Artificial Intelligence

AlienVault alternatives

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI (IMAGE COURTESY OF BIGSTOCK.COM) As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In […]

A brief history of machine learning in cybersecurity Read More »

Open XDR

A Platform to Support XDR

Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response can be preventive (think about it). Second, if you substitute enterprise systems and devices for endpoints, then EDR evolves to XDR (AKA extended-DR). And third, if you have a great security platform, then

A Platform to Support XDR Read More »

XDR

Introducing “Swipe Left” Security

You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more upstream – or left – toward where the development processes are initiated. As you progress from Development to Q/A and then Production (moving right), there is more underlying thinking about end-to-end

Introducing “Swipe Left” Security Read More »

Network Detection and Response Platform

Security as a Service – Where do I start?

Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be focusing  on security these days. For an MSP adding security services, or an MSSP looking to target a new market segment, here are the common questions I frequently get when

Security as a Service – Where do I start? Read More »

Network detection and response tools

Bundling Security Services to Improve Pricing and Close Ratios

Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has been away from a’ la carte menus to limited menus, because it’s easier, more efficient, and requires less skill to produce a few entrée/side dish combinations than to try to fulfill each

Bundling Security Services to Improve Pricing and Close Ratios Read More »

Automated threat hunting

Stellar Cyber with John Peterson, Chief Product Officer

On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber (stellarcyber.ai) an innovative cyber security company using artificial intelligence (AI) and machine learning (ML) to empower SMBs (small and medium sized businesses) to gain access to the same types of advanced security tools that

Stellar Cyber with John Peterson, Chief Product Officer Read More »

Network detection and response

The 2017 Equifax Breach

In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach of unprecedented impact and scale.  More than 145 million records of personal identifiable information were stolen by cyber criminals.  Because of the nature of this breach, the CEO of Equifax resigned, a congressional investigation commenced, Equifax’s stock took a hit

The 2017 Equifax Breach Read More »

Scroll to Top