<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Season-2 on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/season-2/</link><description>Recent content in Season-2 on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/season-2/index.xml" rel="self" type="application/rss+xml"/><item><title>Network Segmentation Strategy: Micro vs VLAN Approaches</title><link>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</link><pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; Network segmentation remains one of the most critical—yet surprisingly underutilized—pillars of enterprise security. As cyber threats grow more sophisticated and breach containment becomes a primary concern, organizations are discovering that a solid segmentation strategy can mean the difference between a localized incident and a company-wide catastrophe. But segmentation isn't one-size-fits-all; the debate between traditional VLAN-based approaches and modern micro-segmentation strategies has evolved considerably over the past decade, especially as cloud environments and dynamic workloads have fundamentally changed how we think about network boundaries.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The evolution of network segmentation strategies over the past ten years&lt;/li&gt;
&lt;li&gt;VLAN-based segmentation versus micro-segmentation approaches&lt;/li&gt;
&lt;li&gt;How group-based policy (GBP) enables more granular control than traditional VLAN segmentation&lt;/li&gt;
&lt;li&gt;Proactive versus reactive segmentation and their roles in Zero Trust architecture&lt;/li&gt;
&lt;li&gt;Enforcement mechanisms including VLANs, zone-based firewalls, and access control lists&lt;/li&gt;
&lt;li&gt;Cisco TrustSec and Security Group Tags (SGTs) as enforcement tools&lt;/li&gt;
&lt;li&gt;Cloud considerations and dynamic segmentation&lt;/li&gt;
&lt;li&gt;How Cisco solutions (ISE, Duo, Multi-Cloud Defense) integrate to support segmentation&lt;/li&gt;
&lt;li&gt;Designing segmentation to limit blast radius and contain breaches&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-evolution-of-network-segmentation"&gt;The Evolution of Network Segmentation&lt;/h3&gt;
&lt;p&gt;Ten years ago, network segmentation was relatively straightforward: you created VLANs, separated traffic by business function or department, and called it a day. Today&amp;rsquo;s threat landscape and infrastructure complexity have rendered that approach insufficient for serious security programs.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item></channel></rss>