FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Accelerate Security Operations with Cisco’s New Security-Tuned Model

By: Aman Priyanshu β€” February 12th 2026 at 13:00
Explore a new frontier in LLM quality and speed. Cisco’s Foundation-Sec model delivers high-performance AI summaries for Splunk Security Operations workflows.
☐ β˜† βœ‡ Security – Cisco Blog

Double Defense: Cisco Secure Firewall 10.0 Confronts Encrypted Traffic and Emerging Attack Challenges

By: Vignesh Sathiamoorthy β€” February 11th 2026 at 13:00
Discover how Cisco Secure Firewall 10.0 boosts visibility and protection against modern threats, from encrypted attacks to AI-driven exploits.
☐ β˜† βœ‡ Security – Cisco Blog

Security Observability Improvements in Cisco Secure Firewall 10.0

By: Ron Scott-Adams β€” February 10th 2026 at 13:00
Improvements in Secure Firewall 10.0 provide better observability and detection for threats and security monitoring overall.
☐ β˜† βœ‡ Security – Cisco Blog

Redefining Security for the Agentic Era

By: Peter Bailey β€” February 10th 2026 at 08:30
The agentic era is here. As AI agents act autonomously at machine speed, learn why security must evolve with intent-aware controls to make autonomous systems safe, accountable, and reliable.
☐ β˜† βœ‡ Security – Cisco Blog

SASE for the AI Era: Driving Secure, Distributed, and Optimized AI

By: Raj Chopra β€” February 10th 2026 at 08:20
Learn how Cisco SASE enables secure, predictable, and scalable AI operations by unifying performance and protection for distributed, agentic AI workflows.
☐ β˜† βœ‡ Security – Cisco Blog

Integrating With Cisco XDR at Black Hat Europe

By: Jessica (Bair) Oppenheimer β€” February 9th 2026 at 13:00
Investigating indicators of compromise (IOCs) requires a unified view of security data. See how we integrated Cisco XDR with third-party tools and open-source models at Black Hat Europe.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe: Enhancing Security Operations With Cisco XDR and Foundation-sec-8b-Instruct LLM

By: Piotr Jarzynka β€” February 9th 2026 at 13:00
Manual triage often slows down incident response. Learn how we integrated an 8-billion parameter security LLM into Cisco XDR to summarize alerts and trace attack paths in real time.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe 2025: A Decade of Cisco Security Cloud Innovation

By: Jessica (Bair) Oppenheimer β€” February 9th 2026 at 13:00
Building a secure network for thousands of cybersecurity experts in just three days requires intense collaboration. Discover the hardware, software, and engineering behind the Black Hat Europe NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe 2025: Firepower IDS Flags Unwanted P2P on Rented Gear

By: Rene Straube β€” February 9th 2026 at 13:00
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
☐ β˜† βœ‡ Security – Cisco Blog

Securing DNS With Secure Access at Black Hat Europe

By: Rob DeCooman β€” February 9th 2026 at 13:00
For a decade, Cisco has secured Black Hat events with DNS security. Learn how the evolution to Cisco Secure Access provided visibility into 66 million queries and 6,000 unique apps in London.
☐ β˜† βœ‡ Security – Cisco Blog

Lessons Learned from Securing the World’s Largest Cyber Events

By: Jessica (Bair) Oppenheimer β€” February 6th 2026 at 13:00
Announcing the launch of the Cisco Event SOCs website and the release of our comprehensive Reference Architecture & Operations Guide.
☐ β˜† βœ‡ Security – Cisco Blog

Facing the Quantum Threat: Cisco’s Strategic Approach to PQC

By: Christian Chisholm β€” February 5th 2026 at 13:00
Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco is Proud to Champion the UK’s Software Security Code of Practice

By: Larry Lidz β€” February 3rd 2026 at 13:00
Cisco champions the UK’s Software Security Code of Practice in support of secure software supply chains and strengthening trust in digital services.
☐ β˜† βœ‡ Security – Cisco Blog

