In this episode, we dive into the concept of the Model Context Protocol (MCP)—often described as the “USB for AI”—and how it enables seamless integration across tools like ticketing systems, security platforms, and knowledge bases.
Read More
Press Coverage
Release Date
- All
- AI-driven security
- Alliances Events
- Application Security
- Apps
- Artificial Intelligence
- Breach Detection
- Case Studies
- Case Studies - MSSP
- Cloud
- Cloud Security
- Compliment SIEM
- Core Capabilities - Datasheets
- Core Technologies - Datasheets
- Cyberattacks
- Cybercriminals
- Cybersecurity
- Data Breaches
- Data Collection
- Data Storage
- Deployment Models - Datasheets
- EDR - Endpoint detection and response
- EDR Alerts
- Endpoint
- Global MSSP Partner Program
- Identity
- Identity Threat Detection & Response (ITDR)
- In Person - Events Category
- Incident Response
- Internet Of Things
- IOT Security
- IT technology
- Kill Chain
- Machine Learning
- MSSP
- MSSPs
- NDR
- Network
- Network Security
- Network Traffic Analysis
- NG-SIEM
- Open XDR
- Open XDR Platform
- Open XDR Summit Event
- OT Environment
- OT Security
- Podcast
- Ransomware attacks
- Resilient Cybersecurity
- Security Operations Center (SOC)
- security technology
- SIEM
- SIEM technology
- SOC
- SOC Stars
- SOCless
- Solution Briefs
- Uncategorized
- University
- Vulnerability
- Webinar - General
- Webinar - Upcoming
- Webinars - Events Category
- Whitepapers
- XDR
- XDR Adoption
- XDR Solutions
RSAC 2026: Marlink & Stellar Cyber on AI, SecOps & Strategic Partnership
This episode offers valuable perspectives for cybersecurity leaders, MSSPs, and enterprises looking to leverage AI-driven Open XDR for better visibility, faster detection, and smarter response.
Read More
RSAC 2026 Recap: We’ve Hit Peak AI Noise
If RSAC 2026 showed anything, it’s this: we’ve hit peak AI fatigue.
Read More
The AI SOC Agent Hype: Separating Reality from Marketing
Every vendor says their SOC platform has AI agents. Most of them are running glorified chatbots on top of the same alert queues your analysts are already drowning in.
Read More
Why 45 Security Tools Create More Problems Than They Solve
The average enterprise runs 45 security tools. Most of them can't talk to each other and that's a problem.
Read More
How Stellar Cyber Helps SMBs Can Manage a SOC like an Enterprise Company
By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers...
Read More
TDIR Unlocked – What It Really Means and Why Stellar Cyber Is Built for It
As enterprises race deeper into cloud-first, identity-centric, hyperconnected environments, traditional security operations have hit a...
Read More
Strengthening Security Operations: Stellar Cyber’s Subo Guha
In this episode, we speak with Subo Guha, Senior Vice President of Product Management at...
Read More
The AI Advantage in SecOps Starts With What You Can See
Why logs + endpoints + network traffic—amplified by machine learning and agentic AI—form thestrongest SOC...
Read More
Stopping Threats in Their Tracks: Stellar Cyber’s NDR Latest Respond Capability Explained
Stopping Threats in Their Tracks: Stellar Cyber’s NDR Latest Respond Capability Explained In today’s modern...
Read More
Inside the Agentic Loop — Go Autonomous. Stay Human.
In this episode of the Stellar Cyber Podcast, we dig into the Agentic Loop: what...
Read More
Inside Stellar Cyber’s Data Pipeline: The Hidden Engine Behind Smarter Security
Executive Summary Modern SOCs are overwhelmed by data volume and complexity. The ability to filter,...
Read More
Beyond the SOC: Business Services Driving the Next MSSP Advantage
Episode 4 of this podcast explores how modern MSSPs are going beyond technology to deliver...
Read More
Building the Right Foundation for the Future SOC
Why SIEM + NDR + Any EDR Is the Strongest Path to a Human-Augmented Autonomous...
