top of page


The Big Data Blog


Google Cloud and the Foundations of Cloud-Based Digital Forensics
Why Google Cloud Matters for DFIR Most enterprise workloads still run on-premise, not because cloud platforms are weak, but because migration introduces architectural and operational complexity. Unlike traditional environments, investigators in Google Cloud cannot rely on physical access, predictable network paths, or full host-level visibility. Instead, identity events, service-level logs, and resource metadata become the primary evidence sources. -------------------------
Feb 213 min read


Using gcloud for Google Workspace Investigations (The Investigator’s Way)
Up until now, most Google Workspace investigations start in one of two places: The Admin Console Or Workspace APIs Both are useful. Both have limits. At some point though, especially in larger or more mature environments, logs don’t just live inside Workspace anymore — they’re exported into Google Cloud . And once that happens, the Admin Console alone isn’t enough. That’s where gcloud comes in. ---------------------------------------------------------------------------------
Feb 164 min read


Detecting OpenClaw/Clawbot with SentinelOne: The Challenge of Blocking
A huge thank you to my dearest friend Jeremy Jethro, who created this comprehensive script and the Detection rule in Sentinel one . Hi everyone, If you've been following the cybersecurity landscape lately, you've probably heard whispers about OpenClaw (also known as Clawbot or Moltbot) . And if you're in IT security, you're likely dealing with requests to detect and block it right now. -----------------------------------------------------------------------------------------
Feb 124 min read


Google Takeout: The Quiet Data Exit Nobody Talks About
Let’s talk about one of the most underestimated data exfil paths in Google Workspace. Not malware. Not OAuth abuse. Not a compromised token. Just… Google Takeout . Most people think of Takeout as a harmless “download my data” feature. And to be fair, that was the original idea. But from a security and forensics perspective, Takeout is a built-in data export mechanism that works surprisingly well — maybe too well. What Is Google Takeout (Really)? Google Takeout, also call
Feb 124 min read


Investigating Data Exposure in Google Drive
If you’ve worked in Google Workspace long enough, you already know this truth: Google Drive is where data leaks love to happen. Not always malicious. Sometimes it’s just: “Oops, shared it publicly” “Oops, shared it with the wrong domain” “Oops, didn’t realize Anyone with the link means literally anyone” So when data exposure happens, we usually care about two questions: What happened to the file? Can we still access or recover it? That’s where Google Drive investigation tool
Feb 73 min read
Ready to discuss:
- Schedule a call for a consultation
- Message me via "Let's Chat" for quick questions
Let's connect!
bottom of page