When we releasedLlama-3.1-FoundationAI-SecurityLLM-base-8B (Foundation-sec-8B)in April, we proved that an eight-billion-parameter model-trained exclusively on security data-can outperform general-purpose LLMs many times its size on cybersecurity benchmarks. Practitioners loved the results, yet they kept asking:
"Can I interact with it like ChatGPT-no extra scaffolding, just prompt and go?"
Now you can.Llama-3.1-FoundationAI-SecurityLLM-instruct-8B (Foundation-sec-8B-Instruct)layers instruction fine-tuning on top of our domain-focused base model, giving you a chat-native copilot that understands security context and follows natural-language directions straight out of the box.
Foundation-sec-8B-Instruct delivers heavyweight security performance in an eight-billion-parameter form factor. In independent evaluations, it outperforms larger models while remaining small enough to run on a single high-memory GPU.
Benchmark | Foundation-sec-8B-Instruct | Llama-3.1-8B-Instruct | Llama-3.1-70B-Instruct | GPT-4o-mini |
---|---|---|---|---|
CTI-RCM | 0.692 | 0.558 | 0.623 | 0.655 |
Just as importantly, Foundation-sec-8B-Instruct maintains strong general-language performance on broad tests such as MMLU. That means it can fluidly explain threat behavior, support long-form investigation narratives, and respond naturally in chat workflows-without compromising its security focus or demanding oversized infrastructure.
Security Operations Centers (SOC)face relentless alert noise, fragmented tooling, and chronic staffing gaps. In pilots across Cisco CSIRT and Cisco XDR, Foundation-sec-8B-Instruct classifies alerts, maps observables to MITRE tactics, reconstructs timelines, and drafts investigation reports-cutting false positives and accelerating triage so analysts can focus on real threats.
Application Security (AppSec)teams juggle code reviews, threat models, and red-team planning with limited expert bandwidth. Early deployments at SBG Product Security, Meraki, and the S&TO Web-Application Security group use Foundation-sec-8B-Instruct to simulate attack paths, generate threat-model diagrams, review code against OWASP guidelines, and craft custom payloads, shifting work from reactive fixes to proactive design.
Because Foundation-sec-8B-Instruct is instruction-tuned, most workflows need only a well-crafted prompt or a simple retrieval template-no additional training loop required.
Foundation-sec-8B-Instruct is a milestone, but it is far from the final destination. Our roadmap focuses on unlocking richer context, tighter structure, and broader data modalities, so the model will be able to handle every artifact defenders rely on-without bolting on extra infrastructure. In the near term you can expect:
Foundation-sec-8B-Instructis live, open, and ready to defend. Download it, prompt it, and help shape the future of AI-powered cybersecurity.
Contributors:Sajana Weerawardhena, Paul Kassianik, Blaine Nelson, Baturay Saglam, Anu Vellore, Aman Priyanshu, Supriti Vijay, Massimo Aufiero, Fraser Burch, Arthur Goldblatt, Konstantin Goldin, Alie Fordyce, Dhruv Kedia, Zhouran Yang, Ed Li, Jianliang He, Kojin Oshiba, Yaron Singer, Amin Karbasi
We'd love to hear what you think! Ask a question and stay connected with Cisco Security on social media.
Cisco Security Social Media
LinkedIn
Facebook
Instagram
X