Artificial Intelligence

Why NDR Alone Is No Longer Enough: The Case for an Open, Unified SecOps Platform Built on a Strong NDR Core

In today’s cybersecurity arms race, visibility is everything—but context is king. Network Detection and Response (NDR) has long been one of the most effective ways to detect lateral movement, ransomware behaviors, and post-compromise activity using deep packet inspection and behavioral analysis. But as threat actors become more evasive and distributed, relying solely on NDR as a […]

Why NDR Alone Is No Longer Enough: The Case for an Open, Unified SecOps Platform Built on a Strong NDR Core Read More »

Why MSSPs Are Betting on AI—But Still Missing the Power of NDR

Live Network Traffic is the Missing Link: AI Can’t Detect What It Can’t See AI is dominating cybersecurity conversations—and MSSPs are rushing to capitalize. Whether through SIEM platforms with built-in ML, or EDRs with AI-assisted investigations, the promise is clear: faster detection, smarter triage, and better outcomes. But here’s the hard truth—AI alone won’t save

Why MSSPs Are Betting on AI—But Still Missing the Power of NDR Read More »

Empowering SOC Teams with Open and Seamless API Integration

Today’s complex cyberthreat landscape poses both enterprises and Managed Security Service Providers (MSSPs) multiple challenges. To combat evolved threats across diverse IT & Security environments, cybersecurity professionals develop an array of tools and data sources to monitor their specific threat landscape. However, the tool array presents its own difficulties, as there are gaps in visibility,

Empowering SOC Teams with Open and Seamless API Integration Read More »

Hyperautomation for Security Teams

Six years ago, we founded DTonomy, a security automation company. As security software engineers and data scientists who had worked at the forefront of security operations — from building large-scale AI-based EDR systems to managing daily security operations — we were acutely aware of the challenges security teams face. Triaging security alerts during national holidays,

Hyperautomation for Security Teams Read More »

Drive efficiency with Stellar Cyber Open XDR platform on Oracle Government Cloud

Government security operations (SecOp) teams face unique challenges as they grapple with relentless attacks in an environment that can shift unexpectedly. The pressure intensifies in the government, and budgets are often constrained. This combination of factors creates a perfect storm of stress and uncertainty. SecOps leaders must find ways to ensure their teams can protect

Drive efficiency with Stellar Cyber Open XDR platform on Oracle Government Cloud Read More »

Fighting AI with AI: Tools for the Twenty-First Century

In a recent conversation with a major educational institution’s CIO, the following circumstance arises: a university administrator is hiring for a position; of over 300 resumes that he receives, 95% of them look so similar that they could have come from the same person. And in a way, they did. With the proliferation of AI-powered

Fighting AI with AI: Tools for the Twenty-First Century Read More »

The Car Dealership Hack: Securing the Supply Chain

supply chain Open XDR Platform Open XDR Ai-Driven Security Cybersecurity The news earlier this week about the CDK hack reveals the major flaw—and prevalent issue—in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to

The Car Dealership Hack: Securing the Supply Chain Read More »

Looking Ahead for Stellar Cyber

As many of us take stock of our personal goals, achievements, and aspirations this time of year, I like to look at our company similarly, reviewing our goals, achievements, and aspirations for the future.Going into 2023, we had four clear objectives: Deliver an exceptional customer experience from day one. Strive for continuous product innovation. Expand

Looking Ahead for Stellar Cyber Read More »

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW

With every breach and data leak splashed across your favorite news website or X feed, your customers’ concern about being the next victim of a cyberattack increases. Whether you are a reseller or a managed service provider (MSP), your customers know that the blame and fallout will land on their desks if they experience a

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW Read More »

Four Must-Haves to Secure Your OT Environment

Cybersecurity given: attackers will never stop trying to find ways to exploit weaknesses and vulnerabilities anywhere in an organization to carry out an attack. Whether it’s an unpatched web server, an out-of-date application with known vulnerabilities, or a user who tends to click links first and read later, attackers focus on finding a way to

Four Must-Haves to Secure Your OT Environment Read More »

Stellar Cyber Product Update:
Dog Days of Summer Edition

As we are on the doorstep of the dog days of summer, where kids on summer break are soaking up the sun, the Stellar Cyber team is hard at work cranking out new features and capabilities aimed at helping customers continue to improve their ability to simplify security operations. While we have some cool new

Stellar Cyber Product Update:
Dog Days of Summer Edition
Read More »

Amazon Security Lake is now generally available

Today we are thrilled to announce the general availability of Amazon Security Lake, first announced in a preview release at 2022 re:Invent. Security Lake centralizes security data from Amazon Web Services (AWS) environments, software as a service (SaaS) providers, on-premises, and cloud sources into a purpose-built data lake that is stored in your AWS account.

Amazon Security Lake is now generally available Read More »

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators

Artificial intelligence (AI) has been transforming the cybersecurity landscape for over a decade, with machine learning (ML) speeding the detection of threats and identifying anomalous user and entity behaviors. However, recent developments in large language models (LLMs), such as OpenAI’s GPT-3, have brought AI to the forefront of the cybersecurity community. These models use documented

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators Read More »

One of These Things is not Like the Others

By nature, humans are wired to avoid undue risks. While there are always exceptions to the rules, by and large when given the choice between the known and unknown, the typical person one will choose the known even though the choice might only deliver a marginally positive result. It is this natural bias towards the

One of These Things is not Like the Others Read More »

Network traffic analysis

The New-Look Stellar Cyber

As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the

The New-Look Stellar Cyber Read More »

SIEM security

When and how to bring in an MSSP to help your lean security team

Over the past few weeks, I have written several blogs about the lean security team. As you can tell, I am a fan of these types of teams as they take on the burden of keeping an organization secure with limited resources and budgets but somehow get the job done. One of the main reasons

When and how to bring in an MSSP to help your lean security team Read More »

XDR

September Product Update: How I Spent My Summer Vacation:

The Stellar Cyber September Product Update As summer ends and the kids tearing up your house for the past 12 weeks head back to school, it’s time to let you know what the product team has been up to here at Stellar Cyber. We have made some nice updates to our Open XDR Platform in

September Product Update: How I Spent My Summer Vacation: Read More »

SIEM security

What makes a lean security team tick

When budgets and resources are high, security teams have the luxury of building complex security infrastructures made up of only best-of-breed security products. See a new widget that claims to solve a narrow security challenge. Sure, add it to the stack. Heard about a revolutionary way to do this or that slightly better; no problem,

What makes a lean security team tick Read More »

Scroll to Top