Breach Detection

SIEM application

Myth Buster: Data Fatigue is not real!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief […]

Myth Buster: Data Fatigue is not real! Read More »

Open XDR

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@PaloAltoNtwks), Trend Micro (@TrendMicro) and LogRythm (@LogRhythm) all talk to “XDR” (extended detection and response in IT infrastructure)

XDR Without Limits Read More »

AlienVault alternatives

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI (IMAGE COURTESY OF BIGSTOCK.COM) As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In

A brief history of machine learning in cybersecurity Read More »

Open XDR

A Platform to Support XDR

Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response can be preventive (think about it). Second, if you substitute enterprise systems and devices for endpoints, then EDR evolves to XDR (AKA extended-DR). And third, if you have a great security platform, then

A Platform to Support XDR Read More »

XDR

Introducing “Swipe Left” Security

You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more upstream – or left – toward where the development processes are initiated. As you progress from Development to Q/A and then Production (moving right), there is more underlying thinking about end-to-end

Introducing “Swipe Left” Security Read More »

Network Detection and Response Platform

Security as a Service – Where do I start?

Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be focusing  on security these days. For an MSP adding security services, or an MSSP looking to target a new market segment, here are the common questions I frequently get when

Security as a Service – Where do I start? Read More »

Network detection and response tools

Bundling Security Services to Improve Pricing and Close Ratios

Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has been away from a’ la carte menus to limited menus, because it’s easier, more efficient, and requires less skill to produce a few entrée/side dish combinations than to try to fulfill each

Bundling Security Services to Improve Pricing and Close Ratios Read More »

Firewall Traffic Analysis

New Ransomware called LooCipher has been found in the Wild

According to Bleeping Computer, a new ransomware called LooCipher has been found in the wild. https://www.bleepingcomputer.com/news/security/new-loocipher-ransomware-spreads-its-evil-through-spam/   In usual fashion, it is impacting users through spam.  Unsuspecting users are opening the phishing email, clicking on the link, giving the file authorization to use macros, and ultimately getting the malicious file installed. In 2011, Lockheed Martin is

New Ransomware called LooCipher has been found in the Wild Read More »

EDR Software

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.

DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims. According to Techcrunch the hackers first compromised the intended target via spearphishing.  They then used known exploits to target servers and routers and move laterally within the network.  In that process, the

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims. Read More »

SOC platform

What Are DGAs and How to Detect them?

Domain Generation Algorithms (DGAs) are a class of algorithms that periodically and dynamically generate large numbers of domain names. Typically, the domains are used by malware and botnets as rendezvous points to facilitate callback to the malicious actor’s Command & Control servers. DGAs allow malware to generate tens of thousands of domains per day, the

What Are DGAs and How to Detect them? Read More »

Network detection and response

The 2017 Equifax Breach

In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach of unprecedented impact and scale.  More than 145 million records of personal identifiable information were stolen by cyber criminals.  Because of the nature of this breach, the CEO of Equifax resigned, a congressional investigation commenced, Equifax’s stock took a hit

The 2017 Equifax Breach Read More »

Scroll to Top