Jump to Content

Security & Identity

How Google Cloud achieves confidentiality, data integrity, availability, non-repudiation and authentication of your data.

Security & Identity

Responding to CVE-2025-55182: Secure your React and Next.js workloads

Follow these recommendations to minimize remote code execution risks in React and Next.js from CVE-2025-55182 vulnerabilities.

By Tim April • 8-minute read

https://storage.googleapis.com/gweb-cloudblog-publish/images/17_-_Security__Identity_NrORvDT.max-1800x1800.jpg

Hear directly from our Office of the CISO in your inbox

Get original security insights, updates, and more from Google Cloud's Office of the CISO, twice a month!

Subscribe today

How Google Does It: Network security in a nutshell

At Google, we consider our fundamental network security perimeters to be state-of-the-art, in part because they rely on defense in depth. Here’s how we do it.

Read more

Blocking shadow agents won’t work. Here’s a more secure way forward

Shadow IT. Shadow AI. It’s human nature to use technology in the most expedient way possible, but shadow agents pose great risks. Here’s how to secure them, and your business.

Read more