<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cisco on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/cisco/</link><description>Recent content in Cisco on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/cisco/index.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ISE Configuration Guide: 802.1X, Profiling, and Secure Access</title><link>https://www.securityin45.com/blog/2026-03-30-cisco-ise-configuration-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-cisco-ise-configuration-guide/</guid><description>&lt;p&gt;Cisco Identity Services Engine (ISE) is the policy backbone of a &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; network. It answers the fundamental question: who and what is connecting to my network, and what should they be allowed to do? Whether you are enforcing 802.1X authentication on wired switch ports, wireless SSIDs, or VPN connections through a Cisco FTD firewall, ISE is the centralized policy decision point that ties it all together.&lt;/p&gt;
&lt;p&gt;This guide walks through a practical ISE deployment covering switch configuration, Windows supplicant setup, FMC/FTD integration for VPN, profiling basics, and the policy sets that make it all work. We assume ISE is already installed and licensed — this guide focuses on the configuration that matters.&lt;/p&gt;</description></item><item><title>MITRE ATT&amp;CK Framework Explained: A Practical Guide for Security Teams</title><link>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</guid><description>&lt;p&gt;If you work in cybersecurity, you have almost certainly encountered references to MITRE ATT&amp;amp;CK. It appears in vendor dashboards, threat intelligence reports, incident response playbooks, and compliance frameworks. Yet many security practitioners interact with ATT&amp;amp;CK only superficially, treating it as a taxonomy they recognize but rarely use to drive decisions. That is a missed opportunity. The framework is one of the most powerful tools available to security teams for understanding how adversaries actually operate, and more importantly, for identifying where your defenses have gaps.&lt;/p&gt;</description></item><item><title>SASE vs SSE vs ZTNA: Understanding the Key Differences</title><link>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</guid><description>&lt;p&gt;If you have spent any time evaluating modern security architectures, you have probably run into a wall of overlapping acronyms: SASE, SSE, ZTNA, SWG, CASB, DLP. Each vendor defines them slightly differently, analyst firms keep refining the categories, and the marketing noise makes it genuinely difficult to understand what you actually need to buy, build, or migrate toward.&lt;/p&gt;
&lt;p&gt;The confusion is not accidental. These frameworks evolved over several years as Gartner and other analysts tried to keep pace with how organizations were shifting from on-premises data centers to cloud-first, hybrid workforces. The result is a set of nested concepts that are easy to conflate but critical to distinguish when you are making architecture and procurement decisions.&lt;/p&gt;</description></item><item><title>Identity is the New Perimeter — How Attackers Bypass MFA in 2026</title><link>https://www.securityin45.com/blog/2026-03-27-identity-is-the-new-perimeter-how-attackers-bypass-mfa-in-2026/</link><pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-27-identity-is-the-new-perimeter-how-attackers-bypass-mfa-in-2026/</guid><description>&lt;p&gt;&lt;img src="https://www.securityin45.com/images/si45-s3e2-thumbnail.png" alt="Identity is the New Perimeter - Season 3 Episode 2"&gt;&lt;/p&gt;
&lt;p&gt;For years, the security industry built its defenses around the network perimeter — firewalls, VPNs, DMZs. But in 2026, that perimeter has fundamentally shifted. According to the latest Verizon DBIR and CrowdStrike Global Threat Report, identity-based attacks have officially overtaken email as the number one threat vector. Attackers are no longer trying to break through your &lt;a href="https://www.securityin45.com/pillars/firewall/"&gt;firewall&lt;/a&gt; — they are logging in with legitimate credentials. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento unpack why identity is the new perimeter, how modern attacks exploit &lt;a href="https://www.securityin45.com/glossary/"&gt;MFA&lt;/a&gt; weaknesses, and what organizations must do to defend themselves.&lt;/p&gt;</description></item><item><title>Network Segmentation Strategy: Micro vs VLAN Approaches</title><link>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</link><pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; Network segmentation remains one of the most critical—yet surprisingly underutilized—pillars of enterprise security. As cyber threats grow more sophisticated and breach containment becomes a primary concern, organizations are discovering that a solid segmentation strategy can mean the difference between a localized incident and a company-wide catastrophe. But segmentation isn't one-size-fits-all; the debate between traditional VLAN-based approaches and modern micro-segmentation strategies has evolved considerably over the past decade, especially as cloud environments and dynamic workloads have fundamentally changed how we think about network boundaries.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The evolution of network segmentation strategies over the past ten years&lt;/li&gt;
&lt;li&gt;VLAN-based segmentation versus micro-segmentation approaches&lt;/li&gt;
&lt;li&gt;How group-based policy (GBP) enables more granular control than traditional VLAN segmentation&lt;/li&gt;
&lt;li&gt;Proactive versus reactive segmentation and their roles in Zero Trust architecture&lt;/li&gt;
&lt;li&gt;Enforcement mechanisms including VLANs, zone-based firewalls, and access control lists&lt;/li&gt;
