Cloud Security Podcast by Google
En podcast af Anton Chuvakin - Mandage
Kategorier:
197 Episoder
-
NEXT Special - Google Cybersecurity Action Team: What's the Story?
Udgivet: 13.10.2021 -
NEXT Special - Cloud Security and DEI: Being an Ally!
Udgivet: 12.10.2021 -
NEXT Special - Google Cloud NEXT Security: What to Watch?
Udgivet: 11.10.2021 -
EP34 Instrumenting Modern Application Stack for Detection and Response
Udgivet: 4.10.2021 -
EP33 Cloud Migrations: Security Perspectives from The Field
Udgivet: 27.9.2021 -
EP32 Can You Ever Know Thyself: Cloud Attack Surface Management
Udgivet: 20.9.2021 -
EP31 Cloud Certifications, and Cloud Security with TheCertsGuy
Udgivet: 13.9.2021 -
EP30 Malware Hunting with VirusTotal
Udgivet: 7.9.2021 -
Future of EDR: Is It Reason-able to Suggest XDR?
Udgivet: 30.8.2021 -
Tales from the Trenches: Using AI for Gmail Security
Udgivet: 23.8.2021 -
The Mysteries of Detection Engineering: Revealed!
Udgivet: 16.8.2021 -
SOC in a Large, Complex and Evolving Organization
Udgivet: 9.8.2021 -
Beyond Compliance: Cloud Security in Europe
Udgivet: 2.8.2021 -
Linking Up The Pieces: Software Supply Chain Security at Google and Beyond
Udgivet: 26.7.2021 -
Threat Detection at Google Cloud Security Summit
Udgivet: 19.7.2021 -
Securing Multi-Cloud from a CISO Perspective, Part 3
Udgivet: 12.7.2021 -
Security Marketing? Every Product Needs a Story!
Udgivet: 6.7.2021 -
Security Operations, Reliability, and Securing Google with Heather Adkins
Udgivet: 28.6.2021 -
Double-clicking, but not on fire hydrants, with bot fighters
Udgivet: 21.6.2021 -
More Cloud Migration Security Lessons
Udgivet: 14.6.2021
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.