FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Elevating Data Security: New DLP Enhancements in Cisco Secure Access

By: Jeff Scheaffer β€” December 19th 2025 at 13:00
Extend your ability to safeguard sensitive information, achieve regulatory compliance, and mitigate risk with endpoint data loss prevention (DLP) and email DLP.
☐ β˜† βœ‡ Security – Cisco Blog

Unify IT Asset Management and Network Security in Real Time: Cisco ISE and ServiceNow Are Redefining Asset-Aware Access

By: Amith Ronad β€” December 17th 2025 at 13:00
Cisco ISE and ServiceNow are redefining asset-aware access by unifying IT asset management and network security in real time.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Duo Unveils First Production Deployment of Foundation AI

By: Yaron Singer β€” December 16th 2025 at 13:00
Today marks a major milestone in the evolution of Cisco security. Cisco Identity Intelligence is now the first Cisco product to deliver a customer facing capability powered entirely by a Cisco built… Read more on Cisco Blogs
☐ β˜† βœ‡ Security – Cisco Blog

Key Challenges that Impede Segmentation Progress

By: Aamer Akhter β€” December 16th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that complexity, visibility, and context remain the main challenges for successful segmentation implementations.
☐ β˜† βœ‡ Security – Cisco Blog

A Newbie’s Perspective: From Curiosity to Confidence, My SOC Story

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 22:32
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.
☐ β˜† βœ‡ Security – Cisco Blog

Have You Seen My Domain Controller?

By: Duane Waddle β€” December 12th 2025 at 16:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action: From SPL to PCAP

By: Brendan Kuang β€” December 12th 2025 at 13:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne 2025 SOC

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 13:00
Cisco Security and Splunk protected Cisco Live Melbourne 2025 in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS

By: Hanna Jabbour β€” December 12th 2025 at 13:00
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
☐ β˜† βœ‡ Security – Cisco Blog

The Segmentation Cycle: A Practical Approach to Network Security

By: Mark Stephens β€” December 11th 2025 at 13:00
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
☐ β˜† βœ‡ Security – Cisco Blog

Segmentation Remains a Foundational Security Concept

By: Aamer Akhter β€” December 4th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it a foundational cornerstone for modern enterprise security strategies.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare 2025 Security Operations Centre

By: Jessica (Bair) Oppenheimer β€” December 3rd 2025 at 06:03
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
☐ β˜† βœ‡ Security – Cisco Blog

Unmasking Attacks With Cisco XDR at the GovWare SOC

By: Robin Wei β€” December 2nd 2025 at 08:00
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare Captive Portal: (Splash Page)

By: Ryan Maclennan β€” December 2nd 2025 at 08:00
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
☐ β˜† βœ‡ Security – Cisco Blog

A Glimpse Into Cisco Mobile Infrastructure Security Developments

By: Oussama Naffati β€” November 24th 2025 at 13:00
See how Cisco is helping mobile operators improve visibility, protect traffic at high speed, and keep security consistent from core to edge.
☐ β˜† βœ‡ Security – Cisco Blog

Identity-Driven Firewalls: Shaping the Future of Adaptive Security

By: Gayathri Nagarajan β€” November 18th 2025 at 13:00
Active Directory compromises, credential theft, lateral movement. See how identity-driven security policies stop breaches before attackers escalate privileges.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Recognized as a Major Player in the 2025 IDC XDR MarketScape

By: Nirav Shah β€” November 13th 2025 at 13:00
Cisco has been recognized as a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment.
☐ β˜† βœ‡ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson β€” November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ β˜† βœ‡ Security – Cisco Blog

Why a Unified Email Security Platform is Your Best Defense

By: Kevin Potts β€” November 6th 2025 at 13:00
Email Threat Defense’s enhanced capabilities integrate gateway-level prevention with supplemental, API-based post-delivery remediation.
☐ β˜† βœ‡ Security – Cisco Blog

Empower AI Innovation: On-Demand AI Data Center Access With Cisco SD-WAN

By: Vipul Shah β€” November 4th 2025 at 13:00
AI has transformed everyday experiencesβ€”from your phone instantly translating a foreign language to your smart assistant finding the fastest route home. Just as these devices connect you to the world in a split second, businesses now require on-demand, high-performance access to a rapidly expanding global AI ecosystem. This seamless, real-time connectivity is becoming the new […]
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Security Cloud Control to Help MSPs Securely Onboard Customers

By: Raj Chopra β€” November 3rd 2025 at 13:55
Cisco Security Cloud Control introduces multi-customer management for MSPs, streamlining operations and automating deployments for better security outcomes.
☐ β˜† βœ‡ Security – Cisco Blog

SE Labs Names Cisco Secure Firewall Best Enterprise NGFW 2025

By: Pramod Chandrashekar β€” October 29th 2025 at 12:00
Cisco Secure Firewall wins SE Labs’ 2025 Best NGFW award β€” the first ever to earn dual AAA ratings for both protection and performance. Zero breaches, Zero compromises.
☐ β˜† βœ‡ Security – Cisco Blog

