Search
Close this search box.

Steve Salinas

Are You Competing with Your Vendor?

The rise of the managed security service provider (MSSP) has provided a lifeline to many security teams that struggle to deliver the security outcomes their organizations demand. By partnering with a company whose sole purpose is to provide security services, security teams of any size in any industry can immediately uplevel their security posture while …

Are You Competing with Your Vendor? Read More »

Five Reasons LevelBlue (formerly AT&T Cybersecurity, formerly AlienVault) customers are moving to Stellar Cyber

One thing is for sure about 2024: There has been no shortage of drama in the vendor landscape for cybersecurity teams. With four significant transactions and dozens of other smaller ones, the vendor landscape will no doubt look a lot different this time next year. One company that has bounced more than most is AlienVault. …

Five Reasons LevelBlue (formerly AT&T Cybersecurity, formerly AlienVault) customers are moving to Stellar Cyber Read More »

Five Reasons IBM QRadar SIEM On-Premises Users Evaluate and Choose Stellar Cyber Open XDR

By now, everyone knows the SIEM market is experiencing a never-before-seen consolidation, causing many security teams to re-evaluate their current SIEM products. That said, no user base is taking the brunt of this chaos more than current IBM QRadar On-premises SIEM users. This customer base is much like a 3rd baseman whose contract expires at …

Five Reasons IBM QRadar SIEM On-Premises Users Evaluate and Choose Stellar Cyber Open XDR Read More »

Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake

One of the challenges security teams face is managing the vast quantity of data required to identify threats effectively. While each new security control deployed brings new capabilities intended to improve security posture, it also brings with it another set of data to manage. Most organizations deploy a SIEM to consolidate data for analysis; a …

Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake Read More »

We Need to Talk: Breaking up with Your SIEM Vendor

Relationships are challenging at times. Think of it like a seesaw. Like in a seesaw, every relationship, be it with your partner, a family member, or a friend, requires effort from both sides to keep it balanced and healthy. But what happens when one person pushes while the other is just along for the ride? …

We Need to Talk: Breaking up with Your SIEM Vendor Read More »

In a Cloudy World, On-Premises Still Might be The Way To Go

In 2012, I worked for one of the first vendors to deliver security-as-a-service. In those days, securing your environment from the cloud was cutting-edge, and many security teams were leery of introducing what they perceived as another point of failure into their security framework. Today, deploying a SIEM, XDR, or SecOps platform on bare metal …

In a Cloudy World, On-Premises Still Might be The Way To Go Read More »

Data Management Approaches: Schema-on-Read vs. Schema-on-Write

Effective cybersecurity begins and ends with data. Since attackers can deploy their payloads in seconds, ensuring your security team isn’t waiting minutes or hours for their security operations platform to notice an attack is underway can mean the difference between an isolated threat and a widespread compromise. While most modern cybersecurity products can detect threats …

Data Management Approaches: Schema-on-Read vs. Schema-on-Write Read More »

SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil

As I wrote a couple of weeks ago, it is evident that the long-anticipated consolidation of security products and vendors is well underway. With significant market players Exabeam and LogRyhthm merging, Splunk now officially under the umbrella of Cisco, and Palo Alto Networks scooping up IBM QRadar SIEM Cloud business, the market momentum for consolidation is …

SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil Read More »

The Case for Building a Resilient Cybersecurity Framework

Market changes are not a threat, they are an opportunity. Unless you have been on a deserted island, you have seen the news about some of the cybersecurity market’s most prominent SIEM vendors making significant moves in the past week or so. Two well-known SIEM vendors, Exabeam and LogRhythm, are merging, and another major player, …

The Case for Building a Resilient Cybersecurity Framework Read More »

Introducing Open XDR Investigator, Powered by GenAI

A new way to drive improved security analyst productivity When we look at a typical SecOps team, a few challenges are almost always present, no matter the size or location of the team. First, SecOp teams are made up of dedicated professionals who do all they can to keep their organizations or their customers’ environments …

Introducing Open XDR Investigator, Powered by GenAI Read More »

Are We Covered?

The new MITRE ATT&CK Coverage Analyzer takes the guesswork out of threat coverage. At Stellar Cyber, we understand the value of your time. That’s why we’ve developed the MITRE ATT&CK Coverage Analyzer, a user-friendly tool that saves your security team valuable research, testing, and double-checking hours. This tool is your go-to solution when determining your …

Are We Covered? Read More »

Product Update: Bringing It All Together Edition

While hopefully everyone reading this had a fun and festive holiday season with family and friends, the Stellar Cyber product management, development, and quality assurance teams were hard at work building more efficient ways to bring all your data together into our Open XDR Platform and make it even easier to respond to cyberattacks. Here …

Product Update: Bringing It All Together Edition Read More »

2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our online lives. From generating marketing content, creating images for advertisements and blogs, or even writing malicious code, we are all interacting with the results of generative AI in …

2024 cybersecurity predictions: GenAI edition Read More »

How Blackberry Cylance Endpoint and Stellar Cyber Open XDR Work Together to Keep Organizations Safe

Cylance rocked the legacy endpoint anti-virus world by introducing the first-ever endpoint prevention product that claimed the uncanny ability to detect and prevent never-before-seen malicious files from executing on an endpoint. Previously it was thought the only way to stop malicious files from executing was to have seen them before. With Cylance and its groundbreaking …

How Blackberry Cylance Endpoint and Stellar Cyber Open XDR Work Together to Keep Organizations Safe Read More »

Unpacking the 2023 Top 250 MSSPs Report

Recently, MSSP Alert published its yearly report on the Top 250 MSSPs. The report is chock-full of interesting information from a survey of MSSPs that makes it a worthwhile read. Below are a few key takeaways that anyone working with an MSSP, looking to become an MSSP, or an MSP seeking out an MSSP partner …

Unpacking the 2023 Top 250 MSSPs Report Read More »

Clearing up the XDR Confusion…Finally.

This week Gartner weighed in on a technology that unfortunately became a dreaded three-letter word over the past couple of years, XDR, by issuing its official Market Guide. In the guide, Gartner describes what an XDR consists of and discusses how organizations should view this technology in context with everything else they currently use or …

Clearing up the XDR Confusion…Finally. Read More »

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW

With every breach and data leak splashed across your favorite news website or X feed, your customers’ concern about being the next victim of a cyberattack increases. Whether you are a reseller or a managed service provider (MSP), your customers know that the blame and fallout will land on their desks if they experience a …

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW Read More »

Three Tell-Tale Signs It’s Time To Make Changes To Your Security Stack

To state the obvious, there is no such thing as a perfect cybersecurity product.  While there are many great products security pros use daily to keep their organizations secure, every one of them has things about them that could be better. However, as security stacks get increasingly complex, all these “less than ideal” items taken …

Three Tell-Tale Signs It’s Time To Make Changes To Your Security Stack Read More »