Open XDR

Progressive Resilience In Cybersecurity Risk Management

University environments are naturally open, so cybersecurity risk is an ongoing concern. Trying to lock down the network as you would with a business enterprise isn’t in the cards. Still, it’s tempting in an environment where individual departments, professors, or students introduce their own new technologies, devices, or applications into the network. Rather than trying […]

Progressive Resilience In Cybersecurity Risk Management Read More »

Clearing up the XDR Confusion…Finally.

This week Gartner weighed in on a technology that unfortunately became a dreaded three-letter word over the past couple of years, XDR, by issuing its official Market Guide. In the guide, Gartner describes what an XDR consists of and discusses how organizations should view this technology in context with everything else they currently use or

Clearing up the XDR Confusion…Finally. Read More »

Stellar Cyber Product Update

Back to School Edition Kevin Wilson from our Product Management team is providing this month’s product update blog, detailing a few key features and enhancements designed to make the user experience better. Check it out below. Well, it’s here. Back to School season is officially upon us! No more Zoom pop-ins for help with a

Stellar Cyber Product Update Read More »

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW

With every breach and data leak splashed across your favorite news website or X feed, your customers’ concern about being the next victim of a cyberattack increases. Whether you are a reseller or a managed service provider (MSP), your customers know that the blame and fallout will land on their desks if they experience a

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW Read More »

Three Tell-Tale Signs It’s Time To Make Changes To Your Security Stack

To state the obvious, there is no such thing as a perfect cybersecurity product.  While there are many great products security pros use daily to keep their organizations secure, every one of them has things about them that could be better. However, as security stacks get increasingly complex, all these “less than ideal” items taken

Three Tell-Tale Signs It’s Time To Make Changes To Your Security Stack Read More »

Four Must-Haves to Secure Your OT Environment

Cybersecurity given: attackers will never stop trying to find ways to exploit weaknesses and vulnerabilities anywhere in an organization to carry out an attack. Whether it’s an unpatched web server, an out-of-date application with known vulnerabilities, or a user who tends to click links first and read later, attackers focus on finding a way to

Four Must-Haves to Secure Your OT Environment Read More »

Gartner’s predictions on OpenXDR? I think they got it wrong. Here’s why.

Republished from Jeffery Stutzman, CEO of Trusted Internet “Extended detection and response is a platform that integrates, correlates and contextualizes data and alerts from multiple security prevention, detection and response components. XDR is a cloud-delivered technology comprising multiple point solutions and advanced analytics to correlate alerts from multiple sources into incidents from weaker individual signals

Gartner’s predictions on OpenXDR? I think they got it wrong. Here’s why. Read More »

Stellar Cyber Product Update:
Dog Days of Summer Edition

As we are on the doorstep of the dog days of summer, where kids on summer break are soaking up the sun, the Stellar Cyber team is hard at work cranking out new features and capabilities aimed at helping customers continue to improve their ability to simplify security operations. While we have some cool new

Stellar Cyber Product Update:
Dog Days of Summer Edition
Read More »

How the Changing Attack and Cybersecurity Solutions Landscape Led Me to Join Stellar Cyber

Working in Cybersecurity for the past two decades, helping managed security service providers (MSSPs) meet the needs of their customers, gives me a unique perspective on how our industry has evolved and ultimately led me to join Stellar Cyber last month to run the Global Service Provider Business. As I get to know Stellar Cyber’s

How the Changing Attack and Cybersecurity Solutions Landscape Led Me to Join Stellar Cyber Read More »

“Proof of Concept” Season is Coming

Three signs your cybersecurity vendor might be gaming the system For those of you who attended the RSA Conference in April, I am sure the bombardment of vendor emails, phone calls, and LinkedIn meeting requests is underway. While I’d bet many of the vendors begging for meetings offer products or services that are not on

“Proof of Concept” Season is Coming Read More »

XDR

What Enterprise C-level Executive Customers Want From MSSPs

For an MSSP, the key to a CIOs heart is reducing risk for a cost that is less than what they’re spending now, Stellar Cyber asserts. A CIOs or CISOs job is never easy, but it’s more difficult now because cyberattacks are more frequent and more complex than ever before. Cybersecurity is a top priority

What Enterprise C-level Executive Customers Want From MSSPs Read More »

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators

Artificial intelligence (AI) has been transforming the cybersecurity landscape for over a decade, with machine learning (ML) speeding the detection of threats and identifying anomalous user and entity behaviors. However, recent developments in large language models (LLMs), such as OpenAI’s GPT-3, have brought AI to the forefront of the cybersecurity community. These models use documented

Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators Read More »

Three Reasons Securonix Customers are Moving to Stellar Cyber

There is an innate quality humans have to resist change. Our brains are hardwired to resist change, according to researchers. A part of our brain called the amygdala sees change as a threat and releases hormones for fear, fight, or flight. So when change arises, our brain tries to protect us from harm1, which makes

Three Reasons Securonix Customers are Moving to Stellar Cyber Read More »

The Great Leap Forward: The Stellar Cyber Product Update March 2023 Edition

As the majority of the US gets set to “leap forward” this weekend, moving the clocks one hour ahead in the wee hours of Sunday morning, I thought now would be a good time to reflect on how we have been spending our time over here in Stellar Cyber world since our last product update.

The Great Leap Forward: The Stellar Cyber Product Update March 2023 Edition Read More »

Open XDR – Central correlation of all cybersecurity events

Reduce business risk with early and accurate identification and remediation of all attack activity while reducing costs, maintaining investments in existing tools, and accelerating analyst productivity. Open XDR: Overall view and alerting of all potential attacks on the IT landscape In order to successfully protect a company from cyber attacks, a large number of different

Open XDR – Central correlation of all cybersecurity events Read More »

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete security tools to hunt for

What’s the Deal with Open XDR Read More »

Next Gen SIEM

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations

Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical, and every decision you make impacts those operations. When you have separate service providers–one for managed IT and another for extended detection & response (XDR)–you run the risk of delayed response and service. Patti Hallock, our Director of XDR Operations

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations Read More »

Scroll to Top