Cyberattacks

SOC platform

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting […]

Cybersecurity Infrastructure Needs a New Model Read More »

Network detection and response

Going SOCless

According to the FBI, the number of cyberattacks reported to their Cyber Division is up 400 percent compared to pre-pandemic levels, and attacks are getting worse. From financial sites to healthcare sites to government sites to supply chain industries, no one is safe from these attacks. The traditional defense against these threats is the Security

Going SOCless Read More »

NDR platform

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely. When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats,

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks Read More »

SIEM alternatives

Mastering EDR – Industry’s First Universal EDR

In detection and response, bidirectional integrations between security products, let alone unidirectional integrations, are not enough. There needs to be true cohesion amongst the entire security stack; otherwise, security operators are left with piles of data and endless API endpoints to figure out how to wire together. This is more important with Endpoint Detection &

Mastering EDR – Industry’s First Universal EDR Read More »

Automated SOC

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!

MSSPs all deal with a crushing number of alerts daily – but how are the most successful partners managing the influx? The MSSP industry has seen a significant increase in attacks on MSP and MSSP partners this year. This has led to several new attacks on everything from RMM tools to applications. We all deal

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain! Read More »

cloud detection and response

Stellar Cyber’s Open XDR – Step into Security

Security can be intimidating for MSP partners making the transition to MSSP.  The industry makes it sound too complex and capital intensive to cross the chasm.  We believe that there are logical, cost-effective steps you can take to get more of your customers to purchase security and provide better profitability. MSP partners have built long-term

Stellar Cyber’s Open XDR – Step into Security Read More »

Extended detection and response

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, XDR is “a single, stand-alone solution that offers integrated threat detection and response capabilities.”  To meet Omdia’s

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR Read More »

Next Gen SIEM

Why We Invested in Stellar Cyber, Open XDR for enterprise-level security

Stellar Cyber is simplifying cyberthreat detection and response with its open extended detection and response (XDR) platform for enterprise networks and managed security service providers (MSSPs). XDR is an emerging product category solving three major pain points when it comes to security operations. First, it provides an open solution to replace a multitude of siloed

Why We Invested in Stellar Cyber, Open XDR for enterprise-level security Read More »

SIEM application

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?

Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are evolving at an equally rapid pace. Ransomware-as-a-service providers on the dark web are using ML to create zero-day strains, and traditional security technologies are struggling to keep up. What if the ransomware attack was only a diversion from the attacker’s

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic? Read More »

SIEM security

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages,

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure Read More »

XDR

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention Systems to screen traffic coming into the network, but as IT and security technology have evolved, the

Q&A on Network Detection and Response (NDR) Read More »

XDR

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries.  Now that we have seen so many successful multi-stage attacks, we need to reassess the way we correlate the signals we are seeing from all the security tools in our environments.  Correlation is helpful but it doesn’t always paint the complete

Does XDR Need A New Kill Chain? Read More »

User Behavior Analytics

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain vulnerable Enterprises are seeking to optimize their existing investments in critical WAF infrastructure in ways that further reduce risk, increase productivity, and accelerate response times Enterprises prioritize limited security budget only for known security vulnerabilities, thereby creating potential

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response Read More »

SOC platform

XDR Delivers Significant Performance Improvement over SIEM

In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean Time to Detection (MTTD) and Mean Time to Remediation (MTTR).  The risk and exposure from any cyber threat can be reduced significantly by improving these metrics.  Stellar Cyber recently completed a study with its MSP and MSSP partners, to determine

XDR Delivers Significant Performance Improvement over SIEM Read More »

Firewall Traffic Analysis

An Integrated TIP for Simplified and Efficient Security Operations

Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as possible. This typically includes subscribing to one or more threat intelligence feeds from third-party organizations. As an open platform with a mission to integrate all important security data and tools, Stellar Cyber’s

An Integrated TIP for Simplified and Efficient Security Operations Read More »

EDR Software

How Stellar Cyber Addresses Data Storage Pain

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as much data as they can and store it as long as they want. However, everything has its limitations. For example, the high long-term storage costs, the slow speed of search/query and infrastructure requirements are common

How Stellar Cyber Addresses Data Storage Pain Read More »

Open XDR security services

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No

Cyberthreats Go Sideways Read More »

Scroll to Top