Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Cloud Security Podcast by Google

Cloud Security Podcast by Google

Anton Chuvakin

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
Share icon

All episodes

Best episodes

Seasons

Top 10 Cloud Security Podcast by Google Episodes

Goodpods has curated a list of the 10 best Cloud Security Podcast by Google episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cloud Security Podcast by Google for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cloud Security Podcast by Google episode by adding your comments to the episode page.

Guest:

Topics:

  • Threat intelligence is one of those terms that means different things to everyone–can you tell us what this term has meant in the different contexts of your career? What do you tell people who assume that “TI = lists of bad IPs”?
  • We heard while prepping for this show that you were involved in breaking up a human trafficking ring: tell us about that!
  • In Anton’s experience, a lot of cyber TI is stuck in “1. Get more TI 2. ??? 3. Profit!” How do you move past that?
  • One aspect of threat intelligence that’s always struck me as goofy is the idea that we can “monitor the dark web” and provide something useful. Can you change my mind on this one?
  • You told us your story of getting into sales, you recently did a successful rotation into the role of Product Manager,, can you tell us about what motivated you to do this and what the experience was like?
  • Are there other parts of your background that inform the work you’re doing and how you see yourself at Google?
  • How does that impact our go to market for threat intelligence, and what’re we up to when it comes to keeping the Internet and broader world safe?

Resources:

bookmark
plus icon
share episode

Guest:

Topics:

  • Given your experience, how afraid or nervous are you about the use of GenAI by the criminals (PoisonGPT, WormGPT and such)?
  • What can a top-tier state-sponsored threat actor do better with LLM? Are there “extra scary” examples, real or hypothetical?
  • Do we really have to care about this “dangerous capabilities” stuff (CBRN)? Really really?
  • Why do you think that AI favors the defenders? Is this a long term or a short term view?
  • What about vulnerability discovery? Some people are freaking out that LLM will discover new zero days, is this a real risk?

Resources:

bookmark
plus icon
share episode

Guest:

Topics:

  • How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
  • ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
  • Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
  • Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
  • We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
  • The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?

Resources:

bookmark
plus icon
share episode
Cloud Security Podcast by Google - EP195 Containers vs. VMs: The Security Showdown!

EP195 Containers vs. VMs: The Security Showdown!

Cloud Security Podcast by Google

play

10/21/24 • 41 min

Cross-over hosts:

Guest:

Topics:

  • How would you approach answering the question ”what is more secure, container or a virtual machine (VM)?”
  • Could you elaborate on the real-world implications of this for security, and perhaps provide some examples of when one might be a more suitable choice than the other?
  • While containers boast a smaller attack surface (what about the orchestrator though?), VMs present a full operating system. How should organizations weigh these factors against each other?
  • The speed of patching and updates is a clear advantage of containers. How significant is this in the context of today's rapidly evolving threat landscape? Are there any strategies organizations can employ to mitigate the slower update cycles associated with VMs?
  • Both containers and VMs can be susceptible to misconfigurations, but container orchestration systems introduce another layer of complexity. How can organizations address this complexity and minimize the risk of misconfigurations leading to security vulnerabilities?
  • What about combining containers and VMs. Can you provide some concrete examples of how this might be implemented? What benefits can organizations expect from such an approach, and what challenges might they face?
  • How do you envision the security landscape for containers and VMs evolving in the coming years? Are there any emerging trends or technologies that could significantly impact the way we approach security for these two technologies?

Resources:

bookmark
plus icon
share episode
Cloud Security Podcast by Google - EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM Evolution
play

08/26/24 • 29 min

Guest:

  • Nicole Beckwith, Sr. Security Engineering Manager, Threat Operations @ Kroger

Topics:

  • What are the most important qualities of a successful SOC leader today?
  • What is your approach to building and maintaining a high-functioning SOC team?
  • How do you approach burnout in a SOC team?
  • What are some of the biggest challenges facing SOC teams today?
  • Can you share some specific examples of how you have built and - probably more importantly! - maintained a high-functioning SOC team?
  • What are your thoughts on the current state of SIEM technology? Still a core of SOC or not?
  • What advice would you give to someone who inherited a SOC? What should his/her 7/30/90 day plan include?