Read More
Threat Hunting & AI in SOC | Ben McGavin, Justin Dolgos, Todd Willoughby (RSM) with Vladislav Babiuk
Welcome to another episode of SOC Stars, hosted by Vladislav Babiuk from Stellar Cyber. In...
Read More
Lights-Out SOC? Yes, It’s Coming (and Faster Than You Think)
Recognized by Fast Company, TAG is a trusted next generation research and advisory company that...
Read More
Stellar Cyber Improves SOC Operations with Human-Augmented Autonomous Cybersecurity
Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while...
Read More
From Pyramid of Pain to Pyramid of Influence: Rethinking the Analyst’s Role in the Human-Augmented SOC
Bullish on Autonomous SOC. Realist about what gets us there.There’s been plenty of talk lately...
Read More
Identity Security, Reinvented: How Stellar Cyber ITDR Stops Credential-Based Attacks Before They Spread
In today's hybrid world, identity is the new perimeter-and attackers know it. As traditional EDR...
Read More
How Incident Response should be proactive, not reactive
Incident Response should be proactive, focusing on identifying and mitigating threats before they can cause...
Read More
Why NDR Alone Is No Longer Enough: The Case for an Open, Unified SecOps Platform Built on a Strong NDR Core
In today’s cybersecurity arms race, visibility is everything—but context is king. Network Detection and Response...
Read More
Why MSSPs Are Betting on AI—But Still Missing the Power of NDR
Live Network Traffic is the Missing Link: AI Can’t Detect What It Can’t See AI...
Read More
Why MSSPs Need a Human-Augmented Autonomous SOC
Scaling Cybersecurity Services with Agentic AI—Without Losing the Human Touch For today’s MSSPs (Managed Security...
Read More
Challenging the Status Quo: Why NDR Needs a New Playbook
Legacy platforms and point tools fall short. Discover why modern NDR demands a unified, AI-driven approach to outpace today’s cyber threats.
Read More
Why Stellar Cyber’s NDR Is More Than Just NDR: 5 Reasons It Outperforms Pure Play NDRs
The cybersecurity landscape is filled with siloed tools and stitched-together so-called platforms. Meanwhile security teams...
Read More
The Future of Small Business: Security Trends to Watch in 2025
Have you heard? SMB spending on small business cloud security is set to rise from...
Read More
Inside the Autonomous SOC: Agentic AI and the Next Security Frontier
Welcome to another exciting episode of the SOC Stars Podcast by Stellar Cyber! In this...
Read More
Stellar Cyber Podcast: Introducing the Infinity Global MSSP Partner Program with Jeff Hill & Steve Garrison
In this episode of the Stellar Cyber Podcast, Steve Garrison chats with Global MSSP Leader...
Read More
How Agentic AI is Transforming the SOC | Vladislav Babiuk, Stellar Cyber & Andrew Dutton, Sumitomo
Welcome to another episode of SOC Stars, hosted by Vladislav Babiuk from Stellar Cyber. In...
Read More
Why Stellar Cyber’s Open Cybersecurity Alliance Is a Game-Changer for MSSPs and Enterprises Alike
The cybersecurity world has long struggled with a fundamental challenge: how to unify an overwhelming...
Read More
Getting Actionable Intelligence with Stellar Cyber
The sheer volume of security alerts and data being generated by various sources like firewalls,...
Read More
Navigating MSSP Growth: Mergers, Acquisitions, and Strategic Differentiation
Join Steve Garrison, SVP of Marketing from Stellar Cyber and Jeff Hill, leader of MSSP practice,...
Read More
Enhancing Cybersecurity with RSM: A Deep Dive into Managed Security Services
Join us in this engaging episode of the Stellar Podcast, where Vladislav Babiuk from Stellar...
Read More
Autonomous SOC. Why It’s A Breakthrough For The Mid-Market.
Subo Guha is the senior vice president of product at Stellar Cyber. In this episode,...
Read More
Empowering SOC Teams with Open and Seamless API Integration
Today’s complex cyberthreat landscape poses both enterprises and Managed Security Service Providers (MSSPs) multiple challenges....
