<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Incident-Response on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/incident-response/</link><description>Recent content in Incident-Response on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/incident-response/index.xml" rel="self" type="application/rss+xml"/><item><title>MITRE ATT&amp;CK Framework Explained: A Practical Guide for Security Teams</title><link>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</guid><description>&lt;p&gt;If you work in cybersecurity, you have almost certainly encountered references to MITRE ATT&amp;amp;CK. It appears in vendor dashboards, threat intelligence reports, incident response playbooks, and compliance frameworks. Yet many security practitioners interact with ATT&amp;amp;CK only superficially, treating it as a taxonomy they recognize but rarely use to drive decisions. That is a missed opportunity. The framework is one of the most powerful tools available to security teams for understanding how adversaries actually operate, and more importantly, for identifying where your defenses have gaps.&lt;/p&gt;</description></item><item><title>Network Segmentation Strategy: Micro vs VLAN Approaches</title><link>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</link><pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; Network segmentation remains one of the most critical—yet surprisingly underutilized—pillars of enterprise security. As cyber threats grow more sophisticated and breach containment becomes a primary concern, organizations are discovering that a solid segmentation strategy can mean the difference between a localized incident and a company-wide catastrophe. But segmentation isn't one-size-fits-all; the debate between traditional VLAN-based approaches and modern micro-segmentation strategies has evolved considerably over the past decade, especially as cloud environments and dynamic workloads have fundamentally changed how we think about network boundaries.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The evolution of network segmentation strategies over the past ten years&lt;/li&gt;
&lt;li&gt;VLAN-based segmentation versus micro-segmentation approaches&lt;/li&gt;
&lt;li&gt;How group-based policy (GBP) enables more granular control than traditional VLAN segmentation&lt;/li&gt;
&lt;li&gt;Proactive versus reactive segmentation and their roles in Zero Trust architecture&lt;/li&gt;
&lt;li&gt;Enforcement mechanisms including VLANs, zone-based firewalls, and access control lists&lt;/li&gt;
&lt;li&gt;Cisco TrustSec and Security Group Tags (SGTs) as enforcement tools&lt;/li&gt;
&lt;li&gt;Cloud considerations and dynamic segmentation&lt;/li&gt;
&lt;li&gt;How Cisco solutions (ISE, Duo, Multi-Cloud Defense) integrate to support segmentation&lt;/li&gt;
&lt;li&gt;Designing segmentation to limit blast radius and contain breaches&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-evolution-of-network-segmentation"&gt;The Evolution of Network Segmentation&lt;/h3&gt;
&lt;p&gt;Ten years ago, network segmentation was relatively straightforward: you created VLANs, separated traffic by business function or department, and called it a day. Today&amp;rsquo;s threat landscape and infrastructure complexity have rendered that approach insufficient for serious security programs.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>Threat Intelligence 101: Cisco Talos Experts Explain</title><link>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, cyber attacks are evolving faster than most organizations can respond. From zero-day vulnerabilities to sophisticated multi-stage attacks, the gap between threat discovery and defense deployment has become a critical vulnerability in itself. That's where organizations like Cisco Talos come in—serving as an early warning system that turns raw threat data into actionable intelligence. Understanding what threat intelligence teams do and how to leverage their research is no longer optional for security-conscious enterprises; it's essential infrastructure.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The mission and core functions of Cisco Talos threat intelligence group&lt;/li&gt;
&lt;li&gt;How threat research translates into protection for enterprise networks&lt;/li&gt;
&lt;li&gt;The vulnerability management lifecycle and patch coordination&lt;/li&gt;
&lt;li&gt;Security advisories: their role in keeping organizations informed&lt;/li&gt;
&lt;li&gt;Incident response services and breach containment strategies&lt;/li&gt;
&lt;li&gt;The broader importance of threat intelligence in modern security operations&lt;/li&gt;
&lt;li&gt;How organizations can leverage threat intelligence in their own defense strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-talos-the-eyes-and-ears-of-the-security-community"&gt;Understanding Cisco Talos: The Eyes and Ears of the Security Community&lt;/h3&gt;
&lt;p&gt;Cisco Talos operates as a dedicated threat intelligence organization within one of the world&amp;rsquo;s largest networking and security companies. But their impact extends far beyond Cisco&amp;rsquo;s own customer base. Talos functions as a public-facing security research team that publishes findings, maintains threat databases, and contributes to the broader security community&amp;rsquo;s understanding of emerging threats.&lt;/p&gt;</description></item></channel></rss>