Network Security

Automated threat hunting

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack

A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created a huge fuel shortage for eastern and southern states, and forced Colonial Pipeline to pay a hefty $4.4 million ransom. Ransomware attacks have continued unabated since then, with the most recent ones […]

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack Read More »

Firewall Traffic Analysis

What Rippling Will Do To HR, XDR Will Do To Security

In this tumultuous software equity market, where corporate valuations are coming back to levels based on fundamentals, one private software company stands out – Rippling. Rippling is an all-in-one HR & IT platform built from the ground up for managing everything related to employees. The key word there is everything – that is the company’s

What Rippling Will Do To HR, XDR Will Do To Security Read More »

Automated threat hunting

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business

As an MSSP, being proactive in your approach to cybersecurity is a best practice.  Ensuring that your customers are doing their part to update and patch their systems is critical.  If you can integrate your asset management with your SOC/XDR platform there are huge gains to be realized. Scanning all your customer environments is the

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business Read More »

Open XDR security services

Open XDR In the Real World – Q&A With Jon Mayled

In this interview, we capture real-world experience and recommendations from an enterprise that implemented Stellar Cyber’s Open XDR platform. We talked with Jon Mayled, International IT and Security Director at PlastiPak Packaging, Inc., about what he learned during his implementation.   SC: What is required to implement a successful XDR program? JM: Although I recommend

Open XDR In the Real World – Q&A With Jon Mayled Read More »

Endpoint detection and response tools

Keys to a Successful XDR Implementation

Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or context only creates irrelevant noise that frustrates and distracts analysts. Without an integrated platform to correlate all that data, security teams become buried in an overwhelming amount of false alerts.  XDR is specifically designed to incorporate

Keys to a Successful XDR Implementation Read More »

SOC platform

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting

Cybersecurity Infrastructure Needs a New Model Read More »

Network detection and response

Going SOCless

According to the FBI, the number of cyberattacks reported to their Cyber Division is up 400 percent compared to pre-pandemic levels, and attacks are getting worse. From financial sites to healthcare sites to government sites to supply chain industries, no one is safe from these attacks. The traditional defense against these threats is the Security

Going SOCless Read More »

NDR platform

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely. When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats,

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks Read More »

SIEM platform

Technical Approach To Universal EDR

For security vendors and those in the XDR market specifically, there is an architectural axis of build vs. integrate. On one end, you have “Build / Acquire Everything” – vendors that are vertically integrated and want to be an enterprise’s entire security stack. On the other end, you have “Integrate with Everything” – vendors that

Technical Approach To Universal EDR Read More »

AlienVault alternatives

The Three Waves of XDR – Open XDR delivers and extends the value of existing investments

We asked CIOs and CISOs what keeps them up at night, and the two main concerns are reducing security risks and improving analyst confidence and productivity. CxOs must report to corporate boards, and members of those boards are getting smarter about asking probing questions about the company’s security posture. CxOs need answers to those questions,

The Three Waves of XDR – Open XDR delivers and extends the value of existing investments Read More »

Automated SOC

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!

MSSPs all deal with a crushing number of alerts daily – but how are the most successful partners managing the influx? The MSSP industry has seen a significant increase in attacks on MSP and MSSP partners this year. This has led to several new attacks on everything from RMM tools to applications. We all deal

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain! Read More »

cloud detection and response

Stellar Cyber’s Open XDR – Step into Security

Security can be intimidating for MSP partners making the transition to MSSP.  The industry makes it sound too complex and capital intensive to cross the chasm.  We believe that there are logical, cost-effective steps you can take to get more of your customers to purchase security and provide better profitability. MSP partners have built long-term

Stellar Cyber’s Open XDR – Step into Security Read More »

Extended detection and response

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, XDR is “a single, stand-alone solution that offers integrated threat detection and response capabilities.”  To meet Omdia’s

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR Read More »

Next Gen SIEM

Why We Invested in Stellar Cyber, Open XDR for enterprise-level security

Stellar Cyber is simplifying cyberthreat detection and response with its open extended detection and response (XDR) platform for enterprise networks and managed security service providers (MSSPs). XDR is an emerging product category solving three major pain points when it comes to security operations. First, it provides an open solution to replace a multitude of siloed

Why We Invested in Stellar Cyber, Open XDR for enterprise-level security Read More »

Open XDR

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room

Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room Read More »

SIEM application

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?

Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are evolving at an equally rapid pace. Ransomware-as-a-service providers on the dark web are using ML to create zero-day strains, and traditional security technologies are struggling to keep up. What if the ransomware attack was only a diversion from the attacker’s

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic? Read More »

SIEM security

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages,

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure Read More »

SIEM tools

NDR vs. Open XDR – What’s the difference?

Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR? NDR is special because it focuses on the nerve center of an organization’s IT infrastructure: the network. Wireless or wired device, endpoint or server, application, user or cloud – all

NDR vs. Open XDR – What’s the difference? Read More »

Scroll to Top