A Primer on Confidential Computing Confidential computing uses trusted hardware to encrypt data in memory.
Detect Security Risks in Your Cloud Account using CloudSploit How to detect security risks in your GCP account using the CloudSploit open source tool.
15 Things I Learnt from Google on Shifting Left in Security Google’s white paper on shifting left in security offers high-signal insights that you can adopt today.
3 Tips to Secure Your GCP VM Instance 3 quick and easy tips to secure remote administrative access to your GCP VM instance.