FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Integrating With Cisco XDR at Black Hat Europe

By: Jessica (Bair) Oppenheimer β€” February 9th 2026 at 13:00
Investigating indicators of compromise (IOCs) requires a unified view of security data. See how we integrated Cisco XDR with third-party tools and open-source models at Black Hat Europe.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe: Enhancing Security Operations With Cisco XDR and Foundation-sec-8b-Instruct LLM

By: Piotr Jarzynka β€” February 9th 2026 at 13:00
Manual triage often slows down incident response. Learn how we integrated an 8-billion parameter security LLM into Cisco XDR to summarize alerts and trace attack paths in real time.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe 2025: A Decade of Cisco Security Cloud Innovation

By: Jessica (Bair) Oppenheimer β€” February 9th 2026 at 13:00
Building a secure network for thousands of cybersecurity experts in just three days requires intense collaboration. Discover the hardware, software, and engineering behind the Black Hat Europe NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe 2025: Firepower IDS Flags Unwanted P2P on Rented Gear

By: Rene Straube β€” February 9th 2026 at 13:00
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
☐ β˜† βœ‡ Security – Cisco Blog

Securing DNS With Secure Access at Black Hat Europe

By: Rob DeCooman β€” February 9th 2026 at 13:00
For a decade, Cisco has secured Black Hat events with DNS security. Learn how the evolution to Cisco Secure Access provided visibility into 66 million queries and 6,000 unique apps in London.
☐ β˜† βœ‡ Security – Cisco Blog

Lessons Learned from Securing the World’s Largest Cyber Events

By: Jessica (Bair) Oppenheimer β€” February 6th 2026 at 13:00
Announcing the launch of the Cisco Event SOCs website and the release of our comprehensive Reference Architecture & Operations Guide.
☐ β˜† βœ‡ Security – Cisco Blog

Introducing Intent-Based Policy Management for Cisco Hybrid Mesh Firewall

By: Murali Rathinasamy β€” January 22nd 2026 at 13:00
Hybrid Mesh Firewall introduces intent-based policy management across multi-vendor firewalls through Cisco Security Cloud Control with Mesh Policy Engine.
☐ β˜† βœ‡ Security – Cisco Blog

Engaging Cisco Talos Incident Response is just the beginning

By: Yuri Kramarz β€” January 20th 2026 at 13:00
Cisco Talos Incident Response Retainer provides expert, proactive, and reactive cybersecurity support to quickly contain threats and strengthen defenses.
☐ β˜† βœ‡ Security – Cisco Blog

Three Benefits of Segmentation

By: Aamer Akhter β€” January 8th 2026 at 13:00
The successful implementation of segmentation enables organizations to contain breaches, protect high-value assets, and meet compliance requirements.
☐ β˜† βœ‡ Security – Cisco Blog

Why your organization needs a Cisco Talos Incident Response Retainer

By: Yuri Kramarz β€” January 6th 2026 at 13:00
Every day, new ransomware and data breaches dominate the headlines, reminding us that it’s a matter of when, not if, your organization may be next. Having a well-prepared response plan and a team of forensic professionals ready to act at a moment’s notice can mean a world of difference between swift incident recovery or a […]
☐ β˜† βœ‡ Security – Cisco Blog

Key Challenges that Impede Segmentation Progress

By: Aamer Akhter β€” December 16th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that complexity, visibility, and context remain the main challenges for successful segmentation implementations.
☐ β˜† βœ‡ Security – Cisco Blog

A Newbie’s Perspective: From Curiosity to Confidence, My SOC Story

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 22:32
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.
☐ β˜† βœ‡ Security – Cisco Blog

Have You Seen My Domain Controller?

By: Duane Waddle β€” December 12th 2025 at 16:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action: From SPL to PCAP

By: Brendan Kuang β€” December 12th 2025 at 13:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne 2025 SOC

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 13:00
Cisco Security and Splunk protected Cisco Live Melbourne 2025 in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS

By: Hanna Jabbour β€” December 12th 2025 at 13:00
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
☐ β˜† βœ‡ Security – Cisco Blog

The Segmentation Cycle: A Practical Approach to Network Security

By: Mark Stephens β€” December 11th 2025 at 13:00
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
☐ β˜† βœ‡ Security – Cisco Blog

Segmentation Remains a Foundational Security Concept

By: Aamer Akhter β€” December 4th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it a foundational cornerstone for modern enterprise security strategies.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare 2025 Security Operations Centre

