Harnessing AI and Cloud Security: Insights from TechCrunch Disrupt 2025

September 17, 2025

Harnessing AI and Cloud Security: Insights from TechCrunch Disrupt 2025

Welcome to the world of technology where innovation meets security, and where artificial intelligence (AI) is transforming industries at every turn! In this cloud security guide, we preview the key themes heading into TechCrunch Disrupt 2025 (October 27-29, 2025 at Moscone West in San Francisco)1, alongside parallel announcements from Google around AI-powered discovery and MCP tooling published the same week. We focus on how AI is reshaping defense strategies and how MCP (Model Context Protocol) deployments in enterprise cloud security are evolving. Whether you're interested in AI security, MCP architecture, or cloud-native security, these insights from industry leaders provide a comprehensive look at the future of AI-powered cybersecurity. For hands-on learning, explore our AI Security Fundamentals course.

AI's Role in Transforming Defense and National Security

Ahead of the TechCrunch Disrupt event (October 27-29, 2025 in San Francisco), TechCrunch announced that Ethan Thornton, CEO and founder of Mach Industries, would headline the AI Stage to discuss how next-gen defense is being built with AI at its core2. Thornton, who launched Mach Industries out of MIT in 2023, was set to unpack autonomous systems, edge computing, and dual-use technologies that blur the lines between commercial and military capability2. Here's an overview of the themes flagged for the session about AI in military applications:

Autonomous Systems and Decentralized Strategy

  • Autonomous Defense Systems: Per TechCrunch's session preview, the AI Stage talk centers on AI-powered autonomous platforms that can operate with minimal human intervention in defense operations2.
  • Edge Computing for the Battlefield: Thornton has framed contested environments as edge problems — autonomous functionality "must be built from inception with contested environments in mind" — pushing inference to edge computing rather than centralized backends2.

This shift towards AI-driven defense mechanisms raises important questions about AI ethics, safety, and the potential for misuse. For a deeper dive, see our article on How AI is Shaping the Future of Defense.

Google's Revamped Discover Page and AI-Powered Content

The same week Disrupt 2025 was being previewed, Google announced updates to its Discover page in the Google app, letting users follow specific publishers and creators directly3. Here's what's new in Google's content discovery:

  • Follow Buttons in Discover: A new "Follow" button now appears alongside recommended articles, videos, and posts, letting signed-in users opt in to publishers and creators they want to see more from3.
  • Expanded Content Types: Discover began surfacing additional content formats — including YouTube Shorts and posts from X and Instagram — alongside articles3.

Securing the Future: Key Risks in MCP Deployments on Google Cloud

As AI agents and MCP servers spread across enterprise stacks, so do the security risks. On September 17, 2025, the Google Cloud security team published guidance on securing Model Context Protocol (MCP) deployments on Google Cloud, outlining five deployment risks and a centralized-proxy mitigation pattern4. Here are the five key MCP deployment risks Google Cloud highlighted:

Top Five MCP Deployment Security Risks (per Google Cloud)

  1. Unauthorized Tool Exposure: A misconfigured MCP manifest can let unauthorized agents reach sensitive tools, including internal admin functions4.
  2. Session Hijacking: An attacker can steal a legitimate user's session ID to impersonate them, make unauthorized API calls, or inject malicious payloads into shared queues in stateful systems4.
  3. Tool Shadowing and Shadow MCP: Rogue MCP tools that mimic legitimate services can be deployed by malicious actors to intercept calls or exfiltrate data4.
  4. Token Theft and Sensitive Data Leaks: Improper handling can expose tokens, API keys, and other sensitive data through MCP responses4.
  5. Weak Authentication Bypasses: Weak or missing authentication on MCP endpoints can be exploited to gain unauthorized access4.

Mitigating Risks with a Centralized Proxy Architecture

Google Cloud recommends a centralized MCP proxy acting as a secure intermediary for all client-to-MCP-server traffic, built on Cloud Run, Apigee, or Google Kubernetes Engine4. As a single enforcement point it enables:

  • Consistent Access Control: Uniform policies and RBAC across all MCP requests4.
  • Audit Logging and Real-Time Threat Detection: Centralized observability, secret scanning, and anomaly detection4.
  • Traffic Management: Rate limiting and resource limits to contain misbehaving or malicious agents4.

The MCP Toolbox: Empowering Developers with Firestore Support

Also published on September 17, 2025, Google introduced Firestore support and custom tools in MCP Toolbox for Databases — an open-source MCP server that simplifies how developers connect AI agents to enterprise data, now extended to a major NoSQL database5. Here are some highlights for AI application development:

AI-Assisted Development Workflows

  • Universal Adapter for AI Agents: The MCP Toolbox acts as an open-source MCP server that lets agents talk to a growing list of databases — initially BigQuery, AlloyDB, Cloud SQL, and Spanner — and now Firestore, through a standardized protocol5.
  • Natural Language Database Interactions: Through MCP-aware clients (like the Gemini CLI or IDE assistants), developers can debug data, test security rules, and manage Firestore collections using natural-language prompts5.

This capability opens up new avenues for AI developers, enhancing productivity and fostering innovation in web and mobile applications. For developers looking to build with MCP, check out our MCP Server Development course.

Conclusion: Embracing the Future of AI and Cloud Security

Heading into TechCrunch Disrupt 2025 and looking at the wave of announcements landing alongside it, AI and cloud technologies are reshaping the landscape of enterprise security and software development in profound ways. From AI-native defense startups taking the AI Stage, to new MCP security guidance and Firestore tooling from Google Cloud, the direction of travel is clear.

Key Takeaways for Security Professionals

  • MCP security requires careful attention to authentication, access control, and monitoring
  • Centralized proxy architecture provides better security observability and policy enforcement
  • AI-powered tools are transforming how developers interact with cloud databases
  • Zero Trust principles apply equally to AI systems and traditional infrastructure

If you're a startup, developer, or tech enthusiast, now is the time to embrace these advancements. Stay informed, explore the tools available, and consider how you can integrate AI and cloud security solutions into your workflows.

Related Articles:

Recommended Courses:

References

Footnotes

  1. TechCrunch, "TechCrunch Disrupt 2025." https://techcrunch.com/events/tc-disrupt-2025/

  2. TechCrunch, "The new face of defense tech — Ethan Thornton of Mach Industries — takes the AI stage at TechCrunch Disrupt 2025," September 17, 2025. https://techcrunch.com/2025/09/17/the-new-face-of-defense-tech-takes-the-ai-stage-at-techcrunch-disrupt-2025/ 2 3 4

  3. Google Blog, "Updates to Discover in Search: More content from creators and publishers," September 17, 2025. https://blog.google/products-and-platforms/products/search/discover-updates-september-2025/ 2 3

  4. Google Cloud Blog, "How to secure your remote MCP server on Google Cloud." https://cloud.google.com/blog/products/identity-security/how-to-secure-your-remote-mcp-server-on-google-cloud 2 3 4 5 6 7 8 9 10

  5. Google Cloud Blog, "Firestore support and custom tools in MCP Toolbox." https://cloud.google.com/blog/products/ai-machine-learning/firestore-support-and-custom-tools-in-mcp-toolbox 2 3


FREE WEEKLY NEWSLETTER

Stay on the Nerd Track

One email per week — courses, deep dives, tools, and AI experiments.

No spam. Unsubscribe anytime.