Stellar Cyber Open XDR - logo
Search
Close this search box.

Breach Detection

Network traffic analysis

The New-Look Stellar Cyber

As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the …

The New-Look Stellar Cyber Read More »

Next Gen SIEM

Economics Of Shift Left Security

I’ve worked with dozens of SecOps and Detection and Response teams over the past few years and it has become crystal clear to me how important it is to fix as many security issues as possible upstream. Or as it is more commonly known, “Shift Left Security”. Broadly, I see three camps on “Shift Left Security” …

Economics Of Shift Left Security Read More »

Open XDR

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

In today’s ultra-competitive MSSP market, business owners are looking for ways to make their offerings more attractive to customers and their SOCs more effective. To that end MSSPs add new technology to their security offering stack with the hopes that prospective customers will see this addition as an opportunity to outsource some, or all, of …

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow Read More »

SIEM application

Advocating for security in a financial storm?

Here we go again. Just after the world was pulling itself out of the total economic shutdown of the COVID-19 pandemic, the R word looms on the horizon. We’ve seen our everyday lives touched by large scale inflation over the past 6 months. Groceries, Gas, common goods, everything is more expensive than it used to …

Advocating for security in a financial storm? Read More »

SIEM security

When and how to bring in an MSSP to help your lean security team

Over the past few weeks, I have written several blogs about the lean security team. As you can tell, I am a fan of these types of teams as they take on the burden of keeping an organization secure with limited resources and budgets but somehow get the job done. One of the main reasons …

When and how to bring in an MSSP to help your lean security team Read More »

SIEM security

What makes a lean security team tick

When budgets and resources are high, security teams have the luxury of building complex security infrastructures made up of only best-of-breed security products. See a new widget that claims to solve a narrow security challenge. Sure, add it to the stack. Heard about a revolutionary way to do this or that slightly better; no problem, …

What makes a lean security team tick Read More »

Endpoint detection and response tools

Keys to a Successful XDR Implementation

Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or context only creates irrelevant noise that frustrates and distracts analysts. Without an integrated platform to correlate all that data, security teams become buried in an overwhelming amount of false alerts.  XDR is specifically designed to incorporate …

Keys to a Successful XDR Implementation Read More »

Open XDR Platform

Everything about XDR is around Correlations, not Hype

In the last several months the XDR acronym is being used by almost every security product manufacturer.  It is one thing to say that you have it, but the hard work that goes into building the detections takes years.  It is not enough to say that you have a big data platform that you can …

Everything about XDR is around Correlations, not Hype Read More »

Automated threat hunting

With Stellar Cyber’s Open XDR, No EDR is an Island

Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and this extends to EDR systems as well as NGFW, vulnerability management, identity management, SOAR and other solutions. EDR has been in the news lately because some EDR vendors have acquired log management companies to flesh out a solution for the …

With Stellar Cyber’s Open XDR, No EDR is an Island Read More »

Open XDR security services

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No …

Cyberthreats Go Sideways Read More »

AlienVault alternatives

When is Enough, Enough?

Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional challenges to protecting the enterprise, is the SIEM the go-forward core of a next-gen security operations center (SOC), or is it time to consider new ideas? We discuss daily the cybersecurity …

When is Enough, Enough? Read More »

Next Gen SIEM

Big companies are not immune to Ransomware!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief …

Big companies are not immune to Ransomware! Read More »

Open XDR Platform

Why XDR?
(Extended Detection and Response)

Why XDR (Extended Detection and Response) ? Timing is everything   As the security industry wrestles with current security infrastructure, the cries of…  Too many point security products Too many blind spots  Too much noise and thus alert fatigue Too late to find attacks  Too slow to investigate, to hunt and to respond Too much …

Why XDR?
(Extended Detection and Response)
Read More »

Open XDR

What is XDR ?
(Extended Detection and Response)

There’s a new acronym out there in the security space: it’s XDR (Extended Detection and Response). But why do we need yet another acronym and should you care? Over the last several years, many analyst groups have tried to capture the idea of more complex attacks and how to build best practices to put the …

What is XDR ?
(Extended Detection and Response)
Read More »

SIEM application

A Single PAIN of Glass

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief …

A Single PAIN of Glass Read More »

SIEM application

Myth Buster: Data Fatigue is not real!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief …

Myth Buster: Data Fatigue is not real! Read More »

Open XDR

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@PaloAltoNtwks), Trend Micro (@TrendMicro) and LogRythm (@LogRhythm) all talk to “XDR” (extended detection and response in IT infrastructure) …

XDR Without Limits Read More »

AlienVault alternatives

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI (IMAGE COURTESY OF BIGSTOCK.COM) As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In …

A brief history of machine learning in cybersecurity Read More »

Scroll to Top