<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ai-Security on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/ai-security/</link><description>Recent content in Ai-Security on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/ai-security/index.xml" rel="self" type="application/rss+xml"/><item><title>AI Security Risks: How Cisco Secures Artificial Intelligence</title><link>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; Artificial intelligence has moved from science fiction to business reality, but organizations racing to adopt AI are discovering that innovation and security don't always move at the same pace. As AI systems become increasingly central to enterprise operations—from customer service automation to data analysis and decision-making—they're also becoming attractive targets for attackers and sources of unexpected vulnerabilities. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore the critical intersection of AI and security, discussing the emerging risks that come with AI adoption and how organizations can build and maintain secure AI systems. If you're responsible for enterprise security or infrastructure decisions, understanding these risks and mitigation strategies has moved from &amp;quot;nice to know&amp;quot; to essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;AI fundamentals and why adoption is accelerating&lt;/strong&gt; — understanding what AI actually is and why we&amp;rsquo;re seeing explosive growth in AI implementations right now&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The security dangers of AI systems&lt;/strong&gt; — examining real threats including data exposure, generation of inaccurate information, and attack vectors targeting AI systems&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s approach to AI security&lt;/strong&gt; — how Cisco is addressing these challenges through monitoring, testing, and secure design practices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Practical recommendations for AI users&lt;/strong&gt; — actionable guidance for organizations deploying AI in their environments&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ai-beyond-the-hype"&gt;Understanding AI: Beyond the Hype&lt;/h3&gt;
&lt;p&gt;To properly secure AI, we first need to understand what it actually is—and perhaps more importantly, what it isn&amp;rsquo;t. One of the most useful framings from this episode describes AI as &amp;ldquo;a fancy expensive autocomplete.&amp;rdquo; While this might sound reductive, it&amp;rsquo;s actually quite insightful.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>XDR Integration: Cisco's Open Ecosystem Approach</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; # XDR Integration: Cisco's Open Ecosystem Approach
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where cyber threats have become increasingly sophisticated and fragmented across multiple security domains, organizations are struggling with tool sprawl, alert fatigue, and siloed security operations. &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt; has emerged as a critical evolution in how enterprises detect and respond to threats, but only if vendors can break down their walled gardens and create truly integrated ecosystems. In a recent episode of Security in 45, Cisco distinguished engineer Matt Robertson shares how Cisco XDR is taking an open, collaborative approach to threat detection and response—integrating not just Cisco&amp;rsquo;s own portfolio, but third-party and even competing vendors&amp;rsquo; solutions. This conversation reveals where the security industry is headed and what it means for your organization&amp;rsquo;s threat detection strategy.&lt;/p&gt;</description></item></channel></rss>