Category: Cloud Security


One Year Later: Lessons from the Colonial Pipeline Ransomware Attack
A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created


Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks
With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage


Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!
MSSPs all deal with a crushing number of alerts daily – but how are the most successful partners managing the influx? The MSSP industry has seen


Stellar Cyber’s Open XDR – Step into Security
Security can be intimidating for MSP partners making the transition to MSSP. The industry makes it sound too complex and capital intensive to


Stellar Cyber: Log4j Vulnerability and Exploitation Detection
1. Introduction In the past several days, a serious Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) has nearly led to a perfect storm in the


Why We Invested in Stellar Cyber, Open XDR for enterprise-level security
Stellar Cyber is simplifying cyberthreat detection and response with its open extended detection and response (XDR) platform for enterprise


Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room
Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical


Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?
Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are evolving at an equally rapid pace.


SIEM, XDR, and the Evolution of Cybersecurity Infrastructure
Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots,


NDR vs. Open XDR – What’s the difference?
Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR? NDR is


Does XDR Need A New Kill Chain?
The time has come for cyber security technology to keep up with the adversaries. Now that we have seen so many successful multi-stage attacks,


Open XDR vs. SIEM
Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise


Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?
Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be the ultimate security analytics platform. Still,


The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?
Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log analysis enough? We’re


Alerts, Events, Incidents: Where Should Your Security Team Focus?
As the cybersecurity threat landscape is evolving so is the way we need to look at those threats. The drumbeat of new breaches is continuous. If


Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response
Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain


XDR Delivers Significant Performance Improvement over SIEM
In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean Time to Detection (MTTD) and Mean Time to


An Integrated TIP for Simplified and Efficient Security Operations
Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as