Steve Garrison

XDR

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention Systems to screen traffic coming into the network, but as IT and security technology have evolved, the […]

Q&A on Network Detection and Response (NDR) Read More »

Firewall Traffic Analysis

An Integrated TIP for Simplified and Efficient Security Operations

Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as possible. This typically includes subscribing to one or more threat intelligence feeds from third-party organizations. As an open platform with a mission to integrate all important security data and tools, Stellar Cyber’s

An Integrated TIP for Simplified and Efficient Security Operations Read More »

Open XDR security services

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No

Cyberthreats Go Sideways Read More »

NDR platform

IUWorld Cybersecurity Governance, Risk & Compliance

Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the 2nd Episode of IUWorld Thought Leadership Series in Cybersecurity GRC – Governance Risk & Compliance. A big welcome to all of you who have joined us in this webinar. 1st of all, let me introduce the team. My name is Jeff

IUWorld Cybersecurity Governance, Risk & Compliance Read More »

SIEM platform

IUWorld Cybersecurity Governance, Risk & Compliance

Part I: Demystifying Cyber Health and Cyber Threat Hunting  JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting is? SNEHAL: Jeff, thanks for hosting us. First let’s talk to what a cyber threat is -– someone is trying to take your data by breaking into your critical digital systems.

IUWorld Cybersecurity Governance, Risk & Compliance Read More »

SIEM alternatives

Leverage the tools and telemetry you trust

The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications moving to the cloud, cybersecurity professionals are challenging best practices and once-thought foundational assumptions. Is a platform with tightly integrated native capabilities the right foundation for the future security instead of siloed

Leverage the tools and telemetry you trust Read More »

Network detection and response

What is Network Security?

The historical definition of network security is to use a firewall to screen users coming into the network, but as IT technology and security technology have evolved, the definition is much broader now. Today, network security is everything a company does to ensure the security of its networks and everything connected to them. This includes

What is Network Security? Read More »

SIEM replacement

Red Team – Blue Team Testing – The Big Picture

Ever since offensive security testing began, we have expected that the test or simulation will find something. Even if a pen tester doesn’t uncover an issue, the best ones can always achieve success through phishing or social engineering of your organization’s employees. In the same way, Red Team-Blue Team exercises highlight the near impossibility of

Red Team – Blue Team Testing – The Big Picture Read More »

AlienVault alternatives

When is Enough, Enough?

Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional challenges to protecting the enterprise, is the SIEM the go-forward core of a next-gen security operations center (SOC), or is it time to consider new ideas? We discuss daily the cybersecurity

When is Enough, Enough? Read More »

Network detection and response

What Is Cybersecurity?

Cybersecurity is in the news a lot, and typically in a bad way. We learn about Cybersecurity through well-publicized cyberattacks on major financial institutions, corporations, social media platforms, hospitals and cities. These attacks cost organizations and individuals billions of dollars a year, and hackers show no signs of slowing down. If anything, attacks are growing

What Is Cybersecurity? Read More »

Network detection and response

Cybersecurity Challenges and Solutions

Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data, damage to hardware or software, or disruption of the services they provide. The world now relies heavily on computers and networks to facilitate movement of a vast range of goods and services, and Cybersecurity has become more and more important. Cybercriminals

Cybersecurity Challenges and Solutions Read More »

Next Gen SIEM

Big companies are not immune to Ransomware!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief

Big companies are not immune to Ransomware! Read More »

Open XDR Platform

Why XDR?
(Extended Detection and Response)

Why XDR (Extended Detection and Response) ? Timing is everything   As the security industry wrestles with current security infrastructure, the cries of…  Too many point security products Too many blind spots  Too much noise and thus alert fatigue Too late to find attacks  Too slow to investigate, to hunt and to respond Too much

Why XDR?
(Extended Detection and Response)
Read More »

Open XDR

What is XDR ?
(Extended Detection and Response)

There’s a new acronym out there in the security space: it’s XDR (Extended Detection and Response). But why do we need yet another acronym and should you care? Over the last several years, many analyst groups have tried to capture the idea of more complex attacks and how to build best practices to put the

What is XDR ?
(Extended Detection and Response)
Read More »

SIEM application

A Single PAIN of Glass

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief

A Single PAIN of Glass Read More »

Open XDR

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@PaloAltoNtwks), Trend Micro (@TrendMicro) and LogRythm (@LogRhythm) all talk to “XDR” (extended detection and response in IT infrastructure)

XDR Without Limits Read More »

Scroll to Top