Stellar Cyber Open XDR - logo
Search
Close this search box.

2019

Open XDR

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@PaloAltoNtwks), Trend Micro (@TrendMicro) and LogRythm (@LogRhythm) all talk to “XDR” (extended detection and response in IT infrastructure) …

XDR Without Limits Read More »

AlienVault alternatives

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI (IMAGE COURTESY OF BIGSTOCK.COM) As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In …

A brief history of machine learning in cybersecurity Read More »

Open XDR

A Platform to Support XDR

Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response can be preventive (think about it). Second, if you substitute enterprise systems and devices for endpoints, then EDR evolves to XDR (AKA extended-DR). And third, if you have a great security platform, then …

A Platform to Support XDR Read More »

XDR

Introducing “Swipe Left” Security

You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more upstream – or left – toward where the development processes are initiated. As you progress from Development to Q/A and then Production (moving right), there is more underlying thinking about end-to-end …

Introducing “Swipe Left” Security Read More »

Network Detection and Response Platform

Security as a Service – Where do I start?

Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be focusing  on security these days. For an MSP adding security services, or an MSSP looking to target a new market segment, here are the common questions I frequently get when …

Security as a Service – Where do I start? Read More »

Network detection and response tools

Bundling Security Services to Improve Pricing and Close Ratios

Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has been away from a’ la carte menus to limited menus, because it’s easier, more efficient, and requires less skill to produce a few entrée/side dish combinations than to try to fulfill each …

Bundling Security Services to Improve Pricing and Close Ratios Read More »

Firewall Traffic Analysis

New Ransomware called LooCipher has been found in the Wild

According to Bleeping Computer, a new ransomware called LooCipher has been found in the wild. https://www.bleepingcomputer.com/news/security/new-loocipher-ransomware-spreads-its-evil-through-spam/   In usual fashion, it is impacting users through spam.  Unsuspecting users are opening the phishing email, clicking on the link, giving the file authorization to use macros, and ultimately getting the malicious file installed. In 2011, Lockheed Martin is …

New Ransomware called LooCipher has been found in the Wild Read More »

Automated threat hunting

Stellar Cyber with John Peterson, Chief Product Officer

On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber (stellarcyber.ai) an innovative cyber security company using artificial intelligence (AI) and machine learning (ML) to empower SMBs (small and medium sized businesses) to gain access to the same types of advanced security tools that …

Stellar Cyber with John Peterson, Chief Product Officer Read More »

EDR Software

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.

DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims. According to Techcrunch the hackers first compromised the intended target via spearphishing.  They then used known exploits to target servers and routers and move laterally within the network.  In that process, the …

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims. Read More »

Scroll to Top