Resources:

bookmark
plus icon
share episode
Cloud Security Podcast by Google - EP215 Threat Modeling at Google: From Basics to AI-powered Magic
play

03/17/25 • 26 min

Guest:

Topics:

  • Can you walk us through Google's typical threat modeling process? What are the key steps involved?
  • Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems?
  • How does Google keep its threat models updated? What triggers a reassessment?
  • How does Google operationalize threat modeling information to prioritize security work and resource allocation? How does it influence your security posture?
  • What are the biggest challenges Google faces in scaling and improving its threat modeling practices? Any stories where we got this wrong?
  • How can LLMs like Gemini improve Google's threat modeling activities? Can you share examples of basic and more sophisticated techniques?
  • What advice would you give to organizations just starting with threat modeling?

Resources:

bookmark
plus icon
share episode

Guests:

  • No guests [Tim in Vegas and Anton remote]

Topics:

  • So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year?
  • Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends?
  • Last year, we pondered the 'Cloud Island' vs. 'Cloud Peninsula'. Based on Next 2025, is cloud security becoming more integrated with general cyber security, or is it still its own distinct domain?
  • What wider trends did you observe, perhaps from the expo floor buzz or partner announcements, that security folks should be aware of?
  • What was the biggest surprise for you at Next 2025? Something you absolutely didn't see coming?
  • Putting on your prediction hats (however reluctantly): based on Next 2025, what do you foresee as the major cloud security focus or challenge for the industry in the next 12 months?
  • If a busy podcast listener listening could only take one key message or action item away from everything announced and discussed at Next 2025, what should it be?

Resources:

bookmark
plus icon
share episode
Cloud Security Podcast by Google - EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
play

11/18/24 • 29 min

Guests:

Topics:

  • What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-)
  • Everyone's talking about how "identity is the new perimeter" in the cloud. Can you break that down in simple terms?
  • A lot of people say “in the cloud, you must do IAM ‘right’”. What do you think that means? What is the first or the main idea that comes to your mind when you hear it?
  • What’s this stuff about least-privilege and separation-of-duties being less relevant? Why do they matter in the cloud that changes rapidly?
  • What are your IAM Top Pet Peeves?

Resources:

bookmark
plus icon
share episode

Guests:

Topics:

  • Most organizations you see use both cloud and on-premise environments. What are the most common challenges organizations face in securing their hybrid cloud environments?
  • You do IR so in your experience, what are top 5 mistakes organizations make that lead to cloud incidents?
  • How and why do organizations get the attack surface wrong? Are there pillars of attack surface?
  • We talk a lot about how IAM matters in the cloud. Is that true that AD is what gets you in many cases even for other clouds?
  • What is your best cloud incident preparedness advice for organizations that are new to cloud and still use on-prem as well?

Resources:

bookmark
plus icon
share episode
Cloud Security Podcast by Google - EP220 Big Rewards for Cloud Security: Exploring the Google VRP
play

04/21/25 • 29 min

Guests:

Topics:

  • Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure?
  • How do you determine how much to pay for each vulnerability? What is the largest reward we paid? What was it for?
  • What products get the most submissions? Is this driven by the actual product security or by trends and fashions like AI?
  • What are the most likely rejection reasons?
  • What makes for a very good - and exceptional? - vulnerability report? We hear we pay more for “exceptional” reports, what does it mean?
  • In college Tim had a roommate who would take us out drinking on his Google web app vulnerability rewards. Do we have something similar for people reporting vulnerabilities in our cloud infrastructure? Are people making real money off this?
  • How do we actually uniquely identify vulnerabilities in the cloud? CVE does not work well, right?
  • What are the expected risk reduction benefits from Cloud VRP?

Resources:

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Cloud Security Podcast by Google have?

Cloud Security Podcast by Google currently has 224 episodes available.

What topics does Cloud Security Podcast by Google cover?

The podcast is about Cloud, Security, Podcasts, Technology and Cybersecurity.

What is the most popular episode on Cloud Security Podcast by Google?

The episode title 'EP169 Google Cloud Next 2024 Recap: Is Cloud an Island, So Much AI, Bots in SecOps' is the most popular.

What is the average episode length on Cloud Security Podcast by Google?

The average episode length on Cloud Security Podcast by Google is 27 minutes.

How often are episodes of Cloud Security Podcast by Google released?

Episodes of Cloud Security Podcast by Google are typically released every 7 days.

When was the first episode of Cloud Security Podcast by Google?

The first episode of Cloud Security Podcast by Google was released on Feb 11, 2021.

Show more FAQ

Toggle view more icon

Comments