Read More
How Technology Is Shaping Businesses in Different Industries
Technology is rapidly transforming various industries, promoting innovation, efficiency, and the development of new business...
Read More
How Stellar Cyber is Helping MSSPs Offer Cyber Insurance
Stellar Cyber’s RiskShield empowers MSSPs to bridge the gap between cybersecurity and cyber insurance, acting as cyber coaches to help...
Read More
The Power of Partnerships in Cybersecurity
At Stellar Cyber, partnerships are at the heart of everything we do—from MSSPs and resellers...
Read More
Ransomware-Related Bankruptcy. The Case Of Stoli Vodka. Steve Garrison, Stellar Cyber.
Steve Garrison is the Senior Vice President of Marketing at Stellar Cyber. In this episode,...
Read More
The Power of Partnership: How Armis and Stellar Cyber Combine Forces to Redefine Security Operations
When it comes to cybersecurity, Armis and Stellar Cyber bring something unique to the table....
Read More
Stellar Cyber partnering with NCSA enhances KKU’s cybersecurity teaching efficiency with new Open XDR platform
Stellar Cyber, the innovator of Open XDR technology, announced its partnership with The National Cyber...
Read More
Introducing Stellar Cyber RiskShield
In the rapidly evolving cybersecurity landscape, companies of all sizes struggle to navigate the complexities...
Read More
Master AI Now or Risk Being Replaced: The Future of Security Operations with Stellar Cyber
In an era where Artificial Intelligence (AI) is revolutionizing every sector, including the field of...
Read More
Beyond the Basics: Advanced Techniques for Securing Your Crypto Wallet
As the recognition of cryptocurrencies continues to upward thrust, so does the sophistication of threats targeting crypto wallets. While many users are familiar with primary safety practices like the usage of strong passwords and enabling two-element authentication, superior measures are frequently ignored.
Read More
Enhancing Security Operations with 1Password Integration
At Stellar Cyber, we're committed to empowering security teams with the tools they need to...
Read More
Recent Outages Reveal Crucial Vulnerability in Security Infrastructure – and the Need for More Comprehensive Solutions
Microsoft and CrowdStrike occupied headlines for weeks after complications following a software update and a...
Read More
Hyperautomation for Security Teams
Six years ago, we founded DTonomy, a security automation company. As security software engineers and...
Read More
Drive efficiency with Stellar Cyber Open XDR platform on Oracle Government Cloud
Government security operations (SecOp) teams face unique challenges as they grapple with relentless attacks in...
Read More
Fighting AI with AI: Tools for the Twenty-First Century
In a recent conversation with a major educational institution’s CIO, the following circumstance arises: a...
Read More
Are You Competing with Your Vendor?
The rise of the managed security service provider (MSSP) has provided a lifeline to many...
Read More
Five Reasons LevelBlue (formerly AT&T Cybersecurity, formerly AlienVault) customers are moving to Stellar Cyber
One thing is for sure about 2024: There has been no shortage of drama in...
Read More
Five Reasons IBM QRadar SIEM On-Premises Users Evaluate and Choose Stellar Cyber Open XDR
By now, everyone knows the SIEM market is experiencing a never-before-seen consolidation, causing many security...
Read More
Bring Your Own Data Lake: Do It The Right Way
Having spent a significant amount of time in the SIEM industry, I've seen patterns and...
Read More
Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake
One of the challenges security teams face is managing the vast quantity of data required...
Read More
The Car Dealership Hack: Securing the Supply Chain
supply chain Open XDR Platform Open XDR Ai-Driven Security Cybersecurity The news earlier this week...
Read More
We Need to Talk: Breaking up with Your SIEM Vendor
Relationships are challenging at times. Think of it like a seesaw. Like in a seesaw,...
Read More
In a Cloudy World, On-Premises Still Might be The Way To Go
In 2012, I worked for one of the first vendors to deliver security-as-a-service. In those...
Read More
Data Management Approaches: Schema-on-Read vs. Schema-on-Write
Effective cybersecurity begins and ends with data. Since attackers can deploy their payloads in seconds,...
