
Sign up to save your podcasts
Or


In this session looking at cloud platforms through the lens of first principle thinking, Rick and the Hash Table review the Google Cloud Platform (GCP). They identify some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust. The Hash Table gives their detailed technical advice about data management and risk assessments through GCP, strategies using GCP to support cybersecurity, and define our new favorite concepts: cyber shenanigans, conditions of weirdness (COWs), and cyber COW tipping.
Bob Turner joins Rick at the Cyberwire’s Hash Table to discuss securing the University of Wisconsin at Madison’s big data lake project using the Google Cloud Platform (GCP) and the GCP zero trust architecture: BeyondCorp.
Cybersecurity professional development and continued education.You will learn about: GCP networking, GCP security strategy and data management, cyber shenanigans, conditions of weirdness (COWs), and cyber COW-tipping
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks5
1313 ratings
In this session looking at cloud platforms through the lens of first principle thinking, Rick and the Hash Table review the Google Cloud Platform (GCP). They identify some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust. The Hash Table gives their detailed technical advice about data management and risk assessments through GCP, strategies using GCP to support cybersecurity, and define our new favorite concepts: cyber shenanigans, conditions of weirdness (COWs), and cyber COW tipping.
Bob Turner joins Rick at the Cyberwire’s Hash Table to discuss securing the University of Wisconsin at Madison’s big data lake project using the Google Cloud Platform (GCP) and the GCP zero trust architecture: BeyondCorp.
Cybersecurity professional development and continued education.You will learn about: GCP networking, GCP security strategy and data management, cyber shenanigans, conditions of weirdness (COWs), and cyber COW-tipping
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices

184 Listeners

6,023 Listeners

369 Listeners

373 Listeners

637 Listeners

1,017 Listeners

322 Listeners

414 Listeners

175 Listeners

314 Listeners

188 Listeners

73 Listeners

134 Listeners

44 Listeners

32 Listeners