AI search framework that teaches AI models to think like experts

By: Supriti Vijay β€” January 29th 2026 at 13:00
Cisco Foundation AI introduces AI search framework for more efficient search by models
☐ β˜† βœ‡ Security – Cisco Blog

Foundation-sec-8B-Reasoning: The First Open-weight Security Reasoning Model

By: Yaron Singer β€” January 29th 2026 at 13:00
Cisco Foundation AI introduces the first open-weight reasoning model for security.
☐ β˜† βœ‡ Security – Cisco Blog

Introducing The PEAK Threat Hunting Assistant: Agentic AI to Supercharge Your Hunt

By: David Bianco β€” January 29th 2026 at 13:00
Learn about the PEAK Threat Hunting Assistant, introduced by Cisco Foundation AI
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Foundation AI Advances Agentic Security Systems for the AI Era

By: Yaron Singer β€” January 29th 2026 at 13:00
Cisco Foundation AI is building agentic security for the AI era
☐ β˜† βœ‡ Security – Cisco Blog

Privacy and Data Governance β€” Keys to Innovation and Trust in the AI Era

By: Harvey Jang β€” January 26th 2026 at 12:45
Cisco 2026 Data and Privacy Benchmark Study shares insights into how privacy unlocks competitive advantage for business growth and builds trust in AI era.
☐ β˜† βœ‡ Security – Cisco Blog

Introducing Intent-Based Policy Management for Cisco Hybrid Mesh Firewall

By: Murali Rathinasamy β€” January 22nd 2026 at 13:00
Hybrid Mesh Firewall introduces intent-based policy management across multi-vendor firewalls through Cisco Security Cloud Control with Mesh Policy Engine.
☐ β˜† βœ‡ Security – Cisco Blog

Engaging Cisco Talos Incident Response is just the beginning

By: Yuri Kramarz β€” January 20th 2026 at 13:00
Cisco Talos Incident Response Retainer provides expert, proactive, and reactive cybersecurity support to quickly contain threats and strengthen defenses.
☐ β˜† βœ‡ Security – Cisco Blog

Three Benefits of Segmentation

By: Aamer Akhter β€” January 8th 2026 at 13:00
The successful implementation of segmentation enables organizations to contain breaches, protect high-value assets, and meet compliance requirements.
☐ β˜† βœ‡ Security – Cisco Blog

Why your organization needs a Cisco Talos Incident Response Retainer

By: Yuri Kramarz β€” January 6th 2026 at 13:00
Every day, new ransomware and data breaches dominate the headlines, reminding us that it’s a matter of when, not if, your organization may be next. Having a well-prepared response plan and a team of forensic professionals ready to act at a moment’s notice can mean a world of difference between swift incident recovery or a […]
☐ β˜† βœ‡ Security – Cisco Blog

Elevating Data Security: New DLP Enhancements in Cisco Secure Access

By: Jeff Scheaffer β€” December 19th 2025 at 13:00
Extend your ability to safeguard sensitive information, achieve regulatory compliance, and mitigate risk with endpoint data loss prevention (DLP) and email DLP.
☐ β˜† βœ‡ Security – Cisco Blog

Unify IT Asset Management and Network Security in Real Time: Cisco ISE and ServiceNow Are Redefining Asset-Aware Access

By: Amith Ronad β€” December 17th 2025 at 13:00
Cisco ISE and ServiceNow are redefining asset-aware access by unifying IT asset management and network security in real time.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Duo Unveils First Production Deployment of Foundation AI

By: Yaron Singer β€” December 16th 2025 at 13:00
Today marks a major milestone in the evolution of Cisco security. Cisco Identity Intelligence is now the first Cisco product to deliver a customer facing capability powered entirely by a Cisco built… Read more on Cisco Blogs
☐ β˜† βœ‡ Security – Cisco Blog

Key Challenges that Impede Segmentation Progress

By: Aamer Akhter β€” December 16th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that complexity, visibility, and context remain the main challenges for successful segmentation implementations.
☐ β˜† βœ‡ Security – Cisco Blog

A Newbie’s Perspective: From Curiosity to Confidence, My SOC Story

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 22:32
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.
☐ β˜† βœ‡ Security – Cisco Blog

Have You Seen My Domain Controller?

