Open XDR

Bring Your Own Data Lake: Do It The Right Way

Having spent a significant amount of time in the SIEM industry, I’ve seen patterns and evolutions that define the landscape. One of the most notable changes has been the shift from traditional, monolithic SIEM deployments to more flexible, scalable solutions that allow organizations to adapt and grow without significant overhauls. The Evolution of SIEM Storage […]

Bring Your Own Data Lake: Do It The Right Way Read More »

Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake

One of the challenges security teams face is managing the vast quantity of data required to identify threats effectively. While each new security control deployed brings new capabilities intended to improve security posture, it also brings with it another set of data to manage. Most organizations deploy a SIEM to consolidate data for analysis; a

Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake Read More »

The Car Dealership Hack: Securing the Supply Chain

supply chain Open XDR Platform Open XDR Ai-Driven Security Cybersecurity The news earlier this week about the CDK hack reveals the major flaw—and prevalent issue—in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to

The Car Dealership Hack: Securing the Supply Chain Read More »

We Need to Talk: Breaking up with Your SIEM Vendor

Relationships are challenging at times. Think of it like a seesaw. Like in a seesaw, every relationship, be it with your partner, a family member, or a friend, requires effort from both sides to keep it balanced and healthy. But what happens when one person pushes while the other is just along for the ride?

We Need to Talk: Breaking up with Your SIEM Vendor Read More »

In a Cloudy World, On-Premises Still Might be The Way To Go

In 2012, I worked for one of the first vendors to deliver security-as-a-service. In those days, securing your environment from the cloud was cutting-edge, and many security teams were leery of introducing what they perceived as another point of failure into their security framework. Today, deploying a SIEM, XDR, or SecOps platform on bare metal

In a Cloudy World, On-Premises Still Might be The Way To Go Read More »

Data Management Approaches: Schema-on-Read vs. Schema-on-Write

Effective cybersecurity begins and ends with data. Since attackers can deploy their payloads in seconds, ensuring your security team isn’t waiting minutes or hours for their security operations platform to notice an attack is underway can mean the difference between an isolated threat and a widespread compromise. While most modern cybersecurity products can detect threats

Data Management Approaches: Schema-on-Read vs. Schema-on-Write Read More »

“Don’t Click It, Pitch It”: Stellar Cyber Partners with Minor League Baseball Teams to Launch an Initiative to Educate Young Adults about Cybercrime

& Stellar Cyber announces the launch of its new educational initiative, “Don’t Click It, Pitch It,” which targets young adults and educates them on the risks of being victims of hackers. Drawing on the baseball theme and its partnership with minor league baseball teams like the Ogden Raptors, the initiative aims to use its catchy

“Don’t Click It, Pitch It”: Stellar Cyber Partners with Minor League Baseball Teams to Launch an Initiative to Educate Young Adults about Cybercrime Read More »

SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil

As I wrote a couple of weeks ago, it is evident that the long-anticipated consolidation of security products and vendors is well underway. With significant market players Exabeam and LogRyhthm merging, Splunk now officially under the umbrella of Cisco, and Palo Alto Networks scooping up IBM QRadar SIEM Cloud business, the market momentum for consolidation is

SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil Read More »

Flexibility in SIEM: Choosing the Right Deployment Model for Your Needs

Over the past two decades, Security Information and Event Management (SIEM) solutions have become integral to enterprise security strategies However, as new generations of SIEM technologies emerge, former leaders in the Gartner SIEM Magic Quadrant are often seen slipping from the top spots, if not completely disappearing. SIEM vendors might also acquire or merge, like

Flexibility in SIEM: Choosing the Right Deployment Model for Your Needs Read More »

The Case for Building a Resilient Cybersecurity Framework

The Case for Building a Resilient Cybersecurity Framework

Market changes are not a threat, they are an opportunity. Unless you have been on a deserted island, you have seen the news about some of the cybersecurity market’s most prominent SIEM vendors making significant moves in the past week or so. Two well-known SIEM vendors, Exabeam and LogRhythm, are merging, and another major player,

The Case for Building a Resilient Cybersecurity Framework Read More »

Introducing Open XDR Investigator, Powered by GenAI

A new way to drive improved security analyst productivity When we look at a typical SecOps team, a few challenges are almost always present, no matter the size or location of the team. First, SecOp teams are made up of dedicated professionals who do all they can to keep their organizations or their customers’ environments

Introducing Open XDR Investigator, Powered by GenAI Read More »

Are We Covered?

The new MITRE ATT&CK Coverage Analyzer takes the guesswork out of threat coverage. At Stellar Cyber, we understand the value of your time. That’s why we’ve developed the MITRE ATT&CK Coverage Analyzer, a user-friendly tool that saves your security team valuable research, testing, and double-checking hours. This tool is your go-to solution when determining your

Are We Covered? Read More »

Product Update: Bringing It All Together Edition

While hopefully everyone reading this had a fun and festive holiday season with family and friends, the Stellar Cyber product management, development, and quality assurance teams were hard at work building more efficient ways to bring all your data together into our Open XDR Platform and make it even easier to respond to cyberattacks. Here

Product Update: Bringing It All Together Edition Read More »

Looking Ahead for Stellar Cyber

As many of us take stock of our personal goals, achievements, and aspirations this time of year, I like to look at our company similarly, reviewing our goals, achievements, and aspirations for the future.Going into 2023, we had four clear objectives: Deliver an exceptional customer experience from day one. Strive for continuous product innovation. Expand

Looking Ahead for Stellar Cyber Read More »

Stellar Cyber Product Update Fall Edition

Kayleen Standridge from our Product Management team is providing this month’s product update blog, detailing a few key features and enhancements designed to make the user experience better. Check it out below. Exciting times are here as we bring you the latest updates to the Stellar Cyber Open XDR platform, designed to elevate your experience

Stellar Cyber Product Update Fall Edition Read More »

2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our online lives. From generating marketing content, creating images for advertisements and blogs, or even writing malicious code, we are all interacting with the results of generative AI in

2024 cybersecurity predictions: GenAI edition Read More »

How Blackberry Cylance Endpoint and Stellar Cyber Open XDR Work Together to Keep Organizations Safe

Cylance rocked the legacy endpoint anti-virus world by introducing the first-ever endpoint prevention product that claimed the uncanny ability to detect and prevent never-before-seen malicious files from executing on an endpoint. Previously it was thought the only way to stop malicious files from executing was to have seen them before. With Cylance and its groundbreaking

How Blackberry Cylance Endpoint and Stellar Cyber Open XDR Work Together to Keep Organizations Safe Read More »

Unpacking the 2023 Top 250 MSSPs Report

Recently, MSSP Alert published its yearly report on the Top 250 MSSPs. The report is chock-full of interesting information from a survey of MSSPs that makes it a worthwhile read. Below are a few key takeaways that anyone working with an MSSP, looking to become an MSSP, or an MSP seeking out an MSSP partner

Unpacking the 2023 Top 250 MSSPs Report Read More »

Scroll to Top