Read More
“Don’t Click It, Pitch It”: Stellar Cyber Partners with Minor League Baseball Teams to Launch an Initiative to Educate Young Adults about Cybercrime
& Stellar Cyber announces the launch of its new educational initiative, “Don’t Click It, Pitch...
Read More
SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil
As I wrote a couple of weeks ago, it is evident that the long-anticipated consolidation of...
Read More
Flexibility in SIEM: Choosing the Right Deployment Model for Your Needs
Over the past two decades, Security Information and Event Management (SIEM) solutions have become integral...
Read More
The Case for Building a Resilient Cybersecurity Framework
Market changes are not a threat, they are an opportunity. Unless you have been on...
Read More
Introducing Open XDR Investigator, Powered by GenAI
A new way to drive improved security analyst productivity When we look at a typical...
Read More
Are We Covered?
The new MITRE ATT&CK Coverage Analyzer takes the guesswork out of threat coverage. At Stellar...
Read More
Product Update: Bringing It All Together Edition
While hopefully everyone reading this had a fun and festive holiday season with family and...
Read More
Looking Ahead for Stellar Cyber
As many of us take stock of our personal goals, achievements, and aspirations this time...
Read More
Stellar Cyber Product Update Fall Edition
Kayleen Standridge from our Product Management team is providing this month's product update blog, detailing...
Read More
2024 cybersecurity predictions: GenAI edition
Unless you have lived under a rock for the past year, you know that generative...
Read More
How Blackberry Cylance Endpoint and Stellar Cyber Open XDR Work Together to Keep Organizations Safe
Cylance rocked the legacy endpoint anti-virus world by introducing the first-ever endpoint prevention product that...
Read More
Unpacking the 2023 Top 250 MSSPs Report
Recently, MSSP Alert published its yearly report on the Top 250 MSSPs. The report is...
Read More
Progressive Resilience In Cybersecurity Risk Management
University environments are naturally open, so cybersecurity risk is an ongoing concern. Trying to lock...
Read More
Clearing up the XDR Confusion…Finally.
This week Gartner weighed in on a technology that unfortunately became a dreaded three-letter word...
Read More
Stellar Cyber Product Update
Back to School Edition Kevin Wilson from our Product Management team is providing this month's...
Read More
Introduction to Stellar Cyber
The Stellar Cyber founding team is comprised of technology entrepreneurs with diverse backgrounds in networking,...
Read More
Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services NOW
With every breach and data leak splashed across your favorite news website or X feed,...
Read More
Three Tell-Tale Signs It’s Time To Make Changes To Your Security Stack
To state the obvious, there is no such thing as a perfect cybersecurity product. While...
Read More
Four Must-Haves to Secure Your OT Environment
Cybersecurity given: attackers will never stop trying to find ways to exploit weaknesses and vulnerabilities...
Read More
Gartner’s predictions on OpenXDR? I think they got it wrong. Here’s why.
Republished from Jeffery Stutzman, CEO of Trusted Internet “Extended detection and response is a platform...
Read More
Stellar Cyber Product Update:
Dog Days of Summer Edition
As we are on the doorstep of the dog days of summer, where kids on...
Read More
Amazon Security Lake is now generally available
Today we are thrilled to announce the general availability of Amazon Security Lake, first announced...
Read More
Considering an XDR Purchase? Here Are Our Lessons Learned.
Lessons learned from our search for, and integration of, our XDR Trusted Internet is now...
Read More
How the Changing Attack and Cybersecurity Solutions Landscape Led Me to Join Stellar Cyber
Working in Cybersecurity for the past two decades, helping managed security service providers (MSSPs) meet...
Read More
“Proof of Concept” Season is Coming
Three signs your cybersecurity vendor might be gaming the system For those of you who...
Read More
What Enterprise C-level Executive Customers Want From MSSPs
For an MSSP, the key to a CIOs heart is reducing risk for a cost...
Read More
Unlocking the Potential of AI/ML in Cybersecurity: Challenges, Opportunities, and Progress Indicators
Artificial intelligence (AI) has been transforming the cybersecurity landscape for over a decade, with machine...
