FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Key Challenges that Impede Segmentation Progress

By: Aamer Akhter β€” December 16th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that complexity, visibility, and context remain the main challenges for successful segmentation implementations.
☐ β˜† βœ‡ Security – Cisco Blog

A Newbie’s Perspective: From Curiosity to Confidence, My SOC Story

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 22:32
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.
☐ β˜† βœ‡ Security – Cisco Blog

Have You Seen My Domain Controller?

By: Duane Waddle β€” December 12th 2025 at 16:09
Windows clients expose Active Directory DNS queries on public Wi-Fi, risking OSINT and credential leaks. Learn from Cisco Live SOC observations how to protect clients with VPNs .
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action: From SPL to PCAP

By: Brendan Kuang β€” December 12th 2025 at 13:57
Learn how Cisco Live SOC uses Splunk SPL and Endace PCAP to investigate exposed HTTP authentication and Kerberos activity, securing sensitive data on public Wi-Fi networks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne 2025 SOC

By: Jessica (Bair) Oppenheimer β€” December 12th 2025 at 13:00
Cisco Security and Splunk protected Cisco Live Melbourne 2025 in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS

By: Hanna Jabbour β€” December 12th 2025 at 13:00
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
☐ β˜† βœ‡ Security – Cisco Blog

The Segmentation Cycle: A Practical Approach to Network Security

By: Mark Stephens β€” December 11th 2025 at 13:00
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
☐ β˜† βœ‡ Security – Cisco Blog

Segmentation Remains a Foundational Security Concept

By: Aamer Akhter β€” December 4th 2025 at 13:00
The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it a foundational cornerstone for modern enterprise security strategies.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare 2025 Security Operations Centre

By: Jessica (Bair) Oppenheimer β€” December 3rd 2025 at 06:03
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
☐ β˜† βœ‡ Security – Cisco Blog

Unmasking Attacks With Cisco XDR at the GovWare SOC

By: Robin Wei β€” December 2nd 2025 at 08:00
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

By: Allison Gallo β€” December 2nd 2025 at 08:00
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
☐ β˜† βœ‡ Security – Cisco Blog

GovWare Captive Portal: (Splash Page)

By: Ryan Maclennan β€” December 2nd 2025 at 08:00
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
☐ β˜† βœ‡ Security – Cisco Blog

A Glimpse Into Cisco Mobile Infrastructure Security Developments

By: Oussama Naffati β€” November 24th 2025 at 13:00
See how Cisco is helping mobile operators improve visibility, protect traffic at high speed, and keep security consistent from core to edge.
☐ β˜† βœ‡ Security – Cisco Blog

Seeing Inside the Vortex: Detecting Living off the Land Techniques

By: Matthew Robertson β€” November 11th 2025 at 13:00
Networking infrastructure is an often-overlooked threat surface being targeted by sophisticated threat actors. Learn more about this topic.
☐ β˜† βœ‡ Security – Cisco Blog

Empower AI Innovation: On-Demand AI Data Center Access With Cisco SD-WAN

By: Vipul Shah β€” November 4th 2025 at 13:00
AI has transformed everyday experiencesβ€”from your phone instantly translating a foreign language to your smart assistant finding the fastest route home. Just as these devices connect you to the world in a split second, businesses now require on-demand, high-performance access to a rapidly expanding global AI ecosystem. This seamless, real-time connectivity is becoming the new […]
☐ β˜† βœ‡ Security – Cisco Blog

SE Labs Names Cisco Secure Firewall Best Enterprise NGFW 2025

By: Pramod Chandrashekar β€” October 29th 2025 at 12:00
Cisco Secure Firewall wins SE Labs’ 2025 Best NGFW award β€” the first ever to earn dual AAA ratings for both protection and performance. Zero breaches, Zero compromises.
☐ β˜† βœ‡ Security – Cisco Blog

SSE That Thinks in Identity and Adapts Access

By: Jeff Scheaffer β€” October 24th 2025 at 12:00
Identity doesn’t stay still. Trust shifts. Behavior fluctuates. Posture changes. Cisco Secure Access leverages rich data from identity, behaviors, and devices.
☐ β˜† βœ‡ Security – Cisco Blog

2025 Cisco Segmentation Report Sheds Light on Evolving Technology

By: Aamer Akhter β€” October 23rd 2025 at 12:00
A new report from Cisco shows that segmentation is a foundational security technology, but few are fully implementing both macro- and micro-segmentation today.
☐ β˜† βœ‡ Security – Cisco Blog

Common Threat Themes: Defending Against Lateral Movement (Part 1)

By: Jason Maynard β€” October 15th 2025 at 12:00
Discover why lateral movement is a key tactic in cyber breaches and how defenders can strengthen security by focusing on this critical threat vector.
☐ β˜† βœ‡ Security – Cisco Blog

