This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
Guest: Kirstie Failey @ Google Threat Intelligence Group Scott Runnels @
Mandiant Incident Response Topics: Threat Intelligence Cloud IR and
Forensics Subscribe at Spotify. Subscribe at Apple Podcasts. Subscribe
at YouTube Topics covered: What is the...
Guest: No guests [Tim in Vegas and Anton remote] Topics: Cloud Security
Practices Subscribe at Spotify. Subscribe at Apple Podcasts. Subscribe
at YouTube Topics covered: So, another Next is done. Beyond the usual
Vegas chaos, what was the overarching...
Guests: Michael Cote, Cloud VRP Lead, Google Cloud Aadarsh Karumathil,
Security Engineer, Google Cloud Topics: Cloud Security Practices Cloud
Posture and Hygiene Subscribe at Spotify. Subscribe at Apple Podcasts.
Subscribe at YouTube Topics covered: ...
Guest: Steve Ledzian, APAC CTO, Mandiant at Google Cloud Topics: Threat
Intelligence Subscribe at Spotify. Subscribe at Apple Podcasts.
Subscribe at YouTube Topics covered: We've seen a shift in how boards
engage with cybersecurity. From your perspec...
The AI revolution is here, and it's moving fast. You know the promise:
transformative capabilities, game-changing efficiencies, better tools.
But with great power comes great responsibility, and in the case of AI,
a whole new set of interesting secur...
It can only be one of the 2 eps we did on Confidential compute. Here
they are:
https://cloud.withgoogle.com/cloudsecurity/podcast/ep121-what-happens-here-stays-here-confidential-city-and-space/
https://cloud.withgoogle.com/cloudsecurity/podcast/ep192...
Not sure Jason is reading these, but I can try to answer. Q1 Frankly, I
don't see cloud breaking the "event vs incident" definition, in general.
What I observed is a bit more uncertainty on what is considered an
incident (e.g. on premise, a new vulne...
An excellent post, perhaps we need to complement this with another post
just on how to test detections, such as with Mandiant Security
Validation or open source tools?