<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security Guides on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/pillars/</link><description>Recent content in Security Guides on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/pillars/index.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Firewall Guide: From ASA to Hybrid Mesh Firewall</title><link>https://www.securityin45.com/pillars/firewall/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/pillars/firewall/</guid><description>&lt;h2 id="the-evolution-of-firewalling"&gt;The Evolution of Firewalling&lt;/h2&gt;
&lt;p&gt;Firewalling has evolved through four distinct generations, each responding to fundamental shifts in how networks are used and attacked.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://www.securityin45.com/images/pillars/firewall/firewall-evolution-timeline.png" alt="Firewall evolution timeline from stateful firewalls through NGFW to Hybrid Mesh Firewall showing drivers, capabilities, and security needs"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Stateful Firewalls (1990-2007)&lt;/strong&gt; addressed growing internet access and basic attacks with connection state tracking, IP/port filtering, and basic traffic control. SSL/TLS decryption emerged toward the end of this era.&lt;/p&gt;</description></item><item><title>XDR Explained: Extended Detection and Response Guide</title><link>https://www.securityin45.com/pillars/xdr/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/pillars/xdr/</guid><description>&lt;h2 id="what-security-operations-teams-need"&gt;What Security Operations Teams Need&lt;/h2&gt;
&lt;p&gt;Security operations teams face three fundamental challenges: getting a correlated view of alerts across their environment, working with speed, accuracy, and confidence, and remediating threats with guidance and automated playbooks. XDR — Extended Detection and Response — is the platform category designed to solve all three.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://www.securityin45.com/images/pillars/xdr/what-secops-wants.png" alt="What security operations teams want from XDR - correlated alerts, speed and confidence, and automated remediation"&gt;&lt;/p&gt;
&lt;h2 id="why-traditional-approaches-fall-short"&gt;Why Traditional Approaches Fall Short&lt;/h2&gt;
&lt;h3 id="ransomware-campaigns-are-multi-vector"&gt;Ransomware Campaigns Are Multi-Vector&lt;/h3&gt;
&lt;p&gt;Modern attacks don&amp;rsquo;t come from a single direction. A well-tailored phishing email leads a user to a malicious website. That website drops a payload onto the user&amp;rsquo;s device. The malware then moves laterally to other machines and eventually exfiltrates or encrypts data. Each stage of this kill chain may touch a different security tool — email gateway, DNS security, endpoint protection, network firewall, and data loss prevention.&lt;/p&gt;</description></item><item><title>Zero Trust Security: The Complete Guide</title><link>https://www.securityin45.com/pillars/zero-trust/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/pillars/zero-trust/</guid><description>&lt;h2 id="what-is-zero-trust"&gt;What Is Zero Trust?&lt;/h2&gt;
&lt;p&gt;Zero Trust is a security framework built on a simple principle: &lt;strong&gt;never trust, always verify&lt;/strong&gt;. Unlike traditional perimeter-based security that assumes everything inside the corporate network is safe, Zero Trust treats every user, device, and connection as potentially compromised until proven otherwise.&lt;/p&gt;
&lt;p&gt;Zero Trust is not a single product — it&amp;rsquo;s an architectural philosophy that requires continuous verification across your entire infrastructure. Every access request is evaluated based on identity, device posture, location, and context before access is granted — and that verification continues throughout the session.&lt;/p&gt;</description></item></channel></rss>