<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Automation on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/automation/</link><description>Recent content in Automation on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/automation/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero Trust Architecture: Real-World Examples &amp; Implementation</title><link>https://www.securityin45.com/blog/2026-02-09-zero-trust-in-the-real-world/</link><pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-02-09-zero-trust-in-the-real-world/</guid><description>&lt;pre&gt;&lt;code&gt; Perimeter security is dead. The network boundary that once defined our security strategy has dissolved into cloud services, remote work, and distributed infrastructure. [Zero Trust](/pillars/zero-trust/) Architecture represents a fundamental shift in how we think about access control and threat prevention—one where no user, device, or application is trusted by default, regardless of whether they're inside or outside the traditional network edge. In this episode, Mike and Andres explore real-world examples and practical implementation strategies that show what Zero Trust actually looks like when deployed at scale. If you're still relying on the assumption that &amp;quot;inside the firewall = safe,&amp;quot; this conversation is essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust fundamentals&lt;/strong&gt;: Moving from perimeter-based security to a &amp;ldquo;never trust, always verify&amp;rdquo; model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Architectural components&lt;/strong&gt;: Practical elements like micro-segmentation, identity verification, and continuous authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world deployment examples&lt;/strong&gt;: How organizations like Google implement Zero Trust at enterprise scale&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Key architectural principles&lt;/strong&gt;: Understanding trust boundaries, protected surfaces, and shifting security controls&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Government &amp;amp; regulatory perspective&lt;/strong&gt;: CISA guidance and public sector Zero Trust adoption strategies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation pathways&lt;/strong&gt;: Actionable steps for teams beginning their Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common misconceptions&lt;/strong&gt;: Why Zero Trust isn&amp;rsquo;t just a technology, but a mindset shift&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-architecture-beyond-the-perimeter"&gt;Understanding Zero Trust Architecture: Beyond the Perimeter&lt;/h3&gt;
&lt;p&gt;For decades, network security operated on a castle-and-moat model. You built a strong perimeter, and everything inside was assumed safe. Zero Trust completely inverts this assumption. Rather than creating a fortress around your network, Zero Trust assumes breach is inevitable and designs security controls accordingly.&lt;/p&gt;</description></item><item><title>Network Segmentation Strategy: Micro vs VLAN Approaches</title><link>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</link><pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; Network segmentation remains one of the most critical—yet surprisingly underutilized—pillars of enterprise security. As cyber threats grow more sophisticated and breach containment becomes a primary concern, organizations are discovering that a solid segmentation strategy can mean the difference between a localized incident and a company-wide catastrophe. But segmentation isn't one-size-fits-all; the debate between traditional VLAN-based approaches and modern micro-segmentation strategies has evolved considerably over the past decade, especially as cloud environments and dynamic workloads have fundamentally changed how we think about network boundaries.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The evolution of network segmentation strategies over the past ten years&lt;/li&gt;
&lt;li&gt;VLAN-based segmentation versus micro-segmentation approaches&lt;/li&gt;
&lt;li&gt;How group-based policy (GBP) enables more granular control than traditional VLAN segmentation&lt;/li&gt;
&lt;li&gt;Proactive versus reactive segmentation and their roles in Zero Trust architecture&lt;/li&gt;
&lt;li&gt;Enforcement mechanisms including VLANs, zone-based firewalls, and access control lists&lt;/li&gt;
&lt;li&gt;Cisco TrustSec and Security Group Tags (SGTs) as enforcement tools&lt;/li&gt;
&lt;li&gt;Cloud considerations and dynamic segmentation&lt;/li&gt;
&lt;li&gt;How Cisco solutions (ISE, Duo, Multi-Cloud Defense) integrate to support segmentation&lt;/li&gt;
&lt;li&gt;Designing segmentation to limit blast radius and contain breaches&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-evolution-of-network-segmentation"&gt;The Evolution of Network Segmentation&lt;/h3&gt;