By: Jessica (Bair) Oppenheimer β€” December 3rd 2025 at 06:03
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
☐ β˜† βœ‡ Security – Cisco Blog

Unmasking Attacks With Cisco XDR at the GovWare SOC

By: Robin Wei β€” December 2nd 2025 at 08:00
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare Captive Portal: (Splash Page)

By: Ryan Maclennan β€” December 2nd 2025 at 08:00
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
☐ β˜† βœ‡ Security – Cisco Blog

A Glimpse Into Cisco Mobile Infrastructure Security Developments

By: Oussama Naffati β€” November 24th 2025 at 13:00
See how Cisco is helping mobile operators improve visibility, protect traffic at high speed, and keep security consistent from core to edge.
☐ β˜† βœ‡ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson β€” November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ β˜† βœ‡ Security – Cisco Blog

Empower AI Innovation: On-Demand AI Data Center Access With Cisco SD-WAN

By: Vipul Shah β€” November 4th 2025 at 13:00
AI has transformed everyday experiencesβ€”from your phone instantly translating a foreign language to your smart assistant finding the fastest route home. Just as these devices connect you to the world in a split second, businesses now require on-demand, high-performance access to a rapidly expanding global AI ecosystem. This seamless, real-time connectivity is becoming the new […]
☐ β˜† βœ‡ Security – Cisco Blog

SE Labs Names Cisco Secure Firewall Best Enterprise NGFW 2025

By: Pramod Chandrashekar β€” October 29th 2025 at 12:00
Cisco Secure Firewall wins SE Labs’ 2025 Best NGFW award β€” the first ever to earn dual AAA ratings for both protection and performance. Zero breaches, Zero compromises.
☐ β˜† βœ‡ Security – Cisco Blog

SSE That Thinks in Identity and Adapts Access

By: Jeff Scheaffer β€” October 24th 2025 at 12:00
Identity doesn’t stay still. Trust shifts. Behavior fluctuates. Posture changes. Cisco Secure Access leverages rich data from identity, behaviors, and devices.
☐ β˜† βœ‡ Security – Cisco Blog

2025 Cisco Segmentation Report Sheds Light on Evolving Technology

By: Aamer Akhter β€” October 23rd 2025 at 12:00
A new report from Cisco shows that segmentation is a foundational security technology, but few are fully implementing both macro- and micro-segmentation today.
☐ β˜† βœ‡ Security – Cisco Blog

Common Threat Themes: Defending Against Lateral Movement (Part 1)

By: Jason Maynard β€” October 15th 2025 at 12:00
Discover why lateral movement is a key tactic in cyber breaches and how defenders can strengthen security by focusing on this critical threat vector.
☐ β˜† βœ‡ Security – Cisco Blog

Defining a Standard Taxonomy for Segmentation

By: Aamer Akhter β€” October 7th 2025 at 12:00
We need a standardized taxonomy so organizations can evaluate, implement and manage segmentation projects most effectively.
☐ β˜† βœ‡ Security – Cisco Blog

Racing Against Threats: How Cisco Security Powers McLaren’s F1 Prowess

By: Gurdeep Gill β€” October 6th 2025 at 12:00
Discover how Cisco helps McLaren protect data and stay fast with world-class cybersecurity across every track and continent.
☐ β˜† βœ‡ Security – Cisco Blog

Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General

By: Jason Maynard β€” October 1st 2025 at 12:00
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this β€” and other β€” vulnerabilities.
☐ β˜† βœ‡ Security – Cisco Blog

Zero Trust in the Era of Agentic AI

By: Eric Wang β€” September 8th 2025 at 12:00
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.
☐ β˜† βœ‡ Security – Cisco Blog

Conference Hopping: Training Attendee Scanning Def Con

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Driving Cisco XDR Integration With Third-Party Partners at Black Hat

By: Aditya Sankar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall: SnortML at Black Hat USA 2025

By: Adam Kilgore β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Investigation: Attempted Exploitation of Registration Server

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

The Value of PCAP in Firewall Investigations

By: Steve Nowell β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Closing the Backdoor in TACACS+: Why Full-Session Encryption Matters More Than Ever

By: Tal Surasky β€” September 2nd 2025 at 12:00
Attackers exploited weak TACACS+ encryption to steal credentials and evade detection. Learn how Cisco ISE with TLS 1.3 and Duo MFA closes these backdoors.
☐ β˜† βœ‡ Security – Cisco Blog

Get Ahead of the HIPAA Security Rule Update With Secure Workload

By: Jorge Quintero β€” August 27th 2025 at 12:00
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.
☐ β˜† βœ‡ Security – Cisco Blog

