<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Vulnerability-Management on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/vulnerability-management/</link><description>Recent content in Vulnerability-Management on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/vulnerability-management/index.xml" rel="self" type="application/rss+xml"/><item><title>AI Security Risks: How Cisco Secures Artificial Intelligence</title><link>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-security-artificial-intelligence-with-with-joel-sprague-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; Artificial intelligence has moved from science fiction to business reality, but organizations racing to adopt AI are discovering that innovation and security don't always move at the same pace. As AI systems become increasingly central to enterprise operations—from customer service automation to data analysis and decision-making—they're also becoming attractive targets for attackers and sources of unexpected vulnerabilities. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore the critical intersection of AI and security, discussing the emerging risks that come with AI adoption and how organizations can build and maintain secure AI systems. If you're responsible for enterprise security or infrastructure decisions, understanding these risks and mitigation strategies has moved from &amp;quot;nice to know&amp;quot; to essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;AI fundamentals and why adoption is accelerating&lt;/strong&gt; — understanding what AI actually is and why we&amp;rsquo;re seeing explosive growth in AI implementations right now&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The security dangers of AI systems&lt;/strong&gt; — examining real threats including data exposure, generation of inaccurate information, and attack vectors targeting AI systems&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s approach to AI security&lt;/strong&gt; — how Cisco is addressing these challenges through monitoring, testing, and secure design practices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Practical recommendations for AI users&lt;/strong&gt; — actionable guidance for organizations deploying AI in their environments&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ai-beyond-the-hype"&gt;Understanding AI: Beyond the Hype&lt;/h3&gt;
&lt;p&gt;To properly secure AI, we first need to understand what it actually is—and perhaps more importantly, what it isn&amp;rsquo;t. One of the most useful framings from this episode describes AI as &amp;ldquo;a fancy expensive autocomplete.&amp;rdquo; While this might sound reductive, it&amp;rsquo;s actually quite insightful.&lt;/p&gt;</description></item><item><title>Cloud Security Posture Management: AWS, Azure, GCP</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations accelerate their cloud migration strategies, the security complexity multiplies exponentially. With workloads distributed across AWS, Azure, and GCP—each with their own security models, compliance requirements, and configuration options—the traditional perimeter-based security approach no longer applies. Organizations are increasingly turning to [zero trust](/pillars/zero-trust/) principles to address these challenges. In this latest episode of Security in 45, hosts Mike Veedock and Andres Sarmiento tackle one of the most pressing challenges facing modern enterprises: how to maintain visibility and control over your cloud security posture as you scale across multiple providers.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The strategic and operational benefits of cloud migration&lt;/li&gt;
&lt;li&gt;Characteristics and differences between major cloud providers (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;Essential security controls for cloud environments (MFA, network segmentation, encryption)&lt;/li&gt;
&lt;li&gt;The critical role of Cloud Security Posture Management (CSPM) tools&lt;/li&gt;
&lt;li&gt;Common cloud security risks and threat landscapes&lt;/li&gt;
&lt;li&gt;Industry resources for deepening cloud security knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-business-case-for-cloud-migration"&gt;The Business Case for Cloud Migration&lt;/h3&gt;
&lt;p&gt;Cloud adoption has become less of a competitive advantage and more of a business necessity. Organizations are moving to the cloud not just for the &amp;ldquo;cool factor,&amp;rdquo; but for tangible, measurable benefits that directly impact the bottom line.&lt;/p&gt;</description></item><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Threat Intelligence 101: Cisco Talos Experts Explain</title><link>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-talos-with-martin-lee-and-joe-marshall/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, cyber attacks are evolving faster than most organizations can respond. From zero-day vulnerabilities to sophisticated multi-stage attacks, the gap between threat discovery and defense deployment has become a critical vulnerability in itself. That's where organizations like Cisco Talos come in—serving as an early warning system that turns raw threat data into actionable intelligence. Understanding what threat intelligence teams do and how to leverage their research is no longer optional for security-conscious enterprises; it's essential infrastructure.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The mission and core functions of Cisco Talos threat intelligence group&lt;/li&gt;
&lt;li&gt;How threat research translates into protection for enterprise networks&lt;/li&gt;
&lt;li&gt;The vulnerability management lifecycle and patch coordination&lt;/li&gt;
&lt;li&gt;Security advisories: their role in keeping organizations informed&lt;/li&gt;
&lt;li&gt;Incident response services and breach containment strategies&lt;/li&gt;
&lt;li&gt;The broader importance of threat intelligence in modern security operations&lt;/li&gt;
&lt;li&gt;How organizations can leverage threat intelligence in their own defense strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-talos-the-eyes-and-ears-of-the-security-community"&gt;Understanding Cisco Talos: The Eyes and Ears of the Security Community&lt;/h3&gt;
&lt;p&gt;Cisco Talos operates as a dedicated threat intelligence organization within one of the world&amp;rsquo;s largest networking and security companies. But their impact extends far beyond Cisco&amp;rsquo;s own customer base. Talos functions as a public-facing security research team that publishes findings, maintains threat databases, and contributes to the broader security community&amp;rsquo;s understanding of emerging threats.&lt;/p&gt;</description></item><item><title>Zero Trust Security: Beyond Products to Concepts</title><link>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</guid><description>&lt;pre&gt;&lt;code&gt; Zero Trust has become one of the most talked-about concepts in enterprise security, yet many organizations still struggle to understand what it actually means—and more importantly, how to implement it. If you think Zero Trust is just another security product you can buy off the shelf and deploy, you're missing the point entirely. In this episode, hosts Mike Veedock and Andres Sarmiento dive deep with industry experts to explore Zero Trust not as a destination, but as a foundational security philosophy that requires careful planning, the right mix of technologies, and a fundamental shift in how organizations approach access control.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust as a concept, not a product&lt;/strong&gt; — understanding why Zero Trust is an industry framework rather than a single solution you can purchase&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The 20+ year evolution&lt;/strong&gt; — how Zero Trust originated and why it&amp;rsquo;s more relevant today than ever&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world examples&lt;/strong&gt; — from everyday social media privacy settings to enterprise banking authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-factor authentication (MFA) as a cornerstone&lt;/strong&gt; — why passwords alone are no longer sufficient&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint protection and segmentation&lt;/strong&gt; — critical technologies in the Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The multi-vendor approach&lt;/strong&gt; — why comprehensive security requires coordinating multiple solutions&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation strategy&lt;/strong&gt; — the importance of careful planning, identifying priorities, and avoiding rushed deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Balancing security with usability&lt;/strong&gt; — maintaining user experience while strengthening defenses&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="zero-trust-concept-not-product"&gt;Zero Trust: Concept, Not Product&lt;/h3&gt;
&lt;p&gt;One of the most critical misconceptions in enterprise security is treating Zero Trust as a product—something you can procure from a single vendor and deploy to solve your security problems. The reality is quite different. &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;Zero Trust&lt;/a&gt; is an industry concept that has evolved over more than two decades and represents a fundamental shift in security philosophy.&lt;/p&gt;</description></item></channel></rss>