&lt;p&gt;Ten years ago, network segmentation was relatively straightforward: you created VLANs, separated traffic by business function or department, and called it a day. Today&amp;rsquo;s threat landscape and infrastructure complexity have rendered that approach insufficient for serious security programs.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item><item><title>AI Security Risks: How Cisco Secures Artificial Intelligence</title><link>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; Artificial intelligence has moved from science fiction to business reality, but organizations racing to adopt AI are discovering that innovation and security don't always move at the same pace. As AI systems become increasingly central to enterprise operations—from customer service automation to data analysis and decision-making—they're also becoming attractive targets for attackers and sources of unexpected vulnerabilities. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore the critical intersection of AI and security, discussing the emerging risks that come with AI adoption and how organizations can build and maintain secure AI systems. If you're responsible for enterprise security or infrastructure decisions, understanding these risks and mitigation strategies has moved from &amp;quot;nice to know&amp;quot; to essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;AI fundamentals and why adoption is accelerating&lt;/strong&gt; — understanding what AI actually is and why we&amp;rsquo;re seeing explosive growth in AI implementations right now&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The security dangers of AI systems&lt;/strong&gt; — examining real threats including data exposure, generation of inaccurate information, and attack vectors targeting AI systems&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s approach to AI security&lt;/strong&gt; — how Cisco is addressing these challenges through monitoring, testing, and secure design practices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Practical recommendations for AI users&lt;/strong&gt; — actionable guidance for organizations deploying AI in their environments&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ai-beyond-the-hype"&gt;Understanding AI: Beyond the Hype&lt;/h3&gt;
&lt;p&gt;To properly secure AI, we first need to understand what it actually is—and perhaps more importantly, what it isn&amp;rsquo;t. One of the most useful framings from this episode describes AI as &amp;ldquo;a fancy expensive autocomplete.&amp;rdquo; While this might sound reductive, it&amp;rsquo;s actually quite insightful.&lt;/p&gt;</description></item><item><title>Cloud Security Posture Management: AWS, Azure, GCP</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations accelerate their cloud migration strategies, the security complexity multiplies exponentially. With workloads distributed across AWS, Azure, and GCP—each with their own security models, compliance requirements, and configuration options—the traditional perimeter-based security approach no longer applies. Organizations are increasingly turning to [zero trust](/pillars/zero-trust/) principles to address these challenges. In this latest episode of Security in 45, hosts Mike Veedock and Andres Sarmiento tackle one of the most pressing challenges facing modern enterprises: how to maintain visibility and control over your cloud security posture as you scale across multiple providers.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The strategic and operational benefits of cloud migration&lt;/li&gt;
&lt;li&gt;Characteristics and differences between major cloud providers (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;Essential security controls for cloud environments (MFA, network segmentation, encryption)&lt;/li&gt;
&lt;li&gt;The critical role of Cloud Security Posture Management (CSPM) tools&lt;/li&gt;
&lt;li&gt;Common cloud security risks and threat landscapes&lt;/li&gt;
&lt;li&gt;Industry resources for deepening cloud security knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-business-case-for-cloud-migration"&gt;The Business Case for Cloud Migration&lt;/h3&gt;
&lt;p&gt;Cloud adoption has become less of a competitive advantage and more of a business necessity. Organizations are moving to the cloud not just for the &amp;ldquo;cool factor,&amp;rdquo; but for tangible, measurable benefits that directly impact the bottom line.&lt;/p&gt;</description></item><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Firepower Firewall Updates: Snort 3.0 and Network Security</title><link>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</guid><description>&lt;pre&gt;&lt;code&gt; As enterprise networks become increasingly complex and threats more sophisticated, the tools we use to defend them must evolve just as rapidly. Cisco's Firepower platform, combined with the latest innovations in intrusion prevention and cloud-native security, represents a significant leap forward in network defense capabilities. In this episode of Security in 45, Mike Veedock and Andres Sarmiento dive deep into Snort 3.0, cloud-based management, encrypted traffic visibility, and practical deployment strategies that are reshaping how organizations approach firewall modernization. Whether you're managing legacy [ASA](/pillars/firewall/) environments or scaling cloud infrastructure, the insights here will help you understand where Firepower fits in your security architecture.