<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security @ Cisco Blogs</title>
	<atom:link href="https://blogs.cisco.com/security/feed" rel="self" type="application/rss+xml" />
	<link>https://blogs.cisco.com/security</link>
	<description></description>
	<lastBuildDate>Thu, 16 Apr 2026 21:56:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://blogs.cisco.com/gcs/ciscoblogs/1/2024/09/cropped-Cisco-logo-thumb-sky-blue-150x150.jpg</url>
	<title>Security @ Cisco Blogs</title>
	<link>https://blogs.cisco.com/security</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Designing for What’s Next: Securing AI-Scale Infrastructure Without Compromise</title>
		<link>https://blogs.cisco.com/security/securing-ai-scale-infrastructure-without-compromise/</link>
		
		<dc:creator><![CDATA[Zack Kielich]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Hybrid Mesh Firewall]]></category>
		<category><![CDATA[Cisco Secure Firewall]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Firewall appliance]]></category>
		<category><![CDATA[Hardware Firewall]]></category>
		<category><![CDATA[intrusion prevention]]></category>
		<category><![CDATA[network firewall]]></category>
		<category><![CDATA[network security]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489595</guid>

					<description><![CDATA[6100 Series is an ultra-high-end firewall, delivering exceptional performance, line-rate threat protection, and modular scalability at AI-ready data centers.]]></description>
		
		
		
			</item>
		<item>
		<title>Preparing for Post-Quantum Cryptography: The Secure Firewall Roadmap</title>
		<link>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/</link>
					<comments>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/#respond</comments>
		
		<dc:creator><![CDATA[Bill Spry]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Secure Firewall]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Security Posture]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489120</guid>

					<description><![CDATA[Cisco Secure Firewall’s post-quantum cryptography roadmap: what’s available today, what’s coming, and how to start planning.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/preparing-for-post-quantum-cryptography-the-secure-firewall-roadmap/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mobile World Congress 2026: AI-powered Network Security</title>
		<link>https://blogs.cisco.com/security/mwc-2026-soc/</link>
		
		<dc:creator><![CDATA[Jessica (Bair) Oppenheimer]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:05:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[catalyst]]></category>
		<category><![CDATA[Cisco Breach Protection]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco Security Cloud]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Cisco User Protection]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Mobile World Congress]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[ThousandEyes]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489376</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
		
		
			</item>
		<item>
		<title>Powering MWC Barcelona &#8211; Building a Unified SOC and NOC with Splunk in Record Time</title>
		<link>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/</link>
					<comments>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/#respond</comments>
		
		<dc:creator><![CDATA[Christian Cloutier]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:00:49 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489324</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/powering-mwc-barcelona-building-a-unified-soc-and-noc-with-splunk-in-record-time/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI-powered Network Security at the Mobile World Congress 2026 SNOC</title>
		<link>https://blogs.cisco.com/security/mwc-2026-ai-network-security/</link>
		
		<dc:creator><![CDATA[Apostolos Kouloukourgiotis]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[catalyst]]></category>
		<category><![CDATA[Cisco Breach Protection]]></category>
		<category><![CDATA[Cisco Firepower]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Secure Firewall 6100]]></category>
		<category><![CDATA[Cisco Secure Malware Analytics]]></category>
		<category><![CDATA[Cisco Security Cloud]]></category>
		<category><![CDATA[Cisco SSE]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Cisco User Protection]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Malware Analytics]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[secure access]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489300</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Splunk to bring them together.]]></description>
		
		
		
			</item>
		<item>
		<title>Inside the Mobile World Congress 2026 SOC: Detecting Shadow Traffic with Firepower 6100</title>
		<link>https://blogs.cisco.com/security/mwc-2026-firepower6100/</link>
					<comments>https://blogs.cisco.com/security/mwc-2026-firepower6100/#respond</comments>
		
		<dc:creator><![CDATA[Christopher Grabowski]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[catalyst]]></category>
		<category><![CDATA[Cisco Breach Protection]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Cisco Security Cloud]]></category>
		<category><![CDATA[Cisco SSE]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Cisco User Protection]]></category>
		<category><![CDATA[Cisco XDR]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Firepower]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Mobile World Congress]]></category>
		<category><![CDATA[Network Operations Center NOC]]></category>
		<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Center SOC]]></category>
		<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Splunk Enterprise Security]]></category>
		<category><![CDATA[ThousandEyes]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489423</guid>

					<description><![CDATA[Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Cisco Secure Firewall 6100, Secure Access, Cisco XDR and Splunk to bring them together.]]></description>
		
					<wfw:commentRss>https://blogs.cisco.com/security/mwc-2026-firepower6100/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Optimization in Security: A Splunk Architect’s Perspective</title>
		<link>https://blogs.cisco.com/security/data-optimization-in-security-splunk-architects-perspective/</link>
		
		<dc:creator><![CDATA[Jeff Yeo]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data center security]]></category>
		<category><![CDATA[data security]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=489055</guid>

					<description><![CDATA[Learn how to design security data optimization around detection engineering, Splunk architecture, and faster incident response outcomes.]]></description>
		
		
		
			</item>
		<item>
		<title>Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders</title>
		<link>https://blogs.cisco.com/security/inside-the-talos-2025-year-in-review/</link>
		
		<dc:creator><![CDATA[Hazel Burton]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[Common Vulnerabilities and Exposures (CVE)]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=488487</guid>

					<description><![CDATA[A conversation between Cisco Talos and Cisco Security leaders on identity, vulnerabilities, and what defenders should focus on in 2025.]]></description>
		
		
		
			</item>
		<item>
		<title>Zero Trust for Agentic AI: Safeguarding your Digital Workforce</title>
		<link>https://blogs.cisco.com/security/security-agentic-ai-how-cisco-brings-zero-trust-to-your-new-digital-workforce/</link>
		
		<dc:creator><![CDATA[Raj Chopra]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[Cisco AI Defense]]></category>
		<category><![CDATA[Cisco Duo]]></category>
		<category><![CDATA[Cisco Secure Access]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://blogs.cisco.com/?p=488008</guid>

					<description><![CDATA[85% of enterprises are experimenting with AI agents—autonomous systems that lack judgment and disregardconsequences. Cisco announces Zero Trust for AgenticAI, integrating identity, access, and behavioral controlsto secure your adoption of AI.]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin


Served from: blogs.cisco.com @ 2026-04-23 15:13:15 by W3 Total Cache
-->