A reverse proxy stands in front of your data, services, or virtual machines, catching requests from anywhere in the world and carefully checking each one to see if it is allowed.
In order to decide (yes or no) the proxy will look at who and what.
This issue of GCP Comics presents an example of accessing some rather…
👋 Hi Cloud Devs!!
Last year I created #13DaysOfGCP mini series on Twitter which you all loved. So, here I compiled 13 more common Google Cloud reference architectures. If you were not able to catch it, or if you missed a few days, here I bring to you the summary!
In a zero trust environment, every device has to earn trust in order to be granted access. When determining whether access should be granted, the security system relies on device metadata, such as what software is running or when the OS was last updated, and checks to see if the device meets that organization’s minimum bar for health.
Think of it like your temperature: under 100 degrees and you are safe, but go over and you are now medically in fever territory, and you may not be allowed into certain venues.
Zero Trust relies on WHO you are and WHAT…
A security key is a physical device that works alongside your username and password to verify your identity to a site or app. They provide stronger login protection than an authenticator app or SMS codes, and the same device can be used for many services, so you don’t need to carry around a necklace of dongles and fobs.
Security Keys provide the highest level of login assurance and phishing protection.
In this issue of GCP Comics we are covering exactly that. Think of a Security Key as a way to protect yourself–and your company–from bad passwords and tricked users, as…
How do you approach the monumental challenge of innovating renewable energy?
During a 13-year project that concluded in 2020, the Makani team took on this challenge using technology inspired by kite surfing. I was intrigued and wanted to learn more about the project and how Google Cloud played a part in the search for a new kind of wind powered energy.
Makani’s energy kite was an aerodynamic wing tethered to a ground station. To begin flight, the kite used rotors to hover vertically in the air. Once at full tether length…
If you are using Hadoop ecosystem and want to make it easier to manage then Dataproc is the tool to checkout.
Dataproc is a managed Spark and Hadoop service that lets you take advantage of open source data tools for batch processing, querying, streaming, and machine learning.
Dataproc automation helps you create clusters quickly, manage them easily, and save money by turning clusters off when you don’t need them. With less time and money spent on administration, you can focus on what matters the most — your DATA!
In this video I summarize the what Dataproc offers in 2 mins.
A zero trust network is one in which no person, device, or network enjoys inherent trust. All trust, which allows access to information, must be earned, and the first step of that is demonstrating valid identity. A system needs to know who you are, confidently, before it can determine what you should have access to. Add to that the understanding of what you can access — authorization — and you’ve got the core foundation of zero trust security.
At Google we rely on a zero trust system known as BeyondCorp, to move beyond the…
Encryption is a process that takes plaintext as input, and transforms it into an output (ciphertext) that reveals little or no information about the plaintext. A public encryption algorithm is used, but execution depends on a key, which is kept secret. To decrypt the ciphertext back to its original form, the key needs to be used.
When you use Google Cloud, the data is encrypted at rest and in transit to protect the data.
Security is one of the great challenges of our time. Imagine being Google as part of serving and protecting eight apps with more than a billion users each. Google filters millions of spam messages a minute, spots thousands of suspicious web pages a day, and delivers almost unimaginable amounts of encrypted traffic, over what may be the world’s largest proprietary network. With Google Cloud, you get to use this sophisticated security in your businesses and apps.
To help create a secure foundation, Google Cloud takes a defense in depth approach.
In this issue of GCP Comics we are covering exactly…
I will be honest GKE have always sounded cool to me but I have not fully grasped its power until a few weeks ago when I used it for a project. I thought it might be useful to create notes for others to take advantage of my research.
You can also checkout the explainer video where I walk through these concepts in detail
If you like this #GCPSketchnote then subscribe to my YouTube channel 👇 where I post a sketchnote on one topic every week!
Follow my website for…
Developer Advocate @Google, Artist & Traveler! Twitter @pvergadia