Cloud Security

One of These Things is not Like the Others

By nature, humans are wired to avoid undue risks. While there are always exceptions to the rules, by and large when given the choice between the known and unknown, the typical person one will choose the known even though the choice might only deliver a marginally positive result. It is this natural bias towards the […]

One of These Things is not Like the Others Read More »

Earning Trust As A Cybersecurity Vendor

Practitioners, executives, and investors know the stakes for cybersecurity are incredibly high and will only get higher. Ransomware locking up mission-critical devices in Oil & Gas or Healthcare, disruption causing standstills in Logistics, and identity theft rising due to your data being leaked ten times over. The story in global cybersecurity that I spend a

Earning Trust As A Cybersecurity Vendor Read More »

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete security tools to hunt for

What’s the Deal with Open XDR Read More »

Network traffic analysis

The New-Look Stellar Cyber

As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the

The New-Look Stellar Cyber Read More »

Next Gen SIEM

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations

Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical, and every decision you make impacts those operations. When you have separate service providers–one for managed IT and another for extended detection & response (XDR)–you run the risk of delayed response and service. Patti Hallock, our Director of XDR Operations

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations Read More »

cloud detection and response

Product Review: Stellar Cyber Open XDR Platform

Originally posted in Almost every vendor, from email gateway companies to developers of threat intelligence platforms, is positioning themselves as an XDR player. But unfortunately, the noise around XDR makes it harder for buyers to find solutions that might be right for them or, more importantly, avoid ones that don’t meet their needs. Stellar Cyber

Product Review: Stellar Cyber Open XDR Platform Read More »

SIEM application

Advocating for security in a financial storm?

Here we go again. Just after the world was pulling itself out of the total economic shutdown of the COVID-19 pandemic, the R word looms on the horizon. We’ve seen our everyday lives touched by large scale inflation over the past 6 months. Groceries, Gas, common goods, everything is more expensive than it used to

Advocating for security in a financial storm? Read More »

SIEM security

When and how to bring in an MSSP to help your lean security team

Over the past few weeks, I have written several blogs about the lean security team. As you can tell, I am a fan of these types of teams as they take on the burden of keeping an organization secure with limited resources and budgets but somehow get the job done. One of the main reasons

When and how to bring in an MSSP to help your lean security team Read More »

XDR

September Product Update: How I Spent My Summer Vacation:

The Stellar Cyber September Product Update As summer ends and the kids tearing up your house for the past 12 weeks head back to school, it’s time to let you know what the product team has been up to here at Stellar Cyber. We have made some nice updates to our Open XDR Platform in

September Product Update: How I Spent My Summer Vacation: Read More »

Open XDR security

Open XDR vs. SIEM

Introduction: The next generation of security intelligence is here, and it’s called extended detection and response (XDR). XDR is a technology that enables organizations to detect and respond to advanced threats faster, easier and with greater accuracy than ever before. It does this by unifying disparate data sources in one centralized location and providing richer

Open XDR vs. SIEM Read More »

SIEM security

What makes a lean security team tick

When budgets and resources are high, security teams have the luxury of building complex security infrastructures made up of only best-of-breed security products. See a new widget that claims to solve a narrow security challenge. Sure, add it to the stack. Heard about a revolutionary way to do this or that slightly better; no problem,

What makes a lean security team tick Read More »

XDR

August Product Update

August Product Update Stellar Cyber continually works to ensure the products we deliver not only meet but exceed the needs of our customers. As hockey legend Wayne Gretsky famously said, “I skate to where the puck is going to be, not where it has been” we also work hard to anticipate the future needs of

August Product Update Read More »

Network Detection and Response Platform

Our new normal challenges the economic viability of traditional cybersecurity thinking.

Stellar Cyber’s new sensors eliminate blind spots in your, or your customers’, distributed environments without breaking the bank. As the past two years have taught us, businesses can function in any number of situations, even when all their employees are working remotely. However, now that we slowly return to business as usual, organizations are realizing

Our new normal challenges the economic viability of traditional cybersecurity thinking. Read More »

Automated threat hunting

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack

A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created a huge fuel shortage for eastern and southern states, and forced Colonial Pipeline to pay a hefty $4.4 million ransom. Ransomware attacks have continued unabated since then, with the most recent ones

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack Read More »

NDR platform

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely. When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats,

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks Read More »

Automated SOC

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!

MSSPs all deal with a crushing number of alerts daily – but how are the most successful partners managing the influx? The MSSP industry has seen a significant increase in attacks on MSP and MSSP partners this year. This has led to several new attacks on everything from RMM tools to applications. We all deal

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain! Read More »

Scroll to Top