Manual triage often slows down incident response. Learn how we integrated an 8-billion parameter security LLM into Cisco XDR to summarize alerts and trace attack paths in real time.
Building a secure network for thousands of cybersecurity experts in just three days requires intense collaboration. Discover the hardware, software, and engineering behind the Black Hat Europe NOC.
For a decade, Cisco has secured Black Hat events with DNS security. Learn how the evolution to Cisco Secure Access provided visibility into 66 million queries and 6,000 unique apps in London.
Rented hardware often carries digital baggage from previous users. Discover how our NOC team used JA3 fingerprints and Cisco XDR to track down unauthorized P2P syncing in London.
When security analysts lack endpoint context, identifying the root cause of a network connection is difficult. Discover how a simple automation workflow enriched XDR incidents with DNS data in minutes.
Just last year, Rwandan Minister of IT and Innovation Paula Ingabire called on countries to come together to confront cyber threats that are now unfolding at global scale. As she noted, emerging technologies—from AI and robotics to IoT and
Tasks that once took hours now take minutes. See how Cisco and Red Hat’s expanded Ansible automation capabilities—including over 100 modules and a comprehensive Cisco Validated Design—are helping IT teams reclaim time and reduce operational
A new analyst shares their Cisco Live SOC experience, covering quick onboarding, using Cisco XDR and Endace for incident investigation, and building confidence in threat response.