Fragmented SSE Is a Risk You Can’t Afford

By: Raj Chopra β€” August 26th 2025 at 12:00
Cisco Secure Access solves the problem of point product patchworks, offering a unified architecture that moves with the user, not just the network.
☐ β˜† βœ‡ Security – Cisco Blog

Findings Report From the SOC at RSACβ„’ 2025 Conference

By: Jessica (Bair) Oppenheimer β€” August 19th 2025 at 12:00
Cisco Security and Splunk protected RSACβ„’ 2025 Conference in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco and KDDI Partner to Deliver Japan’s First Fully Managed SASE Solution

By: Raj Chopra β€” August 18th 2025 at 12:00
Explore how service providers are enabling faster, scalable SASE adoption with cloud-native security and networking solutions.
☐ β˜† βœ‡ Security – Cisco Blog

Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating

By: Chad Skipper β€” July 15th 2025 at 12:00
Combining the power of Duo's Identity Management and Cisco's Secure Access and Identity Intelligence protects against stolen credentials and phishing attacks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests

By: Hugo Vliegen β€” July 10th 2025 at 12:00
Cisco Catalyst 8300 earns NetSecOPEN certification for exceptional real-world NGFW and SD-WAN performance under modern enterprise conditions.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live San Diego Case Study: Malware Upatre! (Encrypted Visibility Engine Event)

By: Aditya Sankar β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action at the Cisco Live San Diego SOC

By: Jessica (Bair) Oppenheimer β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Using AI to Battle Phishing Campaigns

By: Ryan Maclennan β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Building an XDR Integration With Splunk Attack Analyzer

By: Ryan Maclennan β€” July 2nd 2025 at 12:00
Cisco XDR is an infinitely extensible platform for security integrations. Like the maturing SOCs of our customers, the event SOC team at Cisco Live San Diego 2025 built custom integrations to meet our needs. You can build your own integrations using the community resources announced at Cisco Live. It was an honor to work with […]
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live San Diego Case Study: Hunting Cleartext Passwords in HTTP POST Requests

By: Aditya Sankar β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.β€―
☐ β˜† βœ‡ Security – Cisco Blog

Redefining Zero Trust in the Age of AI Agents and Agentic Workflows

By: Prabhat Singh β€” June 26th 2025 at 12:00
AI-powered threats demand intent-based security. Cisco's Semantic Inspection Proxy redefines zero trust by analyzing agent behavior, ensuring semantic verification.
☐ β˜† βœ‡ Security – Cisco Blog

Simplifying Decryption With Cisco’s Secure Firewall 7.7

By: Gurdeep Gill β€” June 19th 2025 at 12:00
Simplify decryption with Cisco Secure Firewall 7.7! Intelligent bypass, enhanced wizard & more for optimized security & performance.
☐ β˜† βœ‡ Security – Cisco Blog

Making Agentic AI Work in the Real World

By: Raj Chopra β€” June 10th 2025 at 12:55
Cisco is extending the principles of zero trust to Agentic AI. Cisco's Universal Zero Trust Network architecture gives you the tools you need.
☐ β˜† βœ‡ Security – Cisco Blog

Streamline Regulation Mandates With NIST CSF and Secure Workload

By: Jorge Quintero β€” June 2nd 2025 at 12:00
Cisco Secure Workload serves as a foundational solution for organizations seeking to implement an effective microsegmentation strategy.
☐ β˜† βœ‡ Security – Cisco Blog

Introducing Secure Access – DNS Defense

By: Steve Brunetto β€” May 29th 2025 at 12:00
Cisco Secure Access - DNS Defense is a seamless pathway to our Universal ZTNA solution. Learn how it works in the blog.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Asia 2025 NOC: Innovation in SOC

By: Jessica (Bair) Oppenheimer β€” April 24th 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Asia 2025: Innovation in the SOC

By: Jessica (Bair) Oppenheimer β€” April 24th 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Mobile World Congress 2025: SOC in the Network Operations Center

By: Filipe Lopes β€” April 3rd 2025 at 12:00
Cisco is the sole supplier of network services to Mobile World Congress, expanding into security and observability, with Splunk.
☐ β˜† βœ‡ Security – Cisco Blog

Network Visibility Module and Zeek Detections in Secure Network Analytics

By: Robert Harris β€” April 1st 2025 at 12:00
Secure Network Analytics version 7.5.2 has been released, offering exciting new features such as the Network Visibility Module (NVM) and Zeek detections.
❌