Help Us Keep You in the AI Driver’s Seat

Help Us Keep You in the AI Driver’s Seat

Cisco Learning & Certifications is on a mission to provide you with AI learning that checks off all your boxes for meaningful, interesting, and relevant learning. We want to help you embrace the capabilities of AI to improve your work, no matter your role—and use AI as a resource to help you become more effective—now and into the future. It’s all about potential. But we do need the most complete picture we can get about…

Read More

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

The traditional Intrusion Detection Systems (IDS) have depended on rule-based or signature-based detection, which are challenged by evolving cyber threats. Through the introduction of Artificial Intelligence (AI), real-time intrusion detection has become more dynamic and efficient. Today we’re going to discuss the various AI algorithms that can be investigated to identify what works best when it comes to identifying anomalies and threats in firewall security. Exploring AI Algorithms for Intrusion Detection Random Forest (RF) is a machine learning algorithm that generates several decision trees and aggregates their predictions in order to classify network traffic as malicious or normal. RF is extremely popular in IDS due to its fast processing, interpretability, and ability…

Read More

RSA 2025 Product Preview

RSA 2025 Product Preview

RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors. 1Password Automatically Generates Passwords 1Password’s built-in password generator creates secure passwords for all online accounts. Users can go passwordless by saving and signing in to compatible websites and apps with passkeys. Save and autofill passwords, two-factor authentication codes, financial addresses, and more in…

Read More

The Shift Redefining Physical Identity Management

The Shift Redefining Physical Identity Management

Every time a security breach occurs, organizations scramble to trace the failure. Often, the answer lies not in their policies, but in outdated identity management systems ill-equipped to meet today’s demands. Legacy PIAM systems were designed for a simpler time, before the rise of hybrid workplaces, AI-driven security tools, and Zero Trust principles. Yet, these systems persist, plagued by limitations in scalability, integration, and security. They fail to provide real-time insights, leaving organizations vulnerable to…

Read More

The AI arms race in cybersecurity: Why trust is the ultimate defense

The AI arms race in cybersecurity: Why trust is the ultimate defense

Artificial intelligence (AI) is reshaping cybersecurity at a pace that few anticipated. It is both a weapon and a shield, creating an ongoing battle between security teams and cybercriminals. Organizations are using AI to detect threats faster, automate responses, and strengthen defenses. At the same time, attackers are deploying AI to craft highly convincing phishing campaigns, evade detection, and exploit vulnerabilities at speeds human hackers never could. This arms race is redefining the cybersecurity landscape,…

Read More

The relationship between regulation, innovation, and AI governance

The relationship between regulation, innovation, and AI governance

Igor Omilaev via Unsplash The AI landscape has shifted dramatically so far in 2025. With decades of experience in helping organizations with best practices in privacy, data protection, security, and compliance, I’ve noticed something fascinating — the regulatory pendulum for AI has swung in an unexpected direction. In the new administration, technology companies who previously kept Washington at an arm’s length are actively engaging with policymakers, trying to shape a future where American AI faces…

Read More

Spring Training for Success: What Sports Taught Me About Customer-Focused Partner Readiness

Spring Training for Success: What Sports Taught Me About Customer-Focused Partner Readiness

I still remember that American Amateur Baseball Congress (AABC) championship game where, with the scoreboard reading 1-1 in the final inning, a ground ball shot toward me and everything slowed down. The crucial double-play required absolute precision – one fraction of an inch off, and our season would end. We executed flawlessly, setting up the game-winning home run moments later. Years later at Lawrence Stadium in Wichita, Kansas, I found myself in an even bigger…

Read More

Mitigating the hidden risks of AI in security and SOCs

Mitigating the hidden risks of AI in security and SOCs

AI is transforming both Security Operations Centers (SOCs) and security as a whole. Yet with new opportunities come new risks. One of the biggest challenges in security today is how to manage AI’s inherent unpredictability, especially for complex tasks. In this article, we’ll take a closer look at the specific hurdles of using AI in security (specifically in your SOC), and how a modular, focused approach can mitigate these risks.   The challenge of AI…

Read More

Network Engineers: I Don't Want to Be an AI Babysitter

Network Engineers: I Don't Want to Be an AI Babysitter

I get more excited every day as I learn something new. However, I also have my fair share of concerns about the future—specifically on the topic of AI and how it will impact the role of network engineers. Okay… I probably have more than my fair share of concerns. (That won’t come as a surprise if you’ve been following the last few years of my journey, exploring the “AI FUTURE!!!”) First off, I want to…

Read More

Prioritizing security while adopting AI agents

Prioritizing security while adopting AI agents

In this episode of The Security Podcasts featuring Michael Bargury, Co-Founder & CTO at Zenity, we discuss best practices for securely implementing AI agents. “People from outside of the organization, they can send you an email — they can send you a teams message — that ends up being internal data. And so, when you have these agents that are operating within the enterprise, and they are operating on behalf of users, if an attacker…

Read More
1 2 3 33