- Our Favorite Topics:
Cisco Live Melbourne Case Study: Cisco Live TMC Experience and DDoS
4 min read
Explore a Cisco TME's experience in the Cisco Live SOC, detailing efficient onboarding, incident escalation, and a real-world DDoS attack investigation and response.
In Splunk, Empty Fields May Not Be Null
2 min read
Splunk's coalesce function treats empty fields as non-null. Learn to use Splunk macros to convert empty strings to nulls for accurate data selection and reliable detections.
Firewall and Splunk ESCU Integration at the Cisco Live Melbourne SOC
3 min read
Cisco Live SOC adapted Splunk ESCU detections for Cisco Secure Firewall syslog. Learn to modify macros and promote EVE events to incidents for enhanced threat visibility and response.
Delivering on the Mission to Educate: A Recap of the Cisco Live Melbourne 2025 SOC Tours
3 min read
Recap Cisco Live Melbourne SOC tours: See how Cisco XDR and Splunk Enterprise Security integrate for rapid threat containment, enhanced visibility, and analyst empowerment.
Cisco Live Melbourne Case Study: Investigation Into a High Traffic Spike
2 min read
Learn how Cisco XDR, Splunk, and Firewall were used at Cisco Live Melbourne to rapidly investigate and resolve a malicious traffic spike incident on attendee Wi-Fi.
Hunting Compromised Credentials in Real Time: Integrating StealthMole With Cisco XDR at Cisco Live Melbourne
2 min read
Learn how Cisco XDR integrates with StealthMole for real-time dark web threat intelligence, enabling SOC teams to rapidly identify and respond to compromised credentials.
Beyond the First Clue: XDR Forensics at Cisco Live Melbourne 2025
3 min read
SOC teams need more evidence for deep investigations. Learn how Cisco XDR Forensics provides rich, interactive data to trace complex attacks and uncover malicious content.
The Segmentation Cycle: A Practical Approach to Network Security
3 min read
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
Segmentation Remains a Foundational Security Concept
4 min read
The 2025 Cisco Segmentation Report shows that the concept’s adaptability makes it a foundational cornerstone for modern enterprise security strategies.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services