Category: Breach Detection


Keys to a Successful XDR Implementation
Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or


Everything about XDR is around Correlations, not Hype
In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it,


With Stellar Cyber’s Open XDR, No EDR is an Island
Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and this extends to EDR systems as well as NGFW,


Cyberthreats Go Sideways
The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that


When is Enough, Enough?
Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional


Big companies are not immune to Ransomware!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership


Why XDR?
(Extended Detection and Response)
Why XDR (Extended Detection and Response) ? Timing is everything As the security industry wrestles with current security infrastructure,


What is XDR ?
(Extended Detection and Response)
There’s a new acronym out there in the security space: it’s XDR (Extended Detection and Response). But why do we need yet another acronym and


A Single PAIN of Glass
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership


Myth Buster: Data Fatigue is not real!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership


XDR Without Limits
The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response)


A brief history of machine learning in cybersecurity
How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI


A Platform to Support XDR
Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response


MDR-as-a-Service – Is it the Holy Grail as Some Say?
MDR-as-a-Service – Is it the Holy Grail as Some Say? David Barton, Stellar Cyber CISO Every few months it seems there is another wave of new


SIEM is dead! Long live C.I.A.
For years, I have heard the benefits of log forwarding and collection. Send all your data to a SIEM and your security program will be better and


Introducing “Swipe Left” Security
You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more


Security as a Service – Where do I start?
Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be


Bundling Security Services to Improve Pricing and Close Ratios
Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has