By: Duane Waddle β€” December 12th 2025 at 16:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action: From SPL to PCAP

By: Brendan Kuang β€” December 12th 2025 at 13:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne 2025 SOC

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 13:00
Cisco Security and Splunk protected Cisco Live Melbourne 2025 in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS

By: Hanna Jabbour β€” December 12th 2025 at 13:00
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
☐ β˜† βœ‡ Security – Cisco Blog

The Segmentation Cycle: A Practical Approach to Network Security

By: Mark Stephens β€” December 11th 2025 at 13:00
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
☐ β˜† βœ‡ Security – Cisco Blog

Segmentation Remains a Foundational Security Concept

By: Aamer Akhter β€” December 4th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it a foundational cornerstone for modern enterprise security strategies.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare 2025 Security Operations Centre

By: Jessica (Bair) Oppenheimer β€” December 3rd 2025 at 06:03
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
☐ β˜† βœ‡ Security – Cisco Blog

Unmasking Attacks With Cisco XDR at the GovWare SOC

By: Robin Wei β€” December 2nd 2025 at 08:00
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare Captive Portal: (Splash Page)

By: Ryan Maclennan β€” December 2nd 2025 at 08:00
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
☐ β˜† βœ‡ Security – Cisco Blog

A Glimpse Into Cisco Mobile Infrastructure Security Developments

By: Oussama Naffati β€” November 24th 2025 at 13:00
See how Cisco is helping mobile operators improve visibility, protect traffic at high speed, and keep security consistent from core to edge.
☐ β˜† βœ‡ Security – Cisco Blog

Identity-Driven Firewalls: Shaping the Future of Adaptive Security

By: Gayathri Nagarajan β€” November 18th 2025 at 13:00
Active Directory compromises, credential theft, lateral movement. See how identity-driven security policies stop breaches before attackers escalate privileges.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Recognized as a Major Player in the 2025 IDC XDR MarketScape

By: Nirav Shah β€” November 13th 2025 at 13:00
Cisco has been recognized as a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment.
☐ β˜† βœ‡ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson β€” November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ β˜† βœ‡ Security – Cisco Blog

Why a Unified Email Security Platform is Your Best Defense

By: Kevin Potts β€” November 6th 2025 at 13:00
Email Threat Defense’s enhanced capabilities integrate gateway-level prevention with supplemental, API-based post-delivery remediation.
☐ β˜† βœ‡ Security – Cisco Blog

Empower AI Innovation: On-Demand AI Data Center Access With Cisco SD-WAN

By: Vipul Shah β€” November 4th 2025 at 13:00
AI has transformed everyday experiencesβ€”from your phone instantly translating a foreign language to your smart assistant finding the fastest route home. Just as these devices connect you to the world in a split second, businesses now require on-demand, high-performance access to a rapidly expanding global AI ecosystem. This seamless, real-time connectivity is becoming the new […]
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Security Cloud Control to Help MSPs Securely Onboard Customers

By: Raj Chopra β€” November 3rd 2025 at 13:55
Cisco Security Cloud Control introduces multi-customer management for MSPs, streamlining operations and automating deployments for better security outcomes.
☐ β˜† βœ‡ Security – Cisco Blog

SE Labs Names Cisco Secure Firewall Best Enterprise NGFW 2025

By: Pramod Chandrashekar β€” October 29th 2025 at 12:00
Cisco Secure Firewall wins SE Labs’ 2025 Best NGFW award β€” the first ever to earn dual AAA ratings for both protection and performance. Zero breaches, Zero compromises.
☐ β˜† βœ‡ Security – Cisco Blog

Redefine Security and Speed for High-Performance AI-Ready Data Centers

By: Rishi Tripathy β€” October 28th 2025 at 12:00
Cisco Secure Firewall 6100 Series sets a new benchmark for ultra-high-end firewalls with its unmatched speed, scalability, and a future-ready architecture.
☐ β˜† βœ‡ Security – Cisco Blog

