Articles
Integrating With Cisco XDR at Black Hat Europe
2 min read
Investigating indicators of compromise (IOCs) requires a unified view of security data. See how we integrated Cisco XDR with third-party tools and open-source models at Black Hat Europe.
Firewall and Splunk ESCU Integration at the Cisco Live Melbourne SOC
3 min read
Cisco Live SOC adapted Splunk ESCU detections for Cisco Secure Firewall syslog. Learn to modify macros and promote EVE events to incidents for enhanced threat visibility and response.
GovWare Captive Portal: (Splash Page)
5 min read
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
SOC in a Box Hardware Refresh
3 min read
Learn about the "SOC in a Box" hardware refresh the team deployed for GovWare 2025.
Securing DNS With Umbrella at Black Hat
2 min read
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
Refining SSO at Black Hat USA
6 min read
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future at Black Hat USA 2025.
Building an XDR Integration With Splunk Attack Analyzer
1 min read
Cisco XDR is an infinitely extensible platform for security integrations. Like the maturing SOCs of our customers, the event SOC team at Cisco Live San Diego 2025 built custom integrations to meet our needs. You can build your own integrations using the community resources announced at Cisco Live. It was an honor to work with […]
Using AI to Battle Phishing Campaigns
4 min read
Cisco Security and Splunk protected Cisco Live San Diego 2025 in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
Black Hat Asia 2025: Identity Intelligence
3 min read
Last year, Black Hat asked Cisco Security if we could be the Single Sign-On (SSO) provider for all the partners in the Black Hat NOC. The idea is to centralize our user base, make access to products easier, provide easier user management, and to show role-based access. We started the proof-of-value at Black Hat Asia […]
- 1
- 2
2