&lt;li&gt;Cisco TrustSec and Security Group Tags (SGTs) as enforcement tools&lt;/li&gt;
&lt;li&gt;Cloud considerations and dynamic segmentation&lt;/li&gt;
&lt;li&gt;How Cisco solutions (ISE, Duo, Multi-Cloud Defense) integrate to support segmentation&lt;/li&gt;
&lt;li&gt;Designing segmentation to limit blast radius and contain breaches&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-evolution-of-network-segmentation"&gt;The Evolution of Network Segmentation&lt;/h3&gt;
&lt;p&gt;Ten years ago, network segmentation was relatively straightforward: you created VLANs, separated traffic by business function or department, and called it a day. Today&amp;rsquo;s threat landscape and infrastructure complexity have rendered that approach insufficient for serious security programs.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item><item><title>AI Security Risks: How Cisco Secures Artificial Intelligence</title><link>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; Artificial intelligence has moved from science fiction to business reality, but organizations racing to adopt AI are discovering that innovation and security don't always move at the same pace. As AI systems become increasingly central to enterprise operations—from customer service automation to data analysis and decision-making—they're also becoming attractive targets for attackers and sources of unexpected vulnerabilities. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore the critical intersection of AI and security, discussing the emerging risks that come with AI adoption and how organizations can build and maintain secure AI systems. If you're responsible for enterprise security or infrastructure decisions, understanding these risks and mitigation strategies has moved from &amp;quot;nice to know&amp;quot; to essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;AI fundamentals and why adoption is accelerating&lt;/strong&gt; — understanding what AI actually is and why we&amp;rsquo;re seeing explosive growth in AI implementations right now&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The security dangers of AI systems&lt;/strong&gt; — examining real threats including data exposure, generation of inaccurate information, and attack vectors targeting AI systems&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s approach to AI security&lt;/strong&gt; — how Cisco is addressing these challenges through monitoring, testing, and secure design practices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Practical recommendations for AI users&lt;/strong&gt; — actionable guidance for organizations deploying AI in their environments&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ai-beyond-the-hype"&gt;Understanding AI: Beyond the Hype&lt;/h3&gt;
&lt;p&gt;To properly secure AI, we first need to understand what it actually is—and perhaps more importantly, what it isn&amp;rsquo;t. One of the most useful framings from this episode describes AI as &amp;ldquo;a fancy expensive autocomplete.&amp;rdquo; While this might sound reductive, it&amp;rsquo;s actually quite insightful.&lt;/p&gt;</description></item><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Firepower Firewall Updates: Snort 3.0 and Network Security</title><link>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</guid><description>&lt;pre&gt;&lt;code&gt; As enterprise networks become increasingly complex and threats more sophisticated, the tools we use to defend them must evolve just as rapidly. Cisco's Firepower platform, combined with the latest innovations in intrusion prevention and cloud-native security, represents a significant leap forward in network defense capabilities. In this episode of Security in 45, Mike Veedock and Andres Sarmiento dive deep into Snort 3.0, cloud-based management, encrypted traffic visibility, and practical deployment strategies that are reshaping how organizations approach firewall modernization. Whether you're managing legacy [ASA](/pillars/firewall/) environments or scaling cloud infrastructure, the insights here will help you understand where Firepower fits in your security architecture.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Snort 3.0 Architecture&lt;/strong&gt; — Multi-threaded improvements and rule customization advances&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud FMC (Firepower Management Center)&lt;/strong&gt; — Cloud-based management without hardware overhead&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Analytics Engine&lt;/strong&gt; — Visibility into encrypted traffic without decryption&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SD-WAN Integration&lt;/strong&gt; — Dynamic failover and policy enforcement across distributed networks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS 1.3 Impact&lt;/strong&gt; — Challenges and opportunities in enforcing policy on modern encrypted handshakes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Deployment Options&lt;/strong&gt; — Cloud-native and cloud-ready Firepower architectures&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware Innovations&lt;/strong&gt; — NVIDIA partnerships and next-generation firewall performance&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dynamic Rule Variables&lt;/strong&gt; — Building flexible, scalable security policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ASA to Firepower Migration&lt;/strong&gt; — Strategies and tools for modernizing legacy platforms&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="snort-30-the-next-generation-of-intrusion-prevention"&gt;Snort 3.0: The Next Generation of Intrusion Prevention&lt;/h3&gt;