Read More
RSAC 2023 Recap
After four jammed packed days in the Moscone Center in the heart of San Francisco,...
Read More
Three Reasons Securonix Customers are Moving to Stellar Cyber
There is an innate quality humans have to resist change. Our brains are hardwired to...
Read More
Three Ways to Make RSAC 2023 Worthwhile
Plus, a Bonus Hot Topic Prediction As the cybersecurity world prepares to descend upon the...
Read More
Netskope and Stellar Cyber Working Together to Help Organizations Drive Vendor Consolidation
As continued economic headwinds persist into 2023, security leaders look toward simplifying their security stack...
Read More
The Great Leap Forward: The Stellar Cyber Product Update March 2023 Edition
As the majority of the US gets set to “leap forward” this weekend, moving the...
Read More
Open XDR – Central correlation of all cybersecurity events
Reduce business risk with early and accurate identification and remediation of all attack activity while...
Read More
One of These Things is not Like the Others
By nature, humans are wired to avoid undue risks. While there are always exceptions to...
Read More
Earning Trust As A Cybersecurity Vendor
Practitioners, executives, and investors know the stakes for cybersecurity are incredibly high and will only...
Read More
What’s the Deal with Open XDR
Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of...
Read More
The New-Look Stellar Cyber
As a cybersecurity vendor, making a great product or service that solves a big problem...
Read More
Fireside Chats. Protecting Your OT & IT Environments. Steve Salinas, Stellar Cyber.
Steve Salinas is the Head of Product Marketing at Stellar Cyber. In this episode, Steve...
Read More
Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations
Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical,...
Read More
Product Review: Stellar Cyber Open XDR Platform
Originally posted in Almost every vendor, from email gateway companies to developers of threat intelligence...
Read More
MSSP Alert Live Recap
I’m sure, like most people reading this blog, the past two-plus years for me were...
Read More
Fireside Chats. When & How To Bring An MSSP To Your Lean Security Team. Steve Salinas, Stellar Cyber
Cybercrime Magazine · Fireside Chats. When & How To Bring An MSSP To Your Lean...
Read More
Economics Of Shift Left Security
I’ve worked with dozens of SecOps and Detection and Response teams over the past few...
Read More
MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow
In today’s ultra-competitive MSSP market, business owners are looking for ways to make their offerings...
Read More
Advocating for security in a financial storm?
Here we go again. Just after the world was pulling itself out of the total...
Read More
When and how to bring in an MSSP to help your lean security team
Over the past few weeks, I have written several blogs about the lean security team....
Read More
If layered security is the cake, Open XDR is the frosting
The anchor of Enterprise Security is popularly known as a “Defense in Depth” architecture. The...
Read More
September Product Update: How I Spent My Summer Vacation:
The Stellar Cyber September Product Update As summer ends and the kids tearing up your...
Read More
What is a Lean Security Team, and how to know if you are part of one
Recently I wrote a blog about what makes a lean security team tick, however, after...
Read More
Open XDR vs. SIEM
Introduction: The next generation of security intelligence is here, and it's called extended detection and...
Read More
Fireside Chats. SIEMs & XDR. Sam Jones, VP of Product Management, Stellar Cyber.
Cybercrime Magazine · Fireside Chats. SIEMs & XDR. Sam Jones, VP of Product Management, Stellar...
Read More
What makes a lean security team tick
When budgets and resources are high, security teams have the luxury of building complex security...
Read More
An Interview with MSP Channel Veteran, Stephan Tallent
MSP channel veteran Stephan Tallent, Stellar Cyber, drops into the MSP Zone to discuss a...
Read More
Fireside Chats. How Lean Security Teams Can Become Heroes With XDR. Steve Salinas, Stellar Cyber.
Steve Salinas is the Head of Product Marketing at Stellar Cyber. In this episode, Steve...
Read More
August Product Update
August Product Update Stellar Cyber continually works to ensure the products we deliver not only...
Read More
Fireside Chats. Managed Services – Cutting Through The Acronym Soup. Stephan Tallent, Stellar Cyber.