From Perimeter to SOC: How Integrating Cisco Firewalls with Splunk Delivers End-to-End Threat Visibility and Compliance

By: Gayathri Nagarajan β€” October 27th 2025 at 12:00
Learn how Cisco Firewalls and Splunk integration strengthens SOC visibility, improves compliance readiness, and empowers teams with actionable security insights.
☐ β˜† βœ‡ Security – Cisco Blog

SSE That Thinks in Identity and Adapts Access

By: Jeff Scheaffer β€” October 24th 2025 at 12:00
Identity doesn’t stay still. Trust shifts. Behavior fluctuates. Posture changes. Cisco Secure Access leverages rich data from identity, behaviors, and devices.
☐ β˜† βœ‡ Security – Cisco Blog

2025 Cisco Segmentation Report Sheds Light on Evolving Technology

By: Aamer Akhter β€” October 23rd 2025 at 12:00
A new report from Cisco shows that segmentation is a foundational security technology, but few are fully implementing both macro- and micro-segmentation today.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall 1220: Snort3 – Uncompromised Performance in Rigorous Testing

By: Casey Roberts β€” October 21st 2025 at 12:00
This evaluation validates our commitment to delivering lightning-fast speed and impeccable protection, engineered to keep the most sophisticated threats away.
☐ β˜† βœ‡ Security – Cisco Blog

Common Threat Themes: Defending Against Lateral Movement (Part 1)

By: Jason Maynard β€” October 15th 2025 at 12:00
Discover why lateral movement is a key tactic in cyber breaches and how defenders can strengthen security by focusing on this critical threat vector.
☐ β˜† βœ‡ Security – Cisco Blog

Defining a Standard Taxonomy for Segmentation

By: Aamer Akhter β€” October 7th 2025 at 12:00
We need a standardized taxonomy so organizations can evaluate, implement and manage segmentation projects most effectively.
☐ β˜† βœ‡ Security – Cisco Blog

Racing Against Threats: How Cisco Security Powers McLaren’s F1 Prowess

By: Gurdeep Gill β€” October 6th 2025 at 12:00
Discover how Cisco helps McLaren protect data and stay fast with world-class cybersecurity across every track and continent.
☐ β˜† βœ‡ Security – Cisco Blog

Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General

By: Jason Maynard β€” October 1st 2025 at 12:00
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this β€” and other β€” vulnerabilities.
☐ β˜† βœ‡ Security – Cisco Blog

Rethinking AI Security: The Dynamic Context Firewall for MCP

By: Gogulakrishnan Thiyagarajan β€” September 30th 2025 at 12:00
A Dynamic Context Firewall (DCF) for Model Context Protocol (MCP) is a proposed, context-aware security layer that protects AI agent interactions.
☐ β˜† βœ‡ Security – Cisco Blog

Bridging the Gap: Cisco’s Blueprint for Developer-Centric Cloud Security

By: Disha Agarwal β€” September 24th 2025 at 12:00
Discover how Cisco empowers developers with integrated, developer-centric cloud security, fostering collaboration and proactive risk prevention.
☐ β˜† βœ‡ Security – Cisco Blog

The 80/20 Rule Doesn’t Apply to Security: How Cisco SASE Bridges the Gap

By: Darcie Gainer β€” September 22nd 2025 at 12:00
Today's dynamic environments demand a security strategy that covers 100% of your digital footprint, 100% of the time. SASE architectures have emerged as a strategic response.
☐ β˜† βœ‡ Security – Cisco Blog

From AIOps to AgenticOps: The Autonomous Evolution of Firewall Operations

By: Gayathri Nagarajan β€” September 18th 2025 at 12:00
Discover how Cisco is redefining firewall operations through autonomous AI-driven management, predictive analytics, and self-healing security.
☐ β˜† βœ‡ Security – Cisco Blog

SnortML: Cisco’s ML-Based Detection Engine Gets Powerful Upgrade

By: Marc Mastrangelo β€” September 11th 2025 at 12:00
SnortML, Cisco's innovative ML engine for Snort IPS, proactively detects evolving exploits like SQL Injection, Command Injection & XSS on-device for privacy.
❌