Category: AI-driven security


Build a new Superpower for your MSSP business!
Providing endpoint security for all your customers is a major challenge. First, it is very rare that partners can deploy an entire endpoint


When Doing Nothing is Too Expensive
Resource strapped companies trying to put together a comprehensive cybersecurity defense in today’s environment have three key challenges:


XDR/Open XDR Q&A
What are the most common misconceptions about XDR? One of the common misconceptions is that XDR is automatically the ideal security solution.


SIEM, XDR, and the Evolution of Cybersecurity Infrastructure
Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots,


Q&A on Network Detection and Response (NDR)
What is NDR? Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis


Everything about XDR is around Correlations, not Hype
In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it,


Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?
Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools


Open XDR vs. SIEM
Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise


Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?
Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be the ultimate security analytics platform. Still,


The Case for Open XDR – X Means Everything
The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to


Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response
Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain


How Stellar Cyber Addresses Data Storage Pain
Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as


SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis
On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised


Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform
Extending managed detection and response across your customers entire attack surface with one comprehensive platform MSPs and MSSPs represent a


IUWorld Cybersecurity Governance, Risk & Compliance
Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the 2nd Episode of IUWorld Thought Leadership


IUWorld Cybersecurity Governance, Risk & Compliance
Part I: Demystifying Cyber Health and Cyber Threat Hunting JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting


Leverage the tools and telemetry you trust
The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications


Red Team – Blue Team Testing – The Big Picture
Ever since offensive security testing began, we have expected that the test or simulation will find something. Even if a pen tester doesn’t