Cloud Security Podcast by Google cover art

Cloud Security Podcast by Google

Cloud Security Podcast by Google

By: Anton Chuvakin
Listen for free

About this listen

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or just for organizational benefit. We hope you'll join us if you're interested in where technology overlaps with process and bumps up against organizational design. We're hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can't keep as the world moves from on-premises computing to cloud computing.Copyright Google Cloud
Episodes
  • EP256 Rewiring Democracy & Hacking Trust: Bruce Schneier on the AI Offense-Defense Balance
    Dec 15 2025

    Guest:

    • Bruce Schneier

    Topics:

    • Do you believe that AI is going to end up being a net improvement for defenders or attackers? Is short term vs long term different?
    • We're excited about the new book you have coming out with your co-author Nathan Sanders "Rewiring Democracy". We want to ask the same question, but for society: do you think AI is going to end up helping the forces of liberal democracy, or the forces of corruption, illiberalism, and authoritarianism?
    • If exploitation is always cheaper than patching (and attackers don't follow as many rules and procedures), do we have a chance here?
    • If this requires pervasive and fast "humanless" automatic patching (kinda like what Chrome does for years), will this ever work for most organizations?
    • Do defenders have to do the same and just discover and fix issues faster? Or can we use AI somehow differently?
    • Does this make defense in depth more important?
    • How do you see AI as changing how society develops and maintains trust?

    Resources:

    • "Rewiring Democracy" book
    • "Informacracy Trilogy" book
    • Agentic AI's OODA Loop Problem
    • EP255 Separating Hype from Hazard: The Truth About Autonomous AI Hacking
    • AI and Trust
    • AI and Data Integrity
    • EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
    • RSA 2025: AI's Promise vs. Security's Past — A Reality Check

    Show More Show Less
    33 mins
  • EP255 Separating Hype from Hazard: The Truth About Autonomous AI Hacking
    Dec 8 2025

    Guest:

    • Heather Adkins, VP of Security Engineering, Google

    Topic:

    • The term "AI Hacking Singularity" sounds like pure sci-fi, yet you and some other very credible folks are using it to describe an imminent threat. How much of this is hyperbole to shock the complacent, and how much is based on actual, observed capabilities today?
    • Can autonomous AI agents really achieve that "exploit - at - machine - velocity" without human intervention for the zero-day discovery phase?
    • On the other hand, why may it actually not happen?
    • When we talk about autonomous AI attack platforms, are we talking about highly resourced nation-states and top-tier criminal groups, or will this capability truly be accessible to the average threat actor within the next 6-12 months? What's the "Metasploit" equivalent for AI-powered exploitation that will be ubiquitous?
    • Can you paint a realistic picture of the worst-case scenario that autonomous AI hacking enables? Is it a complete breakdown of patch cycles, a global infrastructure collapse, or something worse?
    • If attackers are operating at "machine speed," the human defender is fundamentally outmatched. Is there a genuine "AI-to-AI" counter-tactic that doesn't just devolve into an infinite arms race? Or can we counter without AI at all?
    • Given that AI can expedite vulnerability discovery, how does this amplified threat vector impact the software supply chain? If a dependency is compromised within minutes of a new vulnerability being created, does this force the industry to completely abandon the open-source model, or does it demand a radical, real-time security scanning and patching system that only a handful of tech giants can afford?
    • Are current proposed regulations, like those focusing on model safety or disclosure, even targeting the right problem?
    • If the real danger is the combinatorial speed of autonomous attack agents, what simple, impactful policy change should world governments prioritize right now?

    Resources:

    • "Autonomous AI hacking and the future of cybersecurity" article
    • EP20 Security Operations, Reliability, and Securing Google with Heather Adkins
    • Introducing CodeMender: an AI agent for code security
    • EP251 Beyond Fancy Scripts: Can AI Red Teaming Find Truly Novel Attacks?
    • Daniel Miessler site and podcast
    • "How SAIF can accelerate secure AI experiments" blog
    • "Staying on top of AI Developments" blog
    Show More Show Less
    30 mins
  • EP254 Escaping 1990s Vulnerability Management: From Unauthenticated Scans to AI-Driven Mitigation
    Dec 1 2025

    Guest:

    • Caleb Hoch, Consulting Manager on Security Transformation Team, Mandiant, Google Cloud

    Topics:

    • How has vulnerability management (VM) evolved beyond basic scanning and reporting, and what are the biggest gaps between modern practices and what organizations are actually doing?
    • Why are so many organizations stuck with 1990s VM practices?
    • Why mitigation planning is still hard for so many?
    • Why do many organizations, including large ones, still rely on unauthenticated scans despite the known importance of authenticated scanning for accurate results?
    • What constitutes a "gold standard" vulnerability prioritization process in 2025 that moves beyond CVSS scores to incorporate threat intelligence, asset criticality, and other contextual factors?
    • What are the primary human and organizational challenges in vulnerability management, and how can issues like unclear governance, lack of accountability, and fear of system crashes be overcome?
    • How is AI impacting vulnerability management, and does the shift to cloud environments fundamentally change VM practices?

    Resources:

    • EP109 How Google Does Vulnerability Management: The Not So Secret Secrets!
    • EP246 From Scanners to AI: 25 Years of Vulnerability Management with Qualys CEO Sumedh Thakar
    • EP248 Cloud IR Tabletop Wins: How to Stop Playing Security Theater and Start Practicing
    • How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends
    • Mandiant M Trends 2025
    • EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators
    • Mandiant Vulnerability Management
    Show More Show Less
    31 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.