Cloud Security Podcast by Google

A podcast by Anton Chuvakin - Mondays

Mondays

Categories:

202 Episodes

  1. Securing Multi-Cloud from a CISO Perspective, Part 3

    Published: 7/12/2021
  2. Security Marketing? Every Product Needs a Story!

    Published: 7/6/2021
  3. Security Operations, Reliability, and Securing Google with Heather Adkins

    Published: 6/28/2021
  4. Double-clicking, but not on fire hydrants, with bot fighters

    Published: 6/21/2021
  5. More Cloud Migration Security Lessons

    Published: 6/14/2021
  6. Modern Threat Detection at Google

    Published: 6/7/2021
  7. Modern Data Security Approaches: Is Cloud More Secure?

    Published: 6/1/2021
  8. Scaling Google Kubernetes Engine Security

    Published: 5/24/2021
  9. Making Compliance Cloud-native

    Published: 5/19/2021
  10. Application Security in the Cloud

    Published: 5/10/2021
  11. Threat Models and Cloud Security

    Published: 5/3/2021
  12. Preparing for Cloud Migrations from a CISO Perspective, Part 2

    Published: 4/26/2021
  13. SIEM Modernization? Is That a Thing?

    Published: 4/19/2021
  14. Building a Third Party Platform for Cloud Security

    Published: 4/12/2021
  15. Zero Trust: Fast Forward from 2010 to 2021

    Published: 4/1/2021
  16. No One Expects the Malware Inquisition

    Published: 3/24/2021
  17. Cloud Security Talks Summarized: A Recap Episode

    Published: 3/17/2021
  18. Preparing for Cloud Migrations from a CISO Perspective, Part 1

    Published: 3/11/2021
  19. Gathering Data for Zero Trust

    Published: 2/24/2021
  20. Automate and/or Die?

    Published: 2/11/2021

10 / 11

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.