<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security @ Cisco Blogs</title>
	<atom:link href="https://blogs.cisco.com/security/feed" rel="self" type="application/rss+xml" />
	<link>https://blogs.cisco.com/security</link>
	<description></description>
	<lastBuildDate>Wed, 13 May 2026 16:14:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://blogs.cisco.com/gcs/ciscoblogs/1/2024/09/cropped-Cisco-logo-thumb-sky-blue-150x150.jpg</url>
	<title>Security @ Cisco Blogs</title>
	<link>https://blogs.cisco.com/security</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Inside the SOC: AI-powered DNS defense against ransomware</title>
		<link>https://blogs.cisco.com/security/inside-the-soc-ai-powered-dns-defense-against-ransomware/</link>
		
		<dc:creator><![CDATA[Bill Spry]]></dc:creator>
		<pubDate>Thu, 14 May 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Hybrid Mesh Firewall]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=491398</guid>

					<description><![CDATA[Use AI-powered predictive DNS defense in Cisco Secure Access to disrupt ransomware and streamline your SOC investigations.]]></description>
		
		
		
			</item>
		<item>
		<title>State-sponsored actors, better known as the friends you don’t want</title>
		<link>https://blogs.cisco.com/security/state-sponsored-actors/</link>
					<comments>https://blogs.cisco.com/security/state-sponsored-actors/#respond</comments>
		
		<dc:creator><![CDATA[Elio Biasiotto]]></dc:creator>
		<pubDate>Wed, 13 May 2026 15:33:20 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber forensics]]></category>
		<category><![CDATA[dfir]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=491503</guid>

					<description><![CDATA[Incident Response teams must increasingly be prepared to respond to threats coming from nation-state attackers]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/state-sponsored-actors/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Insights: A Threat-First View for the Platform That Enforces Access</title>
		<link>https://blogs.cisco.com/security/security-insights-a-threat-first-view/</link>
					<comments>https://blogs.cisco.com/security/security-insights-a-threat-first-view/#respond</comments>
		
		<dc:creator><![CDATA[Jeff Scheaffer]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 12:00:31 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[cyber forensics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Enterprise Security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Secure Access Service Edge SASE]]></category>
		<category><![CDATA[security analytics]]></category>
		<category><![CDATA[Security Service Edge SSE]]></category>
		<category><![CDATA[threat analysis]]></category>
		<category><![CDATA[User Security]]></category>
		<category><![CDATA[workforce]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=490838</guid>

					<description><![CDATA[Secure Access adds Security Insights to speed up SOC Ops. Now, an analyst uses a three-click workflow, reducing investigation time from minutes to seconds.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/security-insights-a-threat-first-view/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Strategy to Architecture: How Cisco is Building a Quantum-Safe Future</title>
		<link>https://blogs.cisco.com/security/from-strategy-to-architecture-building-a-quantum-safe-future/</link>
					<comments>https://blogs.cisco.com/security/from-strategy-to-architecture-building-a-quantum-safe-future/#respond</comments>
		
		<dc:creator><![CDATA[Christian Chisholm]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 12:00:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Trust center]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Thought Leardership]]></category>
		<category><![CDATA[trusted access]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=490739</guid>

					<description><![CDATA[Dive into the architecture behind Cisco’s holistic, mutilayered PQC strategy to understand how Cisco is operationalizing the secure communications and secure products across the communication planes, inside the chipset, and down to the firmware that loads before your operating system even boots.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/from-strategy-to-architecture-building-a-quantum-safe-future/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Designing for What’s Next: Securing AI-Scale Infrastructure Without Compromise</title>
		<link>https://blogs.cisco.com/security/securing-ai-scale-infrastructure-without-compromise/</link>
		
		<dc:creator><![CDATA[Zack Kielich]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Hybrid Mesh Firewall]]></category>
		<category><![CDATA[Cisco Secure Firewall]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Firewall appliance]]></category>
		<category><![CDATA[Hardware Firewall]]></category>
		<category><![CDATA[intrusion prevention]]></category>
		<category><![CDATA[network firewall]]></category>
		<category><![CDATA[network security]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489595</guid>

					<description><![CDATA[6100 Series is an ultra-high-end firewall, delivering exceptional performance, line-rate threat protection, and modular scalability at AI-ready data centers.]]></description>
		
		
		
			</item>
		<item>
		<title>Preparing for Post-Quantum Cryptography: The Secure Firewall Roadmap</title>
		<link>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/</link>
					<comments>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/#respond</comments>
		
		<dc:creator><![CDATA[Bill Spry]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Secure Firewall]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Security Posture]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489120</guid>

					<description><![CDATA[Cisco Secure Firewall’s post-quantum cryptography roadmap: what’s available today, what’s coming, and how to start planning.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mobile World Congress 2026: AI-powered Network Security</title>
		<link>https://blogs.cisco.com/security/mwc-2026-soc/</link>
		
		<dc:creator><![CDATA[Jessica (Bair) Oppenheimer]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:05:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[catalyst]]></category>
		<category><![CDATA[Cisco Breach Protection]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco Security Cloud]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Cisco User Protection]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Mobile World Congress]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[ThousandEyes]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489376</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
		
		
			</item>
		<item>
		<title>Powering MWC Barcelona &#8211; Building a Unified SOC and NOC with Splunk in Record Time</title>
		<link>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/</link>
					<comments>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/#respond</comments>
		
		<dc:creator><![CDATA[Christian Cloutier]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:00:49 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489324</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI-powered Network Security at the Mobile World Congress 2026 SNOC</title>
		<link>https://blogs.cisco.com/security/mwc-2026-ai-network-security/</link>
		
		<dc:creator><![CDATA[Apostolos Kouloukourgiotis]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[catalyst]]></category>
		<category><![CDATA[Cisco Breach Protection]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco Security Cloud]]></category>
		<category><![CDATA[Cisco SSE]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Cisco User Protection]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489300</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin


Served from: blogs.cisco.com @ 2026-05-15 06:15:29 by W3 Total Cache
-->