Redefine Security and Speed for High-Performance AI-Ready Data Centers

By: Rishi Tripathy β€” October 28th 2025 at 12:00
Cisco Secure Firewall 6100 Series sets a new benchmark for ultra-high-end firewalls with its unmatched speed, scalability, and a future-ready architecture.
☐ β˜† βœ‡ Security – Cisco Blog

From Perimeter to SOC: How Integrating Cisco Firewalls with Splunk Delivers End-to-End Threat Visibility and Compliance

By: Gayathri Nagarajan β€” October 27th 2025 at 12:00
Learn how Cisco Firewalls and Splunk integration strengthens SOC visibility, improves compliance readiness, and empowers teams with actionable security insights.
☐ β˜† βœ‡ Security – Cisco Blog

SSE That Thinks in Identity and Adapts Access

By: Jeff Scheaffer β€” October 24th 2025 at 12:00
Identity doesn’t stay still. Trust shifts. Behavior fluctuates. Posture changes. Cisco Secure Access leverages rich data from identity, behaviors, and devices.
☐ β˜† βœ‡ Security – Cisco Blog

2025 Cisco Segmentation Report Sheds Light on Evolving Technology

By: Aamer Akhter β€” October 23rd 2025 at 12:00
A new report from Cisco shows that segmentation is a foundational security technology, but few are fully implementing both macro- and micro-segmentation today.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall 1220: Snort3 – Uncompromised Performance in Rigorous Testing

By: Casey Roberts β€” October 21st 2025 at 12:00
This evaluation validates our commitment to delivering lightning-fast speed and impeccable protection, engineered to keep the most sophisticated threats away.
☐ β˜† βœ‡ Security – Cisco Blog

Common Threat Themes: Defending Against Lateral Movement (Part 1)

By: Jason Maynard β€” October 15th 2025 at 12:00
Discover why lateral movement is a key tactic in cyber breaches and how defenders can strengthen security by focusing on this critical threat vector.
☐ β˜† βœ‡ Security – Cisco Blog

Defining a Standard Taxonomy for Segmentation

By: Aamer Akhter β€” October 7th 2025 at 12:00
We need a standardized taxonomy so organizations can evaluate, implement and manage segmentation projects most effectively.
☐ β˜† βœ‡ Security – Cisco Blog

Racing Against Threats: How Cisco Security Powers McLaren’s F1 Prowess

By: Gurdeep Gill β€” October 6th 2025 at 12:00
Discover how Cisco helps McLaren protect data and stay fast with world-class cybersecurity across every track and continent.
☐ β˜† βœ‡ Security – Cisco Blog

Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General

By: Jason Maynard β€” October 1st 2025 at 12:00
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this β€” and other β€” vulnerabilities.
☐ β˜† βœ‡ Security – Cisco Blog

Rethinking AI Security: The Dynamic Context Firewall for MCP

By: Gogulakrishnan Thiyagarajan β€” September 30th 2025 at 12:00
A Dynamic Context Firewall (DCF) for Model Context Protocol (MCP) is a proposed, context-aware security layer that protects AI agent interactions.
☐ β˜† βœ‡ Security – Cisco Blog

Bridging the Gap: Cisco’s Blueprint for Developer-Centric Cloud Security

By: Disha Agarwal β€” September 24th 2025 at 12:00
Discover how Cisco empowers developers with integrated, developer-centric cloud security, fostering collaboration and proactive risk prevention.
☐ β˜† βœ‡ Security – Cisco Blog

The 80/20 Rule Doesn’t Apply to Security: How Cisco SASE Bridges the Gap

By: Darcie Gainer β€” September 22nd 2025 at 12:00
Today's dynamic environments demand a security strategy that covers 100% of your digital footprint, 100% of the time. SASE architectures have emerged as a strategic response.
☐ β˜† βœ‡ Security – Cisco Blog

From AIOps to AgenticOps: The Autonomous Evolution of Firewall Operations

By: Gayathri Nagarajan β€” September 18th 2025 at 12:00
Discover how Cisco is redefining firewall operations through autonomous AI-driven management, predictive analytics, and self-healing security.
☐ β˜† βœ‡ Security – Cisco Blog

SnortML: Cisco’s ML-Based Detection Engine Gets Powerful Upgrade

By: Marc Mastrangelo β€” September 11th 2025 at 12:00
SnortML, Cisco's innovative ML engine for Snort IPS, proactively detects evolving exploits like SQL Injection, Command Injection & XSS on-device for privacy.
☐ β˜† βœ‡ Security – Cisco Blog

Packing More Power Into Cisco XDR’s Integration Toolkit

By: Ben Greenbaum β€” September 9th 2025 at 12:00
Cisco XDR and the Swiss Army knife share a theme of a versatile, integrated, and unified platform, giving users myriad solutions to take on diverse challenges.
☐ β˜† βœ‡ Security – Cisco Blog

