How important are security key in zero trust?

GCP Comics #6 Security keys in Cybersecurity

A security key is a physical device that works alongside your username and password to verify your identity to a site or app. They provide stronger login protection than an authenticator app or SMS codes, and the same device can be used for many services, so you don’t need to carry around a necklace of dongles and fobs.

In this issue of GCP Comics we are covering exactly that. Think of a Security Key as a way to protect yourself–and your company–from bad passwords and tricked users, as…


Data Science project for sustainable energy

Google Cloud and Makani behind-the-scenes story to fight climate change.

How do you approach the monumental challenge of innovating renewable energy?

During a 13-year project that concluded in 2020, the Makani team took on this challenge using technology inspired by kite surfing. I was intrigued and wanted to learn more about the project and how Google Cloud played a part in the search for a new kind of wind powered energy.

Here is the behind-the-scenes video of what I learned

How did the Makani’s wind energy kite actually work?

Makani’s energy kite was an aerodynamic wing tethered to a ground station. To begin flight, the kite used rotors to hover vertically in the air. Once at full tether length…


Best cheatsheet to answer “What is Dataproc?”

Managed Hadoop & Spark #GCPSketchnote

If you are using Hadoop ecosystem and want to make it easier to manage then Dataproc is the tool to checkout.

Dataproc automation helps you create clusters quickly, manage them easily, and save money by turning clusters off when you don’t need them. With less time and money spent on administration, you can focus on what matters the most — your DATA!

In this video I summarize the what Dataproc offers in 2 mins.


What is Zero Trust Identity security?

GCP Comics #5 Identity and Zero Trust Model

Autors: Priyanka Vergadia & Max Salonstall

A zero trust network is one in which no person, device, or network enjoys inherent trust. All trust, which allows access to information, must be earned, and the first step of that is demonstrating valid identity. A system needs to know who you are, confidently, before it can determine what you should have access to. Add to that the understanding of what you can access — authorization — and you’ve got the core foundation of zero trust security.


HOW IS DATA ENCRYPTED IN CLOUD?

GCP Comics #4: Encryption to secure your data in cloud

Encryption is a process that takes plaintext as input, and transforms it into an output (ciphertext) that reveals little or no information about the plaintext. A public encryption algorithm is used, but execution depends on a key, which is kept secret. To decrypt the ciphertext back to its original form, the key needs to be used.

  • Encryption at rest — used to protect data that is stored on a disk (including solid-state drives) or backup media.
  • Encryption in transit — used to…


What is Defense in depth?

Security is one of the great challenges of our time. Imagine being Google as part of serving and protecting eight apps with more than a billion users each. Google filters millions of spam messages a minute, spots thousands of suspicious web pages a day, and delivers almost unimaginable amounts of encrypted traffic, over what may be the world’s largest proprietary network. With Google Cloud, you get to use this sophisticated security in your businesses and apps.

In this issue of GCP Comics we are covering exactly…


Best cheatsheet to learn GKE

#GCPSketchnote

I will be honest GKE have always sounded cool to me but I have not fully grasped its power until a few weeks ago when I used it for a project. I thought it might be useful to create notes for others to take advantage of my research.

Here are my notes from all the research I did to understand GKE

GCP Sketchnote on Google Kubernetes Engine

You can also checkout the explainer video where I walk through these concepts in detail

Explainer video on the topic — “What is Google Kubernetes Engine?”

Next steps

If you like this #GCPSketchnote then subscribe to my YouTube channel 👇 where I post a sketchnote on one topic every week!

Follow my website for…


Application security in the Cloud: A definitive guide

At this point in the evolution of cloud computing it is fair to say that you have at least some apps in the cloud, or are planning to have a few in the near future. So, you may be wondering about the kind of security measures available to you. In this issue of GCP Comics we are covering exactly that!

We will go over cloud security fundamentals including the three very simple security concepts.

Here you go! Read on and please share your thoughts in the comments below.

GCP Comics #2: Cloud Security — Google Cloud Fundamentals

Three security fundamentals

#1 Protection

Google Cloud provides protection from threats through a secure foundation. It offers…


Should you store your data in the cloud?

GCP Comics #1: Google Cloud & Privacy (Cloud Security)

If you are looking for answers to these questions, then you clicked on the right link 😃 In this first season of GCP Comics we will learn Google Cloud Security concepts and have lots of fun along the way.

Here you go! Read on and please share your thoughts in the comments below.

GCP Comics #1: Cloud Security — Google Cloud & Privacy

Security requires deep expertise and plentiful dedicated resources to achieve, mainly because it is a multidimensional issue comprising physical (data center) security, platform and network security, proactive…


Get Cooking in Cloud

Authors: Priyanka Vergadia, Stephanie Wong

Introduction

Get Cooking in Cloud” is a blog and video series to help enterprises and developers build business solutions on Google Cloud. In this series we plan on identifying specific topics that developers are looking to architect on Google cloud. Once identified we create a mini series on that topic.

In this miniseries, we will go over Google Cloud load balancing.

  1. Choosing the right load balancer
  2. Application Capacity Optimizations with Global Load Balancing
  3. Capacity Management with load balancing
  4. Load Balancing to GKE network endpoint groups (this article)

In this article we will cover how load balancing…

Priyanka Vergadia

Developer Advocate @Google, Artist & Traveler! Twitter @pvergadia

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store