<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Siem on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/siem/</link><description>Recent content in Siem on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/siem/index.xml" rel="self" type="application/rss+xml"/><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Firepower Firewall Updates: Snort 3.0 and Network Security</title><link>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-whats-new-firepower-with-josh-scarbrough-and-seth-richardson/</guid><description>&lt;pre&gt;&lt;code&gt; As enterprise networks become increasingly complex and threats more sophisticated, the tools we use to defend them must evolve just as rapidly. Cisco's Firepower platform, combined with the latest innovations in intrusion prevention and cloud-native security, represents a significant leap forward in network defense capabilities. In this episode of Security in 45, Mike Veedock and Andres Sarmiento dive deep into Snort 3.0, cloud-based management, encrypted traffic visibility, and practical deployment strategies that are reshaping how organizations approach firewall modernization. Whether you're managing legacy [ASA](/pillars/firewall/) environments or scaling cloud infrastructure, the insights here will help you understand where Firepower fits in your security architecture.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Snort 3.0 Architecture&lt;/strong&gt; — Multi-threaded improvements and rule customization advances&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud FMC (Firepower Management Center)&lt;/strong&gt; — Cloud-based management without hardware overhead&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Analytics Engine&lt;/strong&gt; — Visibility into encrypted traffic without decryption&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SD-WAN Integration&lt;/strong&gt; — Dynamic failover and policy enforcement across distributed networks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS 1.3 Impact&lt;/strong&gt; — Challenges and opportunities in enforcing policy on modern encrypted handshakes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Deployment Options&lt;/strong&gt; — Cloud-native and cloud-ready Firepower architectures&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware Innovations&lt;/strong&gt; — NVIDIA partnerships and next-generation firewall performance&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dynamic Rule Variables&lt;/strong&gt; — Building flexible, scalable security policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ASA to Firepower Migration&lt;/strong&gt; — Strategies and tools for modernizing legacy platforms&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="snort-30-the-next-generation-of-intrusion-prevention"&gt;Snort 3.0: The Next Generation of Intrusion Prevention&lt;/h3&gt;
&lt;p&gt;Snort has been the industry standard for intrusion detection and prevention since before Cisco&amp;rsquo;s 2013 acquisition. With Snort 3.0, the architecture has been fundamentally reimagined to address the performance and flexibility demands of modern networks.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>XDR Integration: Cisco's Open Ecosystem Approach</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; # XDR Integration: Cisco's Open Ecosystem Approach
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where cyber threats have become increasingly sophisticated and fragmented across multiple security domains, organizations are struggling with tool sprawl, alert fatigue, and siloed security operations. &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt; has emerged as a critical evolution in how enterprises detect and respond to threats, but only if vendors can break down their walled gardens and create truly integrated ecosystems. In a recent episode of Security in 45, Cisco distinguished engineer Matt Robertson shares how Cisco XDR is taking an open, collaborative approach to threat detection and response—integrating not just Cisco&amp;rsquo;s own portfolio, but third-party and even competing vendors&amp;rsquo; solutions. This conversation reveals where the security industry is headed and what it means for your organization&amp;rsquo;s threat detection strategy.&lt;/p&gt;</description></item><item><title>Zero Trust Security Strategy: Expert Insights on Implementation</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; In an era where traditional perimeter-based security has become obsolete, organizations are racing to adopt a fundamentally different approach to protecting their digital assets. [Zero trust](/pillars/zero-trust/) security—a concept that's been around for over two decades—has finally moved from industry buzzword to business imperative, especially as remote work, cloud migration, and sophisticated threat actors have rendered castle-and-moat security architectures dangerously ineffective. But implementing zero trust isn't about buying a single product or flipping a switch; it's a strategic journey that requires careful planning, the right mix of technologies, and a commitment to continuous improvement. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore what zero trust really means, how to approach implementation, and the critical technologies that make it work in practice.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The origins and evolution of zero trust as an industry concept&lt;/li&gt;
&lt;li&gt;Why zero trust is fundamentally different from traditional security models&lt;/li&gt;
&lt;li&gt;The role of multi-factor authentication (MFA) in zero trust strategies&lt;/li&gt;
&lt;li&gt;Endpoint protection and network segmentation as core pillars&lt;/li&gt;
&lt;li&gt;Real-world examples of zero trust in consumer and enterprise contexts&lt;/li&gt;
&lt;li&gt;The importance of balancing security with user experience&lt;/li&gt;
&lt;li&gt;Why a multi-vendor approach is essential to comprehensive zero trust deployment&lt;/li&gt;
&lt;li&gt;Practical considerations for planning and implementing zero trust initiatives&lt;/li&gt;
&lt;li&gt;Common pitfalls and how to avoid rushing implementation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-beyond-the-buzzword"&gt;Understanding Zero Trust: Beyond the Buzzword&lt;/h3&gt;
&lt;p&gt;Zero trust isn&amp;rsquo;t a new invention—the concept emerged more than 20 years ago as security professionals recognized that the traditional model of &amp;ldquo;trust but verify&amp;rdquo; was fundamentally flawed. In a zero trust framework, the basic assumption is inverted: &lt;em&gt;nothing&lt;/em&gt; is trusted by default, whether it originates from inside or outside the network perimeter. Every access request, every user, every device, and every application must be verified and validated before granting access.&lt;/p&gt;</description></item></channel></rss>