Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blogs.cisco.com

Security – Cisco Blog

Get the latest updates from Security – Cisco Blog directly as they happen.

Follow now 271 followers

Latest posts

Last updated about 2 hours ago

Segmentation Remains a Foundational Security Concept

about 3 hours ago

The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it...

GovWare 2025 Security Operations Centre

1 day ago

Cisco Security and Splunk secured the GovWare 2025 network in the Security...

From Detection to Deep Dive: Splunk Attack Analyzer and Endace for GovWare 2025 Security

2 days ago

At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect...

Unmasking Attacks With Cisco XDR at the GovWare SOC

2 days ago

During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis...

Splunk SOAR in Action at the GovWare: Zero-Touch Clear Text Password Response

2 days ago

At GovWare 2025, the SOC team combined ES with Splunk SOAR to...

GovWare Captive Portal: (Splash Page)

2 days ago

Cisco provided a splash page for GovWare 2025, a click-through captive portal...

SOC in a Box Hardware Refresh

2 days ago

Learn about the "SOC in a Box" hardware refresh the team deployed...

Monitoring Encrypted Client Hello (ECH) With Cisco Secure Firewall

2 days ago

At GovWare 2025, the SOC team observed ECH activity. Learn more about...

Cisco XDR Agentic AI With Cisco’s Foundational AI Model

2 days ago

At GovWare, we showcased a proof of concept built on Cisco's Foundation...

Guardians of GovWare: Real-Time Threat Detection With Cisco Secure Access

2 days ago

Secure Access served as the primary method of securing DNS-layer traffic for...

A Glimpse Into Cisco Mobile Infrastructure Security Developments

10 days ago

See how Cisco is helping mobile operators improve visibility, protect traffic at...

Identity-Driven Firewalls: Shaping the Future of Adaptive Security

16 days ago

Active Directory compromises, credential theft, lateral movement. See how identity-driven security policies...