Category: security technology


One Year Later: Lessons from the Colonial Pipeline Ransomware Attack
A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created


Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business
As an MSSP, being proactive in your approach to cybersecurity is a best practice. Ensuring that your customers are doing their part to update


Mastering EDR – Industry’s First Universal EDR
In detection and response, bidirectional integrations between security products, let alone unidirectional integrations, are not enough. There


Stellar Cyber: Log4j Vulnerability and Exploitation Detection
1. Introduction In the past several days, a serious Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) has nearly led to a perfect storm in the


XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR
2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified


Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room
Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical


NDR vs. Open XDR – What’s the difference?
Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR? NDR is


Open XDR vs. SIEM
Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise


XDR explained in 300 words
XDR is the rising star of new acronyms, but you might have to read a 1,000+ word long article to understand its value. Let’s try to do it briefly


The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?
Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log analysis enough? We’re


XDR Delivers Significant Performance Improvement over SIEM
In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean Time to Detection (MTTD) and Mean Time to


An Integrated TIP for Simplified and Efficient Security Operations
Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as


How Stellar Cyber Addresses Data Storage Pain
Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as


Cyberthreats Go Sideways
The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that


Was SUNBURST really a Zero-day attack?
Most companies affected by the SolarWinds attack learned about it from the Department of Homeland Security. Wouldn’t it have been better for them


SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis
On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised


What is Network Security?
The historical definition of network security is to use a firewall to screen users coming into the network, but as IT technology and security