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Snort 3.0 Architecture&lt;/strong&gt; — Multi-threaded improvements and rule customization advances&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud FMC (Firepower Management Center)&lt;/strong&gt; — Cloud-based management without hardware overhead&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Analytics Engine&lt;/strong&gt; — Visibility into encrypted traffic without decryption&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SD-WAN Integration&lt;/strong&gt; — Dynamic failover and policy enforcement across distributed networks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS 1.3 Impact&lt;/strong&gt; — Challenges and opportunities in enforcing policy on modern encrypted handshakes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Deployment Options&lt;/strong&gt; — Cloud-native and cloud-ready Firepower architectures&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware Innovations&lt;/strong&gt; — NVIDIA partnerships and next-generation firewall performance&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dynamic Rule Variables&lt;/strong&gt; — Building flexible, scalable security policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ASA to Firepower Migration&lt;/strong&gt; — Strategies and tools for modernizing legacy platforms&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="snort-30-the-next-generation-of-intrusion-prevention"&gt;Snort 3.0: The Next Generation of Intrusion Prevention&lt;/h3&gt;
&lt;p&gt;Snort has been the industry standard for intrusion detection and prevention since before Cisco&amp;rsquo;s 2013 acquisition. With Snort 3.0, the architecture has been fundamentally reimagined to address the performance and flexibility demands of modern networks.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>XDR Integration: Cisco's Open Ecosystem Approach</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; # XDR Integration: Cisco's Open Ecosystem Approach
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where cyber threats have become increasingly sophisticated and fragmented across multiple security domains, organizations are struggling with tool sprawl, alert fatigue, and siloed security operations. &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt; has emerged as a critical evolution in how enterprises detect and respond to threats, but only if vendors can break down their walled gardens and create truly integrated ecosystems. In a recent episode of Security in 45, Cisco distinguished engineer Matt Robertson shares how Cisco XDR is taking an open, collaborative approach to threat detection and response—integrating not just Cisco&amp;rsquo;s own portfolio, but third-party and even competing vendors&amp;rsquo; solutions. This conversation reveals where the security industry is headed and what it means for your organization&amp;rsquo;s threat detection strategy.&lt;/p&gt;</description></item><item><title>Zero Trust Identity Management with Cisco ISE</title><link>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, traditional perimeter-based security is no longer sufficient—attackers are already inside your network, and trust is no longer a default setting. Identity and Access Management (IAM) has evolved from a compliance checkbox into a critical security control, with [Zero Trust](/pillars/zero-trust/) architecture now representing the gold standard for enterprise access governance. Cisco's Identity Services Engine (ISE) addresses this shift head-on, providing the centralized intelligence and policy enforcement needed to authenticate and authorize every access request, regardless of where it originates. For IT leaders and security practitioners grappling with increasingly complex hybrid and cloud environments, understanding how modern IAM solutions like ISE can enforce Zero Trust principles is no longer optional—it's essential to survival.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Centralized Access Control and Policy Enforcement&lt;/strong&gt; — How ISE enables administrators to define granular, context-aware access policies based on user identity, device type, and other security attributes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Architecture&lt;/strong&gt; — The shift from implicit trust to explicit verification for every access request, and how ISE operationalizes this model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Visibility and Device Profiling&lt;/strong&gt; — Gaining real-time insight into all connected devices and using that data to segment and control network access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.securityin45.com/glossary/"&gt;Multi-Factor Authentication&lt;/a&gt; Integration&lt;/strong&gt; — Layering identity verification to reduce the risk of compromised credentials&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ecosystem Integration&lt;/strong&gt; — How ISE works alongside other Cisco security solutions to create a cohesive security fabric&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="centralized-access-control-and-policy-enforcement"&gt;Centralized Access Control and Policy Enforcement&lt;/h3&gt;
