Data Collection

Network detection and response

What Is Cybersecurity?

Cybersecurity is in the news a lot, and typically in a bad way. We learn about Cybersecurity through well-publicized cyberattacks on major financial institutions, corporations, social media platforms, hospitals and cities. These attacks cost organizations and individuals billions of dollars a year, and hackers show no signs of slowing down. If anything, attacks are growing […]

What Is Cybersecurity? Read More »

Network detection and response

Cybersecurity Challenges and Solutions

Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data, damage to hardware or software, or disruption of the services they provide. The world now relies heavily on computers and networks to facilitate movement of a vast range of goods and services, and Cybersecurity has become more and more important. Cybercriminals

Cybersecurity Challenges and Solutions Read More »

cloud detection and response

A Conversation about the New Wave of Cybersecurity

Its time, again, to change the conversation in cybersecurity. It’s neither data-driven nor AI-driven cybersecurity, which you might have heard before – it’s both and more, much more. It is correlation-driven cybersecurity. It is about correlations of many detections, from very basic like NGFW to very advanced like AI-based EDR, from various data sources in

A Conversation about the New Wave of Cybersecurity Read More »

Open XDR Platform

Why are leading market research firms so excited about XDR?

Q&A with CEO and Co-Founder Changming Liu Q. Why do you think people including CISOs and analysts are so excited by XDR? Ans: SIEMs have been the foundation of security operations for decades, and we should acknowledge that. However, SIEMs have made a lot of great promises, and to this day, have not fulfilled many

Why are leading market research firms so excited about XDR? Read More »

Next Gen SIEM

Big companies are not immune to Ransomware!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief

Big companies are not immune to Ransomware! Read More »

Open XDR Platform

Why XDR?
(Extended Detection and Response)

Why XDR (Extended Detection and Response) ? Timing is everything   As the security industry wrestles with current security infrastructure, the cries of…  Too many point security products Too many blind spots  Too much noise and thus alert fatigue Too late to find attacks  Too slow to investigate, to hunt and to respond Too much

Why XDR?
(Extended Detection and Response)
Read More »

SIEM application

A Single PAIN of Glass

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief

A Single PAIN of Glass Read More »

SIEM application

Myth Buster: Data Fatigue is not real!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief

Myth Buster: Data Fatigue is not real! Read More »

Open XDR

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@PaloAltoNtwks), Trend Micro (@TrendMicro) and LogRythm (@LogRhythm) all talk to “XDR” (extended detection and response in IT infrastructure)

XDR Without Limits Read More »

AlienVault alternatives

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI (IMAGE COURTESY OF BIGSTOCK.COM) As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In

A brief history of machine learning in cybersecurity Read More »

Open XDR

A Platform to Support XDR

Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response can be preventive (think about it). Second, if you substitute enterprise systems and devices for endpoints, then EDR evolves to XDR (AKA extended-DR). And third, if you have a great security platform, then

A Platform to Support XDR Read More »

Network Detection and Response Platform

Security as a Service – Where do I start?

Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be focusing  on security these days. For an MSP adding security services, or an MSSP looking to target a new market segment, here are the common questions I frequently get when

Security as a Service – Where do I start? Read More »

Network detection and response tools

Bundling Security Services to Improve Pricing and Close Ratios

Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has been away from a’ la carte menus to limited menus, because it’s easier, more efficient, and requires less skill to produce a few entrée/side dish combinations than to try to fulfill each

Bundling Security Services to Improve Pricing and Close Ratios Read More »

EDR Software

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.

DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims. According to Techcrunch the hackers first compromised the intended target via spearphishing.  They then used known exploits to target servers and routers and move laterally within the network.  In that process, the

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims. Read More »

Open XDR security services

Distributed Security Intelligence

Distributed Security Intelligence  Artificial Intelligence is radically transforming the cybersecurity industry. To successfully use A.I for security, the quality of the data is paramount. Security-related data must be collected from many different sources – network data from packets, server data from commands and processes, application data such as logs, and threat intelligence data from security

Distributed Security Intelligence Read More »

Network detection and response

The 2017 Equifax Breach

In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach of unprecedented impact and scale.  More than 145 million records of personal identifiable information were stolen by cyber criminals.  Because of the nature of this breach, the CEO of Equifax resigned, a congressional investigation commenced, Equifax’s stock took a hit

The 2017 Equifax Breach Read More »

Scroll to Top