Stephan Tallent is the Global Vice President, Service Provider at Stellar Cyber. In this episode,...
Read More
Fireside Chats. Scaling For Distributed Security Environments. Steve Salinas, Stellar Cyber.
Steve Salinas is the Head of Product Marketing at Stellar Cyber. In this episode, Steve...
Read More
Our new normal challenges the economic viability of traditional cybersecurity thinking.
Stellar Cyber’s new sensors eliminate blind spots in your, or your customers’, distributed environments without...
Read More
Should you build your own or purchase MDR services — Is Open XDR the answer?
For the last several years, MSP partners have been making a tough decision – should...
Read More
One Year Later: Lessons from the Colonial Pipeline Ransomware Attack
A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to...
Read More
What Rippling Will Do To HR, XDR Will Do To Security
In this tumultuous software equity market, where corporate valuations are coming back to levels based...
Read More
Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business
As an MSSP, being proactive in your approach to cybersecurity is a best practice. Ensuring...
Read More
Fireside Chats. Protect Enterprises From Cybercrime. Steve Garrison, VP of Marketing, Stellar Cyber.
Cybercrime Magazine · Fireside Chats. Protect Enterprises From Cybercrime. Steve Garrison, VP of Marketing, Stellar...
Read More
Open XDR In the Real World – Q&A With Jon Mayled
In this interview, we capture real-world experience and recommendations from an enterprise that implemented Stellar...
Read More
Keys to a Successful XDR Implementation
Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data...
Read More
Cybersecurity Infrastructure Needs a New Model
Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with...
Read More
Going SOCless
According to the FBI, the number of cyberattacks reported to their Cyber Division is up...
Read More
Fireside Chats. Closing The Talent Gap. Brian Stoner, VP, Service Providers, Stellar Cyber
Fireside Chats is a Cybercrime Magazine podcast series brought to you by Stellar Cyber. On...
Read More
Preventing Cybersecurity Attacks Through Innovation and Democratization with Aimei Wei of Stellar Cyber
Leaders of B2B - Interviews on B2B Leadership, Tech, SaaS, Revenue, Sales, Marketing and Growth....
Read More
Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks
With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting...
Read More
How to Decrease Your Cyber Attack Surface
MSPs and customers alike are instrumental in the global fight against cyber attacks. Nobody can win...
Read More
Technical Approach To Universal EDR
For security vendors and those in the XDR market specifically, there is an architectural axis...
Read More
Mastering EDR – Industry’s First Universal EDR
In detection and response, bidirectional integrations between security products, let alone unidirectional integrations, are not...
Read More
Build a new Superpower for your MSSP business!
Providing endpoint security for all your customers is a major challenge. First, it is very...
Read More
The Three Waves of XDR – Open XDR delivers and extends the value of existing investments
We asked CIOs and CISOs what keeps them up at night, and the two main...
Read More
Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!
MSSPs all deal with a crushing number of alerts daily – but how are the...
Read More
Stellar Cyber’s Open XDR – Step into Security
Security can be intimidating for MSP partners making the transition to MSSP. The industry makes...
Read More
Enterprise Security. Risk Vs. Spend. Sam Jones, VP of Product Management, Stellar Cyber.
Cybercrime Magazine · Enterprise Security. Risk Vs. Spend. Sam Jones, VP of Product Management, Stellar...
Read More
Stellar Cyber: Log4j Vulnerability and Exploitation Detection
1. Introduction In the past several days, a serious Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) has nearly...
Read More
XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR
2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response -...
Read More
When Doing Nothing is Too Expensive
Resource strapped companies trying to put together a comprehensive cybersecurity defense in today’s environment have...
Read More
XDR/Open XDR Q&A
What are the most common misconceptions about XDR? One of the common misconceptions is that...
Read More
Why We Invested in Stellar Cyber, Open XDR for enterprise-level security
Stellar Cyber is simplifying cyberthreat detection and response with its open extended detection and response...
Read More
MSPWorld Spring 2022
March 21st - 24th, 2022 Orlando World Center Orlando, Florida
Read More
Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room
Network detection and response (NDR) has a long history, evolving out of network security and...