Defining a Standard Taxonomy for Segmentation

By: Aamer Akhter β€” October 7th 2025 at 12:00
We need a standardized taxonomy so organizations can evaluate, implement and manage segmentation projects most effectively.
☐ β˜† βœ‡ Security – Cisco Blog

Racing Against Threats: How Cisco Security Powers McLaren’s F1 Prowess

By: Gurdeep Gill β€” October 6th 2025 at 12:00
Discover how Cisco helps McLaren protect data and stay fast with world-class cybersecurity across every track and continent.
☐ β˜† βœ‡ Security – Cisco Blog

Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General

By: Jason Maynard β€” October 1st 2025 at 12:00
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this β€” and other β€” vulnerabilities.
☐ β˜† βœ‡ Security – Cisco Blog

Zero Trust in the Era of Agentic AI

By: Eric Wang β€” September 8th 2025 at 12:00
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.
☐ β˜† βœ‡ Security – Cisco Blog

Conference Hopping: Training Attendee Scanning Def Con

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Driving Cisco XDR Integration With Third-Party Partners at Black Hat

By: Aditya Sankar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Firewall: SnortML at Black Hat USA 2025

By: Adam Kilgore β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Investigation: Attempted Exploitation of Registration Server

By: Bilal Qamar β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

The Value of PCAP in Firewall Investigations

By: Steve Nowell β€” September 3rd 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
☐ β˜† βœ‡ Security – Cisco Blog

Closing the Backdoor in TACACS+: Why Full-Session Encryption Matters More Than Ever

By: Tal Surasky β€” September 2nd 2025 at 12:00
Attackers exploited weak TACACS+ encryption to steal credentials and evade detection. Learn how Cisco ISE with TLS 1.3 and Duo MFA closes these backdoors.
☐ β˜† βœ‡ Security – Cisco Blog

Get Ahead of the HIPAA Security Rule Update With Secure Workload

By: Jorge Quintero β€” August 27th 2025 at 12:00
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.
☐ β˜† βœ‡ Security – Cisco Blog

Fragmented SSE Is a Risk You Can’t Afford

By: Raj Chopra β€” August 26th 2025 at 12:00
Cisco Secure Access solves the problem of point product patchworks, offering a unified architecture that moves with the user, not just the network.
☐ β˜† βœ‡ Security – Cisco Blog

Findings Report From the SOC at RSACβ„’ 2025 Conference

By: Jessica (Bair) Oppenheimer β€” August 19th 2025 at 12:00
Cisco Security and Splunk protected RSACβ„’ 2025 Conference in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco and KDDI Partner to Deliver Japan’s First Fully Managed SASE Solution

By: Raj Chopra β€” August 18th 2025 at 12:00
Explore how service providers are enabling faster, scalable SASE adoption with cloud-native security and networking solutions.
☐ β˜† βœ‡ Security – Cisco Blog

Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating

By: Chad Skipper β€” July 15th 2025 at 12:00
Combining the power of Duo's Identity Management and Cisco's Secure Access and Identity Intelligence protects against stolen credentials and phishing attacks.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests

By: Hugo Vliegen β€” July 10th 2025 at 12:00
Cisco Catalyst 8300 earns NetSecOPEN certification for exceptional real-world NGFW and SD-WAN performance under modern enterprise conditions.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live San Diego Case Study: Malware Upatre! (Encrypted Visibility Engine Event)

By: Aditya Sankar β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Splunk in Action at the Cisco Live San Diego SOC

By: Jessica (Bair) Oppenheimer β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Using AI to Battle Phishing Campaigns

By: Ryan Maclennan β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Building an XDR Integration With Splunk Attack Analyzer

By: Ryan Maclennan β€” July 2nd 2025 at 12:00
Cisco XDR is an infinitely extensible platform for security integrations. Like the maturing SOCs of our customers, the event SOC team at Cisco Live San Diego 2025 built custom integrations to meet our needs. You can build your own integrations using the community resources announced at Cisco Live. It was an honor to work with […]
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Live San Diego Case Study: Hunting Cleartext Passwords in HTTP POST Requests

By: Aditya Sankar β€” July 2nd 2025 at 12:00
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.β€―
☐ β˜† βœ‡ Security – Cisco Blog

Redefining Zero Trust in the Age of AI Agents and Agentic Workflows

By: Prabhat Singh β€” June 26th 2025 at 12:00
AI-powered threats demand intent-based security. Cisco's Semantic Inspection Proxy redefines zero trust by analyzing agent behavior, ensuring semantic verification.
☐ β˜† βœ‡ Security – Cisco Blog

Simplifying Decryption With Cisco’s Secure Firewall 7.7

By: Gurdeep Gill β€” June 19th 2025 at 12:00
Simplify decryption with Cisco Secure Firewall 7.7! Intelligent bypass, enhanced wizard & more for optimized security & performance.
☐ β˜† βœ‡ Security – Cisco Blog

