MSSP

Considering an XDR Purchase? Here Are Our Lessons Learned.

Lessons learned from our search for, and integration of, our XDR Trusted Internet is now deploying Stellar Cyber XDR –as a SOC-monitored solution or as an Infrastructure as a Service. The marketing hype around XDR is deafening for those of you considering an XDR. It’s hard to sort through the slick websites and marketing noise […]

Considering an XDR Purchase? Here Are Our Lessons Learned. Read More »

How the Changing Attack and Cybersecurity Solutions Landscape Led Me to Join Stellar Cyber

Working in Cybersecurity for the past two decades, helping managed security service providers (MSSPs) meet the needs of their customers, gives me a unique perspective on how our industry has evolved and ultimately led me to join Stellar Cyber last month to run the Global Service Provider Business. As I get to know Stellar Cyber’s

How the Changing Attack and Cybersecurity Solutions Landscape Led Me to Join Stellar Cyber Read More »

XDR

What Enterprise C-level Executive Customers Want From MSSPs

For an MSSP, the key to a CIOs heart is reducing risk for a cost that is less than what they’re spending now, Stellar Cyber asserts. A CIOs or CISOs job is never easy, but it’s more difficult now because cyberattacks are more frequent and more complex than ever before. Cybersecurity is a top priority

What Enterprise C-level Executive Customers Want From MSSPs Read More »

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators

Artificial intelligence (AI) has been transforming the cybersecurity landscape for over a decade, with machine learning (ML) speeding the detection of threats and identifying anomalous user and entity behaviors. However, recent developments in large language models (LLMs), such as OpenAI’s GPT-3, have brought AI to the forefront of the cybersecurity community. These models use documented

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators Read More »

Three Reasons Securonix Customers are Moving to Stellar Cyber

There is an innate quality humans have to resist change. Our brains are hardwired to resist change, according to researchers. A part of our brain called the amygdala sees change as a threat and releases hormones for fear, fight, or flight. So when change arises, our brain tries to protect us from harm1, which makes

Three Reasons Securonix Customers are Moving to Stellar Cyber Read More »

Open XDR – Central correlation of all cybersecurity events

Reduce business risk with early and accurate identification and remediation of all attack activity while reducing costs, maintaining investments in existing tools, and accelerating analyst productivity. Open XDR: Overall view and alerting of all potential attacks on the IT landscape In order to successfully protect a company from cyber attacks, a large number of different

Open XDR – Central correlation of all cybersecurity events Read More »

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete security tools to hunt for

What’s the Deal with Open XDR Read More »

Next Gen SIEM

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations

Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical, and every decision you make impacts those operations. When you have separate service providers–one for managed IT and another for extended detection & response (XDR)–you run the risk of delayed response and service. Patti Hallock, our Director of XDR Operations

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations Read More »

cloud detection and response

Product Review: Stellar Cyber Open XDR Platform

Originally posted in Almost every vendor, from email gateway companies to developers of threat intelligence platforms, is positioning themselves as an XDR player. But unfortunately, the noise around XDR makes it harder for buyers to find solutions that might be right for them or, more importantly, avoid ones that don’t meet their needs. Stellar Cyber

Product Review: Stellar Cyber Open XDR Platform Read More »

Network traffic analysis

MSSP Alert Live Recap

I’m sure, like most people reading this blog, the past two-plus years for me were mainly spent in front of my computer, talking with my colleagues, customers, and prospects over Zoom (or your video conferencing provider of choice). So when the opportunity to attend the MSSP Alert Live event in Washington, DC came my way, I hopped

MSSP Alert Live Recap Read More »

Next Gen SIEM

Economics Of Shift Left Security

I’ve worked with dozens of SecOps and Detection and Response teams over the past few years and it has become crystal clear to me how important it is to fix as many security issues as possible upstream. Or as it is more commonly known, “Shift Left Security”. Broadly, I see three camps on “Shift Left Security”

Economics Of Shift Left Security Read More »

Open XDR

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

In today’s ultra-competitive MSSP market, business owners are looking for ways to make their offerings more attractive to customers and their SOCs more effective. To that end MSSPs add new technology to their security offering stack with the hopes that prospective customers will see this addition as an opportunity to outsource some, or all, of

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow Read More »

SIEM application

Advocating for security in a financial storm?

Here we go again. Just after the world was pulling itself out of the total economic shutdown of the COVID-19 pandemic, the R word looms on the horizon. We’ve seen our everyday lives touched by large scale inflation over the past 6 months. Groceries, Gas, common goods, everything is more expensive than it used to

Advocating for security in a financial storm? Read More »

SIEM security

What is a Lean Security Team, and how to know if you are part of one

Recently I wrote a blog about what makes a lean security team tick, however, after I posted, it occurred to me that I probably should have spent a few minutes talking about the different types of security teams we run into and how to determine if you fit into the lean security team category. You

What is a Lean Security Team, and how to know if you are part of one Read More »

Network detection and response tools

Should you build your own or purchase MDR services — Is Open XDR the answer?

For the last several years, MSP partners have been making a tough decision – should I build cybersecurity within my own business or outsource it?  Until a few years ago, the manual nature of SOC technology and cybersecurity talent made it very difficult to build your own service.  Today there are many new, more robust

Should you build your own or purchase MDR services — Is Open XDR the answer? Read More »

SOC platform

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting

Cybersecurity Infrastructure Needs a New Model Read More »

SIEM platform

Technical Approach To Universal EDR

For security vendors and those in the XDR market specifically, there is an architectural axis of build vs. integrate. On one end, you have “Build / Acquire Everything” – vendors that are vertically integrated and want to be an enterprise’s entire security stack. On the other end, you have “Integrate with Everything” – vendors that

Technical Approach To Universal EDR Read More »

SIEM alternatives

Mastering EDR – Industry’s First Universal EDR

In detection and response, bidirectional integrations between security products, let alone unidirectional integrations, are not enough. There needs to be true cohesion amongst the entire security stack; otherwise, security operators are left with piles of data and endless API endpoints to figure out how to wire together. This is more important with Endpoint Detection &

Mastering EDR – Industry’s First Universal EDR Read More »

Scroll to Top