Posts

5 min read 🎧 Podcast

E3 - Zero Trust, what's the latest?

> 🎙️ This post was auto-generated from the [Tech Updates podcast](https://rss.com/podcasts/tech-updates-by-andres-sarmiento/2517328) episode. # Zero Trust Adoption is Accelerating: Here's What You Need to Know The security landscape is shifting beneath our feet, and zero trust is no longer a buzzword—it’s becoming the standard that government agencies and enterprises expect you to implement. With recent NSA guidance, major partnerships forming around critical infrastructure, and security vendors racing to expand their federal presence, the zero trust movement has reached an inflection point that every IT professional needs to understand.

5 min read 🎧 Podcast

CLUS 25 - AI-Ready Data Centers

> 🎙️ This post was auto-generated from the [Tech Updates podcast](https://rss.com/podcasts/tech-updates-by-andres-sarmiento/2100679) episode. # Transforming Your Data Center for the AI Era: Cisco Live 2025 Innovations AI isn’t coming to your data center—it’s already there. And if your infrastructure isn’t ready for it, you’re about to face some serious challenges. At Cisco Live 2025, one of the strongest focal points was helping organizations transform their data center infrastructure to handle the massive, unprecedented demands of AI workloads. Let’s break down what Cisco announced and why it matters for your organization.

5 min read 🎧 Podcast

CLUS 25 - Cisco's Technology Vision for the Future

> 🎙️ This post was auto-generated from the [Tech Updates podcast](https://rss.com/podcasts/tech-updates-by-andres-sarmiento/2098101) episode. As artificial intelligence reshapes the technology landscape, Cisco is charting a bold new course for the future of networking and security. During Cisco Live 2025 in San Diego, company executives laid out a strategic vision that places AI agents and autonomous applications at the center of network architecture—forcing organizations to rethink everything they thought they knew about infrastructure. What This Episode Covers The emergence of “agentic AI” and what it means for enterprise networks How autonomous applications and AI bots will fundamentally change network demands The need for reimagined network architecture to handle unprecedented data scales Cisco’s unified platform strategy for the AI-driven era Embedding intelligence across the networking and security portfolio Building adaptive, secure, and operationally efficient networks for tomorrow Deep Dive The Agentic AI Era is Here We’re not talking about the ChatGPT-style AI that responds to prompts. Agentic AI represents a fundamentally different paradigm—autonomous agents and bots that can perceive their environment, make decisions, and take action with minimal human intervention. These aren’t tools you query; they’re systems that operate independently, managing tasks, making trade-offs, and learning from outcomes.

Secure Client (AnyConnect) + Secure Endpoint - Quick Deployment Guide
2 min read

Secure Client (AnyConnect) + Secure Endpoint - Quick Deployment Guide

Quick post on Implementing Cisco Secure Endpoint leveraging Cisco Secure Client Cloud Deployment - Cool stuff and easy to deploy and implement First go to SecureX (https://securex.us.security.cisco.com) Click the Insights Tab Go to Deployment Management on the Left SideBar On the right Go to –> + Create New Add a name and Click Save Under the Cloud Management Section, you will have 2 options – Depending on your needs you can have it to AutoUpdate or NoAutoUpdate. This is a cool feature and will be the best way to keep the Core Modules updated

5 min read

Cybersecurity Incident Response - Basics and How to get Started

Today I want to start off by sharing a few things that I have been researching for a while. I have had a lot of curiosity about incident response, I want to understand how it works, what is expected from an IR team, and much more. For the last few days, I have also been asking my new friend ChatGPT about it so that I can get some of the answers and things that go on during an Incident Response engagement.

9 min read

Cybersecurity Incident Response - Detection and Analysis (Tools and Indications)

I consider it should be a good idea to start with a quick overview or list of Attack Vectors before we dive right into what goes into the Detection and Analysis phase. Companies should be able to prepare and have plans around common attack vectors, and what to do in those cases, we went over that in our previous post, but this time as a refresher, here is a non-exhaustive list of common attack vectors:

7 min read

Cybersecurity Incident Response - Preparation

I want to take the opportunity to break down what goes into the preparation for incident response and what things could like from the perspective of an infosec professional. Going back to NIST, there are a few things that are considered: Part of a well-defined IR Plan includes things like creating an IR Policy and plan, and what tools will be used for performing incident handling and reporting. A determined team structure, who are the players?, lead Engineers? who is in charge of collecting forensic data? what happens during the eradication and recovery phases, and who is in charge? Should these functions be assigned to a team or an individual? - A well-described line of communication between teams and technical and executive teams (Yeah - Executives need to be involved)

Secure Client (AnyConnect) - How to configure Secure Client 5.x Using SecureX Insights
6 min read

Secure Client (AnyConnect) - How to configure Secure Client 5.x Using SecureX Insights

Last year AnyConnect went through an interesting transformation, its name changed to Secure Client, and looks like Cisco realized that the amount of information that could be collected from it and other services, makes it a good data mine for Security context and information. But what is the buzz about, what changed? A few interesting things changed, and one of the most important things that changed was the way to deploy it or roll it out to an environment.

SASE - Configuring Umbrella Security - Basic Setup - DNS Server Forwarding
5 min read

SASE - Configuring Umbrella Security - Basic Setup - DNS Server Forwarding

Today I want to create a quick blog post that goes over setting up Umbrella in a few different ways, you may notice that these will be long posts, so I will have to break this into a few different posts over the coming weeks. If you are new to Cisco Umbrella, well here is a quick explanation of what it is and how it works: Cisco Umbrella offers flexible, cloud-delivered security. It combines multiple security functions into one solution, so you can extend data protection to devices, remote users, and distributed locations anywhere. Umbrella is the easiest way to effectively protect your users everywhere in minutes.

SASE - Configuring Umbrella Security - Basic Setup - How to integrate Umbrella with FMC
5 min read

SASE - Configuring Umbrella Security - Basic Setup - How to integrate Umbrella with FMC

Hey we are back, this time I want to explore the section of the deployment of Umbrella, where we can configure a device to communicate and forward all traffic to Umbrella We will concentrate on the section for Network Devices this time: The main idea of this integration is that the devices will become an Identity, which you can use later to apply policy under any of your settings inside Umbrella