<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cloud-Security on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/cloud-security/</link><description>Recent content in Cloud-Security on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/cloud-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloud Security Posture Management: AWS, Azure, GCP</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations accelerate their cloud migration strategies, the security complexity multiplies exponentially. With workloads distributed across AWS, Azure, and GCP—each with their own security models, compliance requirements, and configuration options—the traditional perimeter-based security approach no longer applies. Organizations are increasingly turning to [zero trust](/pillars/zero-trust/) principles to address these challenges. In this latest episode of Security in 45, hosts Mike Veedock and Andres Sarmiento tackle one of the most pressing challenges facing modern enterprises: how to maintain visibility and control over your cloud security posture as you scale across multiple providers.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The strategic and operational benefits of cloud migration&lt;/li&gt;
&lt;li&gt;Characteristics and differences between major cloud providers (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;Essential security controls for cloud environments (MFA, network segmentation, encryption)&lt;/li&gt;
&lt;li&gt;The critical role of Cloud Security Posture Management (CSPM) tools&lt;/li&gt;
&lt;li&gt;Common cloud security risks and threat landscapes&lt;/li&gt;
&lt;li&gt;Industry resources for deepening cloud security knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-business-case-for-cloud-migration"&gt;The Business Case for Cloud Migration&lt;/h3&gt;
&lt;p&gt;Cloud adoption has become less of a competitive advantage and more of a business necessity. Organizations are moving to the cloud not just for the &amp;ldquo;cool factor,&amp;rdquo; but for tangible, measurable benefits that directly impact the bottom line.&lt;/p&gt;</description></item><item><title>Firepower Firewall Updates: Snort 3.0 and Network Security</title><link>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</guid><description>&lt;pre&gt;&lt;code&gt; As enterprise networks become increasingly complex and threats more sophisticated, the tools we use to defend them must evolve just as rapidly. Cisco's Firepower platform, combined with the latest innovations in intrusion prevention and cloud-native security, represents a significant leap forward in network defense capabilities. In this episode of Security in 45, Mike Veedock and Andres Sarmiento dive deep into Snort 3.0, cloud-based management, encrypted traffic visibility, and practical deployment strategies that are reshaping how organizations approach firewall modernization. Whether you're managing legacy [ASA](/pillars/firewall/) environments or scaling cloud infrastructure, the insights here will help you understand where Firepower fits in your security architecture.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Snort 3.0 Architecture&lt;/strong&gt; — Multi-threaded improvements and rule customization advances&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud FMC (Firepower Management Center)&lt;/strong&gt; — Cloud-based management without hardware overhead&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Analytics Engine&lt;/strong&gt; — Visibility into encrypted traffic without decryption&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SD-WAN Integration&lt;/strong&gt; — Dynamic failover and policy enforcement across distributed networks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS 1.3 Impact&lt;/strong&gt; — Challenges and opportunities in enforcing policy on modern encrypted handshakes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Deployment Options&lt;/strong&gt; — Cloud-native and cloud-ready Firepower architectures&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware Innovations&lt;/strong&gt; — NVIDIA partnerships and next-generation firewall performance&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dynamic Rule Variables&lt;/strong&gt; — Building flexible, scalable security policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ASA to Firepower Migration&lt;/strong&gt; — Strategies and tools for modernizing legacy platforms&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="snort-30-the-next-generation-of-intrusion-prevention"&gt;Snort 3.0: The Next Generation of Intrusion Prevention&lt;/h3&gt;
&lt;p&gt;Snort has been the industry standard for intrusion detection and prevention since before Cisco&amp;rsquo;s 2013 acquisition. With Snort 3.0, the architecture has been fundamentally reimagined to address the performance and flexibility demands of modern networks.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item><item><title>Zero Trust Security: Beyond Products to Concepts</title><link>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</guid><description>&lt;pre&gt;&lt;code&gt; Zero Trust has become one of the most talked-about concepts in enterprise security, yet many organizations still struggle to understand what it actually means—and more importantly, how to implement it. If you think Zero Trust is just another security product you can buy off the shelf and deploy, you're missing the point entirely. In this episode, hosts Mike Veedock and Andres Sarmiento dive deep with industry experts to explore Zero Trust not as a destination, but as a foundational security philosophy that requires careful planning, the right mix of technologies, and a fundamental shift in how organizations approach access control.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust as a concept, not a product&lt;/strong&gt; — understanding why Zero Trust is an industry framework rather than a single solution you can purchase&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The 20+ year evolution&lt;/strong&gt; — how Zero Trust originated and why it&amp;rsquo;s more relevant today than ever&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world examples&lt;/strong&gt; — from everyday social media privacy settings to enterprise banking authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-factor authentication (MFA) as a cornerstone&lt;/strong&gt; — why passwords alone are no longer sufficient&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint protection and segmentation&lt;/strong&gt; — critical technologies in the Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The multi-vendor approach&lt;/strong&gt; — why comprehensive security requires coordinating multiple solutions&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation strategy&lt;/strong&gt; — the importance of careful planning, identifying priorities, and avoiding rushed deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Balancing security with usability&lt;/strong&gt; — maintaining user experience while strengthening defenses&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="zero-trust-concept-not-product"&gt;Zero Trust: Concept, Not Product&lt;/h3&gt;
&lt;p&gt;One of the most critical misconceptions in enterprise security is treating Zero Trust as a product—something you can procure from a single vendor and deploy to solve your security problems. The reality is quite different. &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;Zero Trust&lt;/a&gt; is an industry concept that has evolved over more than two decades and represents a fundamental shift in security philosophy.&lt;/p&gt;</description></item></channel></rss>