Aimei Wei

Recent Outages Reveal Crucial Vulnerability in Security Infrastructure – and the Need for More Comprehensive Solutions

Microsoft and CrowdStrike occupied headlines for weeks after complications following a software update and a DDoS attack that left customers vulnerable and unable to access their data. While the two events were unrelated, the rapid succession of one failure after another leaves a very wide base of customers wondering exactly how much is at stake, […]

Recent Outages Reveal Crucial Vulnerability in Security Infrastructure – and the Need for More Comprehensive Solutions Read More »

Fighting AI with AI: Tools for the Twenty-First Century

In a recent conversation with a major educational institution’s CIO, the following circumstance arises: a university administrator is hiring for a position; of over 300 resumes that he receives, 95% of them look so similar that they could have come from the same person. And in a way, they did. With the proliferation of AI-powered

Fighting AI with AI: Tools for the Twenty-First Century Read More »

The Car Dealership Hack: Securing the Supply Chain

supply chain Open XDR Platform Open XDR Ai-Driven Security Cybersecurity The news earlier this week about the CDK hack reveals the major flaw—and prevalent issue—in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to

The Car Dealership Hack: Securing the Supply Chain Read More »

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators

Artificial intelligence (AI) has been transforming the cybersecurity landscape for over a decade, with machine learning (ML) speeding the detection of threats and identifying anomalous user and entity behaviors. However, recent developments in large language models (LLMs), such as OpenAI’s GPT-3, have brought AI to the forefront of the cybersecurity community. These models use documented

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators Read More »

Automated threat hunting

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack

A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created a huge fuel shortage for eastern and southern states, and forced Colonial Pipeline to pay a hefty $4.4 million ransom. Ransomware attacks have continued unabated since then, with the most recent ones

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack Read More »

AlienVault alternatives

The Three Waves of XDR – Open XDR delivers and extends the value of existing investments

We asked CIOs and CISOs what keeps them up at night, and the two main concerns are reducing security risks and improving analyst confidence and productivity. CxOs must report to corporate boards, and members of those boards are getting smarter about asking probing questions about the company’s security posture. CxOs need answers to those questions,

The Three Waves of XDR – Open XDR delivers and extends the value of existing investments Read More »

Extended detection and response

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, XDR is “a single, stand-alone solution that offers integrated threat detection and response capabilities.”  To meet Omdia’s

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR Read More »

Open XDR

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room

Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room Read More »

SIEM security

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages,

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure Read More »

SIEM tools

NDR vs. Open XDR – What’s the difference?

Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR? NDR is special because it focuses on the nerve center of an organization’s IT infrastructure: the network. Wireless or wired device, endpoint or server, application, user or cloud – all

NDR vs. Open XDR – What’s the difference? Read More »

Automated threat hunting

With Stellar Cyber’s Open XDR, No EDR is an Island

Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and this extends to EDR systems as well as NGFW, vulnerability management, identity management, SOAR and other solutions. EDR has been in the news lately because some EDR vendors have acquired log management companies to flesh out a solution for the

With Stellar Cyber’s Open XDR, No EDR is an Island Read More »

EDR Software

How Stellar Cyber Addresses Data Storage Pain

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as much data as they can and store it as long as they want. However, everything has its limitations. For example, the high long-term storage costs, the slow speed of search/query and infrastructure requirements are common

How Stellar Cyber Addresses Data Storage Pain Read More »

Scroll to Top