<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Gcp on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/gcp/</link><description>Recent content in Gcp on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/gcp/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item><item><title>Cloud Security Posture Management: AWS, Azure, GCP</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations accelerate their cloud migration strategies, the security complexity multiplies exponentially. With workloads distributed across AWS, Azure, and GCP—each with their own security models, compliance requirements, and configuration options—the traditional perimeter-based security approach no longer applies. Organizations are increasingly turning to [zero trust](/pillars/zero-trust/) principles to address these challenges. In this latest episode of Security in 45, hosts Mike Veedock and Andres Sarmiento tackle one of the most pressing challenges facing modern enterprises: how to maintain visibility and control over your cloud security posture as you scale across multiple providers.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The strategic and operational benefits of cloud migration&lt;/li&gt;
&lt;li&gt;Characteristics and differences between major cloud providers (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;Essential security controls for cloud environments (MFA, network segmentation, encryption)&lt;/li&gt;
&lt;li&gt;The critical role of Cloud Security Posture Management (CSPM) tools&lt;/li&gt;
&lt;li&gt;Common cloud security risks and threat landscapes&lt;/li&gt;
&lt;li&gt;Industry resources for deepening cloud security knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-business-case-for-cloud-migration"&gt;The Business Case for Cloud Migration&lt;/h3&gt;
&lt;p&gt;Cloud adoption has become less of a competitive advantage and more of a business necessity. Organizations are moving to the cloud not just for the &amp;ldquo;cool factor,&amp;rdquo; but for tangible, measurable benefits that directly impact the bottom line.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item></channel></rss>