&lt;p&gt;At its core, IAM is about answering a simple but critical question: &lt;em&gt;Who should be allowed to access what, and under what conditions?&lt;/em&gt; Cisco ISE provides a centralized platform for defining and enforcing the answer to that question across your entire network.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item><item><title>Zero Trust Security Strategy: Expert Insights on Implementation</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; In an era where traditional perimeter-based security has become obsolete, organizations are racing to adopt a fundamentally different approach to protecting their digital assets. [Zero trust](/pillars/zero-trust/) security—a concept that's been around for over two decades—has finally moved from industry buzzword to business imperative, especially as remote work, cloud migration, and sophisticated threat actors have rendered castle-and-moat security architectures dangerously ineffective. But implementing zero trust isn't about buying a single product or flipping a switch; it's a strategic journey that requires careful planning, the right mix of technologies, and a commitment to continuous improvement. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore what zero trust really means, how to approach implementation, and the critical technologies that make it work in practice.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The origins and evolution of zero trust as an industry concept&lt;/li&gt;
&lt;li&gt;Why zero trust is fundamentally different from traditional security models&lt;/li&gt;
&lt;li&gt;The role of multi-factor authentication (MFA) in zero trust strategies&lt;/li&gt;
&lt;li&gt;Endpoint protection and network segmentation as core pillars&lt;/li&gt;
&lt;li&gt;Real-world examples of zero trust in consumer and enterprise contexts&lt;/li&gt;
&lt;li&gt;The importance of balancing security with user experience&lt;/li&gt;
&lt;li&gt;Why a multi-vendor approach is essential to comprehensive zero trust deployment&lt;/li&gt;
&lt;li&gt;Practical considerations for planning and implementing zero trust initiatives&lt;/li&gt;
&lt;li&gt;Common pitfalls and how to avoid rushing implementation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-beyond-the-buzzword"&gt;Understanding Zero Trust: Beyond the Buzzword&lt;/h3&gt;
&lt;p&gt;Zero trust isn&amp;rsquo;t a new invention—the concept emerged more than 20 years ago as security professionals recognized that the traditional model of &amp;ldquo;trust but verify&amp;rdquo; was fundamentally flawed. In a zero trust framework, the basic assumption is inverted: &lt;em&gt;nothing&lt;/em&gt; is trusted by default, whether it originates from inside or outside the network perimeter. Every access request, every user, every device, and every application must be verified and validated before granting access.&lt;/p&gt;</description></item><item><title>Zero Trust Security: Beyond Products to Concepts</title><link>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</guid><description>&lt;pre&gt;&lt;code&gt; Zero Trust has become one of the most talked-about concepts in enterprise security, yet many organizations still struggle to understand what it actually means—and more importantly, how to implement it. If you think Zero Trust is just another security product you can buy off the shelf and deploy, you're missing the point entirely. In this episode, hosts Mike Veedock and Andres Sarmiento dive deep with industry experts to explore Zero Trust not as a destination, but as a foundational security philosophy that requires careful planning, the right mix of technologies, and a fundamental shift in how organizations approach access control.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust as a concept, not a product&lt;/strong&gt; — understanding why Zero Trust is an industry framework rather than a single solution you can purchase&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The 20+ year evolution&lt;/strong&gt; — how Zero Trust originated and why it&amp;rsquo;s more relevant today than ever&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world examples&lt;/strong&gt; — from everyday social media privacy settings to enterprise banking authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-factor authentication (MFA) as a cornerstone&lt;/strong&gt; — why passwords alone are no longer sufficient&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint protection and segmentation&lt;/strong&gt; — critical technologies in the Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The multi-vendor approach&lt;/strong&gt; — why comprehensive security requires coordinating multiple solutions&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation strategy&lt;/strong&gt; — the importance of careful planning, identifying priorities, and avoiding rushed deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Balancing security with usability&lt;/strong&gt; — maintaining user experience while strengthening defenses&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="zero-trust-concept-not-product"&gt;Zero Trust: Concept, Not Product&lt;/h3&gt;
&lt;p&gt;One of the most critical misconceptions in enterprise security is treating Zero Trust as a product—something you can procure from a single vendor and deploy to solve your security problems. The reality is quite different. &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;Zero Trust&lt;/a&gt; is an industry concept that has evolved over more than two decades and represents a fundamental shift in security philosophy.&lt;/p&gt;</description></item></channel></rss>