.

Read more