Watch: Identity is the foundation for AI Agents Why identity management is the non-negotiable first step for securing autonomous AI agents in the modern enterprise.
⚡ Serverless & App Modernisation
Scaling beyond the request-response cycle into high-performance background processing.
- App Engine to Cloud Run Migration: A new preview
gcloud betacommand simplifies the transition for legacy App Engine apps, automating the containerisation and deployment to Cloud Run. - Cloud Run Worker Pools (GA): Now generally available, worker pools provide a dedicated environment for containerised background tasks, reducing the need for complex GKE or GCE management.
- High-Performance Go on Cloud Run: Technical patterns for squeezing maximum performance out of Go binaries, proving serverless is viable for compute-intensive enterprise workloads.
- OSOnly24 Runtime GA: The minimalist
osonly24base image is now GA, enabling faster cold starts and smaller attack surfaces for Go and Dart services. - 5 Years of Cloud Run Lessons: A veteran architect’s retrospective on statelessness, secret management, and the evolution of the GCP serverless ecosystem.
- Cloud Shell + VS Code Remote SSH: A guide to using Cloud Shell’s free persistent storage as a remote backend, turning any browser into a full-scale IDE.
- Artifact Registry Cleanup Policies: Automating image retention and cleanup via Terraform to maintain FinOps hygiene and repository performance.
- Debugging Cloud Run 403 Errors: A systematic framework for identifying and resolving identity-based 'Forbidden' errors in service-to-service communication.
- Cloud Build Regional Expansion: CI/CD capabilities have launched in the
asia-southeast3region, allowing for localised builds in Thailand. - Workflows in Bangkok: The serverless orchestration service is now live in
asia-southeast3, completing the regional stack for event-driven modernisation.
🛡️ IAM & Identity Governance
Rebuilding identity as the 'Operating System' for autonomous AI and ethical trust.
- Okta: Implementing AI Ethics in Organisations: Moves ethics from theory to practice by establishing cross-functional AI Governance Teams and 'experimentation zones' to foster safe, rapid innovation.
- Okta: Identity & Authorisation for Autonomous Trust: Defines a new paradigm where every agent action is governed by provenance and attenuation via the Identity Assertion JWT Authorisation Grant (ID-JAG).
- Okta: Security-Driven Governance: A strategy for unified Identity Threat Protection (ITP) and Governance (OIG) to enable continuous, risk-adjusted access reviews.
- Cloud KMS Autokey (Public Preview): Automates the creation and management of encryption keys within the same project as the resource, simplifying delegated security.
- GCP Penetration Testing Guide: A case study on how threat actors chain overprivileged service accounts and legacy keys to exfiltrate data.
- Service Account Key Cleanup: Leveraging Policy Intelligence to identify and retire unused long-lived keys without impacting production traffic.
- GTIG AI Threat Intelligence: Recent intelligence on how adversaries use model extraction and AI-enabled social engineering to bypass MFA.
- UNC1069 Crypto & AI Threats: Analysis of state-sponsored actors using deepfakes and AI agents to breach high-value cryptocurrency platforms.
- Modern Security: Federated Guardrails: A podcast on the architecture of 'Federated Guardrails'—balancing engineering autonomy with centralised security policy.
🤖 AI Agents & Data Ecosystem
Industrialising intelligence: Bridging data silos with MCP and Conversational Analytics.
- GEAR Program for AI Agents: Launch of the Gemini Enterprise Agent Ready program, providing specialised training for architects building multi-agent systems.
- Remote MCP Servers for GCP Databases: Using the Model Context Protocol (MCP) to allow AI agents to interact directly with Cloud SQL, Spanner, and Firestore.
- Conversational Analytics API: Enables developers to build natural-language interfaces for BigQuery that return both text insights and visual charts.
- BigQuery Dataset Insights (Preview): Automated generation of relationship graphs and schema summaries to make enterprise data 'agent-readable'.
- AlloyDB IAM Authentication & Connectors: GA release of language connectors that support managed connection pooling and IAM-integrated security for AlloyDB.
- Gemini Code Generation at Scale: Key takeaways on leveraging LLMs to generate production-ready code while maintaining security and architectural standards.
- Mastering Model Fine-Tuning: A deep dive into supervised fine-tuning for Gemini 2.5 Flash on Vertex AI for specialised domain performance.
- Conductor: Automated AI Code Reviews: A tool for verifying AI-generated implementations against original plans to prevent security and logic bugs.
- Enterprise AI Platform Architecture: A reference architecture for moving AI systems from PoC to production with a focus on scalability and orchestration.
- Multimodal RAG Survival Guide: Practical steps for building cost-effective multimodal RAG systems using Gemini and BigQuery vector search.
🌐 Platform Operations & FinOps
Global resilience: Operationalising sovereign cloud and spend-based CUDs.
- FinOps Guide to Spend-Based CUDs: A strategic guide to maximising cloud savings using the latest commitment-based discount models and validation tools.
- OTLP support in Cloud Monitoring: Native OpenTelemetry support for standardised, vendor-agnostic observability across hybrid cloud deployments.
- GDC Air-Gapped Networking (1.15): Advanced IPAM and networking features for strictly controlled, sovereign air-gapped environments.
- GKE TPU Slice Health Metrics: New system metrics provide granular visibility into the performance and health of TPU clusters for AI training.
- VMware Engine ve2 Expansion: High-performance ve2 node types are now available in Paris and Osaka, supporting legacy workload modernisation.
- Flow Analyser Latency Mode: GA release of RTT analysis to help network architects identify and resolve bottlenecks in VPC traffic.
- Cloud SQL Vertex AI Integration: Simplifies AI application architecture by allowing vector embeddings and predictions directly within Cloud SQL.
- Log-Based Alerting Strategy: Best practices for configuring proactive alerts that trigger on log patterns to prevent production outages.
- Service Mesh Security Patches: Critical updates for Cloud Service Mesh images, addressing vulnerabilities in Envoy and Istio.
- Deepseek on B200 GPUs (GKE): Technical deep dive into high-performance DRANET networking for large-scale LLM inference on GKE.