{"id":46682,"date":"2022-05-18T00:39:00","date_gmt":"2022-05-18T00:39:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/"},"modified":"2022-05-18T00:39:00","modified_gmt":"2022-05-18T00:39:00","slug":"google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/","title":{"rendered":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/04\/22\/18\/cloud-computing-security-concept-security-service-edge-and-secure-illustration-id1387892656-100925325-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google Cloud is rolling out new security&nbsp;services designed to address enterprise challenges including&nbsp;securing open-source software and accelerating the adoption of zero-trust architectures.<\/p>\n<p>At its annual&nbsp;Google Cloud Security Summit,&nbsp;the company said it&#8217;s building on its Invisible Security effort, which promises to bake security into tools and services that enterprises and other customers use most.<\/p>\n<p>One example is a new service called Assured Open Source Software (Assured OSS), which is aimed at making it easier for organizations to&nbsp;securely manage their open-source dependencies.<\/p>\n<p>&#8220;Today patching security vulnerabilities in open source software often feels like a high-stakes game of whack-a-mole: fix one, and two more pop up,&#8221; wrote Sunil Potti, vice president and general manager of Google Cloud Security, in a <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/security-summit-google-cloud-charts-a-safer-future\" rel=\"nofollow\">blog about the new services<\/a>. &#8220;This helps explain research done by Sonatype software that shows that there\u2019s a <a href=\"https:\/\/www.sonatype.com\/hubfs\/Q3%202021-State%20of%20the%20Software%20Supply%20Chain-Report\/SSSC-Report-2021_0913_PM_2.pdf?hsLang=en-us\" rel=\"nofollow\">650% year-over-year increase<\/a> in cyberattacks aimed at open source software (OSS) suppliers.&#8221;<\/p>\n<p>Through Assured OSS,&nbsp;enterprise users of open-source software will be able to incorporate the same OSS packages that Google uses into their own environments, according to Google.<\/p>\n<p>The packages Google has curated are regularly scanned, analyzed and tested for vulnerabilities, and they&#8217;re&nbsp;distributed from an&nbsp;<a href=\"https:\/\/cloud.google.com\/artifact-registry\" rel=\"nofollow\">Artifact Registry<\/a>&nbsp;that&#8217;s secured and protected by Google,&nbsp;Potti stated. There are over 500 packages available through <a href=\"https:\/\/github.com\/google\/oss-fuzz\/tree\/master\/projects\" rel=\"nofollow\">GitHub<\/a> now.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>&#8220;The scale of Google\u2019s ongoing effort to find OSS vulnerabilities would be challenging for any organization to construct and operate,\u201d Potti stated. &#8220;We continuously fuzz <a href=\"https:\/\/github.com\/google\/oss-fuzz\" rel=\"nofollow\">550 of the most commonly-used open source projects<\/a> and as of January 2022, that process has found <a href=\"https:\/\/github.com\/google\/oss-fuzz\" rel=\"nofollow\">more than 36,000 vulnerabilities<\/a>.&#8221;<\/p>\n<p>The Assured OSS service is expected to be offered as a preview in Q3 2022.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>On the zero-trust front, Google is introducing BeyondCorp Enterprise Essentials, which is designed to help enterprise customers begin to deploy zero-trust environments. The new solution brings context-aware access controls for SaaS applications or any other apps connected <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-federating-saml-workloads-to-google-cloud\" rel=\"nofollow\">via Security Assertions Markup Language<\/a> (SAML), which is an XML-based protocol that supports real-time authentication and authorization across federated Web services environments. It also includes threat and data protection capabilities, such as data loss prevention, malware and phishing protection, and URL filtering, integrated in the <a href=\"https:\/\/chromeenterprise.google\/\" rel=\"nofollow\">Chrome browser<\/a>, according to Potti.<\/p>\n<p>\u201cIt\u2019s a simple and effective way to protect your workforce, particularly an extended workforce or users who leverage a \u2018bring your own device\u2019 model,\u201d Potti stated.&nbsp;\u201cAdmins can also use Chrome dashboards to get visibility into unsafe user activity across unmanaged devices.\u201d<\/p>\n<p>BeyondCorp Enterprise includes an app and client connector that can simplify connections to apps running on other clouds such as Azure or AWS without the need to open firewalls or set up site-to-site VPN connections, Potti stated.&nbsp;Client connector enables zero-trust access to non-http, thick-client apps hosted on-prem or in other clouds, Potti stated.<\/p>\n<p>The company also delivered some other new security tools and services:<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<ul>\n<li>Security Foundation is designed to help enterprises more easily adopt Google Cloud\u2019s security capabilities, Potti said. It lets customers access Google guidance on setting up data protection, network security, security monitoring and other features.<\/li>\n<li>New custom detection capabilities for Google\u2019s risk management platform, Security Command Center, let customers add their own detection rules and perform configuration checks based on specific needs.<\/li>\n<\/ul>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3660644\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nGoogle Cloud is rolling out new security\u00a0services designed to address enterprise challenges including\u00a0securing open-source software and accelerating the adoption of zero-trust architectures.At its annual\u00a0Google Cloud Security Summit,\u00a0the company said it&#8217;s building on its Invisible Security effort, which promises to bake security into tools and services that enterprises and other customers use most.One example is a new service called Assured Open Source Software (Assured OSS), which is aimed at making it easier for organizations to\u00a0securely manage their open-source dependencies.&#8221;Today patching security vulnerabilities in open source software often feels like a high-stakes game of whack-a-mole: fix one, and two more pop up,&#8221; wrote Sunil Potti, vice president and general manager of Google Cloud Security, in a blog about the new services. &#8220;This helps explain research done by Sonatype software that shows that there\u2019s a 650% year-over-year increase in cyberattacks aimed at open source software (OSS) suppliers.&#8221;To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46683,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9,739,307],"class_list":["post-46682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-google","tag-open-source","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T00:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/04\/22\/18\/cloud-computing-security-concept-security-service-edge-and-secure-illustration-id1387892656-100925325-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts\",\"datePublished\":\"2022-05-18T00:39:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg\",\"keywords\":[\"Google\",\"Open Source\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/\",\"name\":\"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg\",\"datePublished\":\"2022-05-18T00:39:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/google\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/","og_locale":"en_US","og_type":"article","og_title":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-18T00:39:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/04\/22\/18\/cloud-computing-security-concept-security-service-edge-and-secure-illustration-id1387892656-100925325-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts","datePublished":"2022-05-18T00:39:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/"},"wordCount":579,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg","keywords":["Google","Open Source","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/","url":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/","name":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg","datePublished":"2022-05-18T00:39:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-cloud-launches-services-to-bolster-open-source-security-simplify-zero-trust-rollouts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google","item":"https:\/\/www.threatshub.org\/blog\/tag\/google\/"},{"@type":"ListItem","position":3,"name":"Google Cloud launches services to bolster open-source security, simplify zero-trust rollouts"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46682"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46682\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46683"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}