<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Xdr on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/xdr/</link><description>Recent content in Xdr on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/xdr/index.xml" rel="self" type="application/rss+xml"/><item><title>MITRE ATT&amp;CK Framework Explained: A Practical Guide for Security Teams</title><link>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-mitre-attck-framework-explained/</guid><description>&lt;p&gt;If you work in cybersecurity, you have almost certainly encountered references to MITRE ATT&amp;amp;CK. It appears in vendor dashboards, threat intelligence reports, incident response playbooks, and compliance frameworks. Yet many security practitioners interact with ATT&amp;amp;CK only superficially, treating it as a taxonomy they recognize but rarely use to drive decisions. That is a missed opportunity. The framework is one of the most powerful tools available to security teams for understanding how adversaries actually operate, and more importantly, for identifying where your defenses have gaps.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>XDR Integration: Cisco's Open Ecosystem Approach</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-conversation-with-briana-farro-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; # XDR Integration: Cisco's Open Ecosystem Approach
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where cyber threats have become increasingly sophisticated and fragmented across multiple security domains, organizations are struggling with tool sprawl, alert fatigue, and siloed security operations. &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt; has emerged as a critical evolution in how enterprises detect and respond to threats, but only if vendors can break down their walled gardens and create truly integrated ecosystems. In a recent episode of Security in 45, Cisco distinguished engineer Matt Robertson shares how Cisco XDR is taking an open, collaborative approach to threat detection and response—integrating not just Cisco&amp;rsquo;s own portfolio, but third-party and even competing vendors&amp;rsquo; solutions. This conversation reveals where the security industry is headed and what it means for your organization&amp;rsquo;s threat detection strategy.&lt;/p&gt;</description></item></channel></rss>