Making Agentic AI Work in the Real World

By: Raj Chopra β€” June 10th 2025 at 12:55
Cisco is extending the principles of zero trust to Agentic AI. Cisco's Universal Zero Trust Network architecture gives you the tools you need.
☐ β˜† βœ‡ Security – Cisco Blog

Streamline Regulation Mandates With NIST CSF and Secure Workload

By: Jorge Quintero β€” June 2nd 2025 at 12:00
Cisco Secure Workload serves as a foundational solution for organizations seeking to implement an effective microsegmentation strategy.
☐ β˜† βœ‡ Security – Cisco Blog

Introducing Secure Access – DNS Defense

By: Steve Brunetto β€” May 29th 2025 at 12:00
Cisco Secure Access - DNS Defense is a seamless pathway to our Universal ZTNA solution. Learn how it works in the blog.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Asia 2025 NOC: Innovation in SOC

By: Jessica (Bair) Oppenheimer β€” April 24th 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Asia 2025: Innovation in the SOC

By: Jessica (Bair) Oppenheimer β€” April 24th 2025 at 12:00
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
☐ β˜† βœ‡ Security – Cisco Blog

Mobile World Congress 2025: SOC in the Network Operations Center

By: Filipe Lopes β€” April 3rd 2025 at 12:00
Cisco is the sole supplier of network services to Mobile World Congress, expanding into security and observability, with Splunk.
☐ β˜† βœ‡ Security – Cisco Blog

Network Visibility Module and Zeek Detections in Secure Network Analytics

By: Robert Harris β€” April 1st 2025 at 12:00
Secure Network Analytics version 7.5.2 has been released, offering exciting new features such as the Network Visibility Module (NVM) and Zeek detections.
☐ β˜† βœ‡ Security – Cisco Blog

Redefining Security Management in a Hyperconnected World

By: DJ Sampath β€” March 18th 2025 at 12:00
Cisco is bringing Secure Workload, Secure Access, and AI Defense into Security Cloud control, enhancing its capabilities and providing comprehensive management.
☐ β˜† βœ‡ Security – Cisco Blog

The Quantum Sky Is Falling! Understanding the Quantum Threat to Network Security

By: Rakesh Kandula β€” March 12th 2025 at 12:00
Demystify the potential threat that quantum computing poses to encryption and the security of the network.
☐ β˜† βœ‡ Security – Cisco Blog

Fusing Security Into the Network Fabric: From Hybrid Mesh Firewalls to Universal ZTNA

By: Raj Chopra β€” February 11th 2025 at 08:51
In the changing landscape of network security, the combination of Universal Zero Trust Network Access and Hybrid Mesh Firewalls offers a powerful defense.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Europe 2024 NOC/SOC: Security Cloud

By: Jessica (Bair) Oppenheimer β€” January 28th 2025 at 13:00
Cisco is the Official Security Cloud Provider for the Black Hat Network Operations Center (NOC). We work with the other official partners to bring the hardware, software and engineers to build and secure the network, for our joint customer: Black Hat.Β  Arista: Wired and Wireless Network EquipmentΒ  Corelight: Open Network Detection and ResponseΒ  Palo Alto […]
☐ β˜† βœ‡ Security – Cisco Blog

Simplifying Zero Trust Security for the Modern Workplace

By: Jennifer Golden β€” January 22nd 2025 at 13:00
Cisco’s User Protection Suite now includes Identity Services Engine (ISE), enabling organizations to achieve zero trust for the workplace.
☐ β˜† βœ‡ Security – Cisco Blog

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

By: Robert Harris β€” November 8th 2024 at 13:00
You can use public Cisco Talos blogs and third-party threat intelligence data with Cisco Secure Network Analytics to build custom security events.
☐ β˜† βœ‡ Security – Cisco Blog

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

By: Jeff Scheaffer β€” October 17th 2024 at 12:00
Tech components like MASQUE, QUIC and VPP allow Cisco to overcome the limitations of last-gen ZTNA and SSE solutions. Learn how Cisco is rewriting the ZTA story.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat 2024: SOC in the NOC

By: Ryan Maclennan β€” September 27th 2024 at 12:00
The Black Hat Network Operations Center (NOC) provides a high-security, high-availability network in one of the most demanding environments in the world: the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. Cisco is the official Domain […]
☐ β˜† βœ‡ Security – Cisco Blog

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

By: Raj Chopra β€” September 19th 2024 at 15:00
Cisco has designed our solution to overcome common obstacles by powering a secure, in-office experience anywhere that builds on Cisco's own zero trust journey.
☐ β˜† βœ‡ Security – Cisco Blog

Secure Network Analytics 7.5.1 Launch

By: Rob Ayoub β€” September 10th 2024 at 12:00
Secure Network Analytics 7.5.1 is now available. This release provides features including expanded firewall log ingestion, custom dashboards, better ISE integration, and much more.
❌