article thumbnail

How to block DNS exfiltration on Google Cloud

Xebia

Securing your cloud network (VPC) using firewall rules is common practice. Google Cloud firewall rules however do not apply to Cloud DNS calls made from the metadata server. In this blog I’ll share how that happens and what you can do about it. my-evil-domain.com a0123zz cloud 04.my-evil-domain.com

article thumbnail

Palo Alto Networks Brings Network Threat Detection to Google Cloud

Palo Alto Networks

Imagine having your own personal, best-in-class threat research team at your fingertips, while taking advantage of cloud simplicity, scalability and speed. Now meet Google Cloud Intrusion Detection System (Cloud IDS). Cloud IDS simply provides native, network threat detection across your entire Google Cloud environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Learn Google Cloud by Doing with New Google Cloud Training!

Linux Academy

Ready to learn Google Cloud by doing? From new courses to new labs, we have a ton of exciting new Google Cloud updates at Linux Academy ( where you can get the most Google Cloud training on this planet! ). Google Cloud Sandboxes. Google Cloud Labs. Utilizing Google Cloud Pub/Sub.

article thumbnail

Free 30-Day VM-Series Virtual Firewall Trial

Palo Alto Networks

Take the industry’s leading virtual firewall for a no-obligation spin in your virtualized environments. It’s never been easier, thanks to our 30-day free trial to test the VM-Series virtual firewalls for VMware ESXi and Linux KVM environments. It all starts with filling out this simple form for the virtual firewall trial.

article thumbnail

Google Cloud Sandbox Environments On Demand with Playground

Linux Academy

Not only does Linux Academy training content cover the most important cloud technology and tools of today and tomorrow, but our sandbox environments give you the ability to practice with services you’ve never used before. Spin up a Google Cloud Sandbox and have fun! Turn the constant cloud technology changes into a strength.

article thumbnail

Radically simplify and expand Zero Trust to cloud workload

CIO

Many organizations rely on legacy security architectures to secure their cloud workloads. They often use a combination of: Cloud native security solutions offered by cloud service providers Multiple security tools (firewall, VPN, TLS/SSL inspection, DLP, etc.)

Cloud 243
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

But securing cloud workloads isn’t as easy as you think… To secure your cloud workloads, it requires a radically different approach. It’s not as simple as just extending traditional firewall capabilities to the cloud. In fact, a few of the most common challenges include: Risk.

Cloud 337