&lt;p&gt;Snort has been the industry standard for intrusion detection and prevention since before Cisco&amp;rsquo;s 2013 acquisition. With Snort 3.0, the architecture has been fundamentally reimagined to address the performance and flexibility demands of modern networks.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>Threat Intelligence 101: Cisco Talos Experts Explain</title><link>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, cyber attacks are evolving faster than most organizations can respond. From zero-day vulnerabilities to sophisticated multi-stage attacks, the gap between threat discovery and defense deployment has become a critical vulnerability in itself. That's where organizations like Cisco Talos come in—serving as an early warning system that turns raw threat data into actionable intelligence. Understanding what threat intelligence teams do and how to leverage their research is no longer optional for security-conscious enterprises; it's essential infrastructure.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The mission and core functions of Cisco Talos threat intelligence group&lt;/li&gt;
&lt;li&gt;How threat research translates into protection for enterprise networks&lt;/li&gt;
&lt;li&gt;The vulnerability management lifecycle and patch coordination&lt;/li&gt;
&lt;li&gt;Security advisories: their role in keeping organizations informed&lt;/li&gt;
&lt;li&gt;Incident response services and breach containment strategies&lt;/li&gt;
&lt;li&gt;The broader importance of threat intelligence in modern security operations&lt;/li&gt;
&lt;li&gt;How organizations can leverage threat intelligence in their own defense strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-talos-the-eyes-and-ears-of-the-security-community"&gt;Understanding Cisco Talos: The Eyes and Ears of the Security Community&lt;/h3&gt;
&lt;p&gt;Cisco Talos operates as a dedicated threat intelligence organization within one of the world&amp;rsquo;s largest networking and security companies. But their impact extends far beyond Cisco&amp;rsquo;s own customer base. Talos functions as a public-facing security research team that publishes findings, maintains threat databases, and contributes to the broader security community&amp;rsquo;s understanding of emerging threats.&lt;/p&gt;</description></item><item><title>XDR Integration: Cisco's Open Ecosystem Approach</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; # XDR Integration: Cisco's Open Ecosystem Approach
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where cyber threats have become increasingly sophisticated and fragmented across multiple security domains, organizations are struggling with tool sprawl, alert fatigue, and siloed security operations. &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt; has emerged as a critical evolution in how enterprises detect and respond to threats, but only if vendors can break down their walled gardens and create truly integrated ecosystems. In a recent episode of Security in 45, Cisco distinguished engineer Matt Robertson shares how Cisco XDR is taking an open, collaborative approach to threat detection and response—integrating not just Cisco&amp;rsquo;s own portfolio, but third-party and even competing vendors&amp;rsquo; solutions. This conversation reveals where the security industry is headed and what it means for your organization&amp;rsquo;s threat detection strategy.&lt;/p&gt;</description></item><item><title>Zero Trust Identity Management with Cisco ISE</title><link>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, traditional perimeter-based security is no longer sufficient—attackers are already inside your network, and trust is no longer a default setting. Identity and Access Management (IAM) has evolved from a compliance checkbox into a critical security control, with [Zero Trust](/pillars/zero-trust/) architecture now representing the gold standard for enterprise access governance. Cisco's Identity Services Engine (ISE) addresses this shift head-on, providing the centralized intelligence and policy enforcement needed to authenticate and authorize every access request, regardless of where it originates. For IT leaders and security practitioners grappling with increasingly complex hybrid and cloud environments, understanding how modern IAM solutions like ISE can enforce Zero Trust principles is no longer optional—it's essential to survival.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Centralized Access Control and Policy Enforcement&lt;/strong&gt; — How ISE enables administrators to define granular, context-aware access policies based on user identity, device type, and other security attributes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Architecture&lt;/strong&gt; — The shift from implicit trust to explicit verification for every access request, and how ISE operationalizes this model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Visibility and Device Profiling&lt;/strong&gt; — Gaining real-time insight into all connected devices and using that data to segment and control network access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.securityin45.com/glossary/"&gt;Multi-Factor Authentication&lt;/a&gt; Integration&lt;/strong&gt; — Layering identity verification to reduce the risk of compromised credentials&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ecosystem Integration&lt;/strong&gt; — How ISE works alongside other Cisco security solutions to create a cohesive security fabric&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="centralized-access-control-and-policy-enforcement"&gt;Centralized Access Control and Policy Enforcement&lt;/h3&gt;
&lt;p&gt;At its core, IAM is about answering a simple but critical question: &lt;em&gt;Who should be allowed to access what, and under what conditions?&lt;/em&gt; Cisco ISE provides a centralized platform for defining and enforcing the answer to that question across your entire network.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item></channel></rss>