Category: Data Collection
Four Must-Haves to Secure Your OT Environment
Cybersecurity given: attackers will never stop trying to find ways to exploit weaknesses and vulnerabilities anywhere in an organization to carry


The New-Look Stellar Cyber
As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security
Economics Of Shift Left Security
I’ve worked with dozens of SecOps and Detection and Response teams over the past few years and it has become crystal clear to me how important it


MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow
In today’s ultra-competitive MSSP market, business owners are looking for ways to make their offerings more attractive to customers and their


If layered security is the cake, Open XDR is the frosting
The anchor of Enterprise Security is popularly known as a “Defense in Depth” architecture. The Defense in Depth (DID) is a classic defensive


September Product Update: How I Spent My Summer Vacation:
The Stellar Cyber September Product Update As summer ends and the kids tearing up your house for the past 12 weeks head back to school, it’s time


August Product Update
August Product Update Stellar Cyber continually works to ensure the products we deliver not only meet but exceed the needs of our customers. As


Our new normal challenges the economic viability of traditional cybersecurity thinking.
Stellar Cyber’s new sensors eliminate blind spots in your, or your customers’, distributed environments without breaking the bank. As the past


Everything about XDR is around Correlations, not Hype
In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it,


Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?
Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools


Does XDR Need A New Kill Chain?
The time has come for cyber security technology to keep up with the adversaries. Now that we have seen so many successful multi-stage attacks,


An Integrated TIP for Simplified and Efficient Security Operations
Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as


How Stellar Cyber Addresses Data Storage Pain
Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as


Was SUNBURST really a Zero-day attack?
Most companies affected by the SolarWinds attack learned about it from the Department of Homeland Security. Wouldn’t it have been better for them


SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis
On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised


When is Enough, Enough?
Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional


What Is Cybersecurity?
Cybersecurity is in the news a lot, and typically in a bad way. We learn about Cybersecurity through well-publicized cyberattacks on major


Cybersecurity Challenges and Solutions
Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data, damage to hardware or