Zero Trust in the Era of Agentic AI

By: Eric Wang β€” September 8th 2025 at 12:00
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.
☐ β˜† βœ‡ Security – Cisco Blog

Conference Hopping: Training Attendee Scanning Def Con

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Driving Cisco XDR Integration With Third-Party Partners at Black Hat

By: Aditya Sankar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall: SnortML at Black Hat USA 2025

By: Adam Kilgore β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Investigation: Attempted Exploitation of Registration Server

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

The Value of PCAP in Firewall Investigations

By: Steve Nowell β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Closing the Backdoor in TACACS+: Why Full-Session Encryption Matters More Than Ever

By: Tal Surasky β€” September 2nd 2025 at 12:00
Attackers exploited weak TACACS+ encryption to steal credentials and evade detection. Learn how Cisco ISE with TLS 1.3 and Duo MFA closes these backdoors.
☐ β˜† βœ‡ Security – Cisco Blog

Detecting Exposed LLM Servers: A Shodan Case Study on Ollama

By: Dr. Giannis Tziakouris β€” September 1st 2025 at 12:00
We uncovered 1,100+ exposed Ollama LLM serversβ€”20% with open modelsβ€”revealing critical security gaps and the need for better LLM threat monitoring.
☐ β˜† βœ‡ Security – Cisco Blog

Get Ahead of the HIPAA Security Rule Update With Secure Workload

By: Jorge Quintero β€” August 27th 2025 at 12:00
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.
☐ β˜† βœ‡ Security – Cisco Blog

Fragmented SSE Is a Risk You Can’t Afford

By: Raj Chopra β€” August 26th 2025 at 12:00
Cisco Secure Access solves the problem of point product patchworks, offering a unified architecture that moves with the user, not just the network.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Bolsters Security for Government With New FedRAMP Authorizations

By: Shailaja Shankar β€” August 25th 2025 at 12:00
Cisco is proud to announce three new FedRAMP-authorized cloud security solutions, purpose-built for federal, state, and local agencies.
☐ β˜† βœ‡ Security – Cisco Blog

Findings Report From the SOC at RSACβ„’ 2025 Conference

By: Jessica (Bair) Oppenheimer β€” August 19th 2025 at 12:00
Cisco Security and Splunk protected RSACβ„’ 2025 Conference in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco and KDDI Partner to Deliver Japan’s First Fully Managed SASE Solution

By: Raj Chopra β€” August 18th 2025 at 12:00
Explore how service providers are enabling faster, scalable SASE adoption with cloud-native security and networking solutions.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco named a Leader in IDC MarketScape Hybrid Firewall Vendor Assessment

By: Rick Miles β€” August 14th 2025 at 12:00
Cisco has been recognized as a Leader in the IDC MarketScape: Worldwide Enterprise Hybrid Firewall 2025 Vendor Assessment.
☐ β˜† βœ‡ Security – Cisco Blog

Improving Cloud-VPN Resiliency to DoS Attacks With IKE Throttling

By: Jerome Tollet β€” August 7th 2025 at 12:00
Explore a network-layer throttling mechanism to improve the resiliency of Cloud VPNs IKE servers, which are typically subject to IKE flood attacks.
☐ β˜† βœ‡ Security – Cisco Blog

Foundation-sec-8B-Instruct: An Out-of-the-Box Security Copilot

By: Yaron Singer β€” August 6th 2025 at 12:00
Foundation-sec-8B-Instruct layers instruction fine-tuning on top of our domain-focused base model, giving you a chat-native copilotthat understands security.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco’s Foundation AI Advances AI Supply Chain Security With Hugging Face

By: Hyrum Anderson β€” August 5th 2025 at 12:00
Cisco's Foundation AI is partnering with Hugging Face, bringing together the world's leading AI model hub with Cisco's security expertise.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco delivers enhanced email protection to the Middle East

By: Marvin Nodora β€” July 30th 2025 at 12:00
Cisco's new data center in the UAE delivers in-region reliability and increased protection to organizations in the Middle East.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall: First to earn SE Labs AAA in Advanced Performance

By: Marc Mastrangelo β€” July 24th 2025 at 12:00
Cisco Secure Firewall 4225 is the first to get SE Labs AAA for Advanced Performance, proving top speed & protection.
☐ β˜† βœ‡ Security – Cisco Blog

Email Threat Defense earns AAA rating in SE Labs latest evaluation

By: Sergio Pinto β€” July 23rd 2025 at 12:00
SE Labs research identifies the many ways Email Threat Defense successfully defends against advanced email threats in real time to earn the highest rating.
☐ β˜† βœ‡ Security – Cisco Blog

Customize Your Defense: Unlock Cisco XDR With Key Integrations

By: Ben Greenbaum β€” July 23rd 2025 at 12:00
The new Cisco XDR Connect tool helps users to search, browse, and view the details of all available XDR integrations and automation content.
❌