Refresh

This website stellarcyber.ai/2022/04/ is currently offline. Cloudflare's Always Online™ shows a snapshot of this web page from the Internet Archive's Wayback Machine. To check for the live version, click Refresh.

Stellar Cyber Open XDR - logo
Search
Close this search box.

April 2022

SOC platform

Fireside Chats. Protect Enterprises From Cybercrime. Steve Garrison, VP of Marketing, Stellar Cyber.

Cybercrime Magazine · Fireside Chats. Protect Enterprises From Cybercrime. Steve Garrison, VP of Marketing, Stellar Cyber. Fireside Chats is a Cybercrime Magazine podcast series brought to you by Stellar Cyber. On this episode, host Zack Hack is joined by Steve Garrison, VP of Marketing at Stellar Cyber, to talk best practices for protecting enterprises from …

Fireside Chats. Protect Enterprises From Cybercrime. Steve Garrison, VP of Marketing, Stellar Cyber. Read More »

Open XDR security services

Open XDR In the Real World – Q&A With Jon Mayled

In this interview, we capture real-world experience and recommendations from an enterprise that implemented Stellar Cyber’s Open XDR platform. We talked with Jon Mayled, International IT and Security Director at PlastiPak Packaging, Inc., about what he learned during his implementation.   SC: What is required to implement a successful XDR program? JM: Although I recommend …

Open XDR In the Real World – Q&A With Jon Mayled Read More »

Endpoint detection and response tools

Keys to a Successful XDR Implementation

Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or context only creates irrelevant noise that frustrates and distracts analysts. Without an integrated platform to correlate all that data, security teams become buried in an overwhelming amount of false alerts.  XDR is specifically designed to incorporate …

Keys to a Successful XDR Implementation Read More »

SOC platform

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting …

Cybersecurity Infrastructure Needs a New Model Read More »

Network detection and response

Going SOCless

According to the FBI, the number of cyberattacks reported to their Cyber Division is up 400 percent compared to pre-pandemic levels, and attacks are getting worse. From financial sites to healthcare sites to government sites to supply chain industries, no one is safe from these attacks. The traditional defense against these threats is the Security …

Going SOCless Read More »

Scroll to Top