Cloud Security Podcast by Google
Un pódcast de Anton Chuvakin - Lunes
226 Episodo
-  EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading IndicatorsPublicado: 23/12/2024
-  EP203 Cloud Shared Responsibility: Beyond the Blame Game with Rich MogullPublicado: 16/12/2024
-  EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response EngineeringPublicado: 9/12/2024
-  EP201 Every CTO Should Be a CSTO (Or Else!) - Transformation Lessons from The HoffPublicado: 2/12/2024
-  EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload SecurityPublicado: 25/11/2024
-  EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)Publicado: 18/11/2024
-  EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting LessonsPublicado: 11/11/2024
-  EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps PerspectivePublicado: 4/11/2024
-  EP196 AI+TI: What Happens When Two Intelligences Meet?Publicado: 28/10/2024
-  EP195 Containers vs. VMs: The Security Showdown!Publicado: 21/10/2024
-  EP194 Deep Dive into ADR - Application Detection and ResponsePublicado: 14/10/2024
-  EP193 Inherited a Cloud? Now What? How Do I Secure It?Publicado: 7/10/2024
-  EP192 Confidential + AI: Can AI Keep a Secret?Publicado: 30/9/2024
-  EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!Publicado: 23/9/2024
-  EP190 Unraveling the Security Data Fabric: Need, Benefits, and FuturesPublicado: 16/9/2024
-  EP189 How Google Does Security Programs at Scale: CISO InsightsPublicado: 9/9/2024
-  EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS SecurityPublicado: 2/9/2024
-  EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM EvolutionPublicado: 26/8/2024
-  EP186 Cloud Security Tools: Trust the Cloud Provider or Go Third-Party? An Epic Debate, Anton vs TimPublicado: 19/8/2024
-  EP185 SAIF-powered Collaboration to Secure AI: CoSAI and Why It Matters to YouPublicado: 12/8/2024
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