Read More
Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?
Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are...
Read More
SIEM, XDR, and the Evolution of Cybersecurity Infrastructure
Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing...
Read More
NDR vs. Open XDR – What’s the difference?
Every security tool vendor talks about detection and response, so what makes NDR so special,...
Read More
Q&A on Network Detection and Response (NDR)
What is NDR? Today’s network detection and response (NDR) has a long history, evolving out...
Read More
Everything about XDR is around Correlations, not Hype
In the last several months the XDR acronym is being used by almost every security...
Read More
Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?
Today there is no shortage of compliance requirements. There are so many, in fact, that...
Read More
Does XDR Need A New Kill Chain?
The time has come for cyber security technology to keep up with the adversaries. Now...
Read More
How AI and Machine Learning Improve Enterprise Cybersecurity
A recent study1 by Information Risk Management points out that 86 percent of enterprises will...
Read More
Open XDR vs. SIEM
Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks...
Read More
Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?
Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be...
Read More
XDR explained in 300 words
XDR is the rising star of new acronyms, but you might have to read a...
Read More
The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?
Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log...
Read More
The Case for Open XDR – X Means Everything
The current model for cybersecurity is broken. It consists of acquiring and deploying a lot...
Read More
Alerts, Events, Incidents: Where Should Your Security Team Focus?
As the cybersecurity threat landscape is evolving so is the way we need to look...
Read More
Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response
Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet...
Read More
XDR Delivers Significant Performance Improvement over SIEM
In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean...
Read More
An Integrated TIP for Simplified and Efficient Security Operations
Cybersecurity platforms are only as intelligent as the data provided to them, and every security...
Read More
How to leverage Open XDR as a strategic advantage for MSP and MSSP partners
Stellar Cyber built the original Open XDR platform. It provides tool consolidation, improved SOC performance, and...
Read More
With Stellar Cyber’s Open XDR, No EDR is an Island
Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and...
Read More
How Stellar Cyber Addresses Data Storage Pain
Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one...
Read More
Cyberthreats Go Sideways
The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie...
Read More
Was SUNBURST really a Zero-day attack?
Most companies affected by the SolarWinds attack learned about it from the Department of Homeland...
Read More
A Security Discussion Around Sunburst
What was the sunburst attack and how can MSPs protect themselves against in the future?...
Read More
Building A Cybersecurity Company And Lessons Learned From Being A Mom – Podcast
Aimei Wei on starting up, employee development, and women in cyber Aimei Wei is a woman...
Read More
MSSP – Build or Partner – Podcast
If you are wanting to accelerate your steps towards offering managed security, you have a...
Read More
Interview With Changming Liu by Safety Detectives
Changming Liu, CEO and Co-Founder of Stellar Cyber, did us the honor of sitting down...
Read More
SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis
On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from...
Read More
How MSSPs Differentiate. Flexible Solutions. Brian Stoner,VP of Service Providers at Stellar Cyber
Meet Brian Stoner,VP of Service Providers at Stellar Cyber. Cybercrime Magazine · How MSSPs...
Read More
Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform
Extending managed detection and response across your customers entire attack surface with one comprehensive platform...
Read More
IUWorld Cybersecurity Governance, Risk & Compliance
Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the...
Read More
IUWorld Cybersecurity Governance, Risk & Compliance
Part I: Demystifying Cyber Health and Cyber Threat Hunting JEFF: Welcome to Cloud Expo,...
Read More
Leverage the tools and telemetry you trust
The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing...
Read More
What is Network Security?
The historical definition of network security is to use a firewall to screen users coming...
Read More
Red Team – Blue Team Testing – The Big Picture
Ever since offensive security testing began, we have expected that the test or simulation will...
Read More
Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber
Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber
Read More
When is Enough, Enough?
Are SIEMs the foundation to build on or are they empty promises? With more complex...
Read More
Opportunities for women in the cybersecurity.
Opportunities for women in the cybersecurity. TechBlogWriter interview of Aimei Wei Listen the Audio
Read More
What Is Cybersecurity?
Cybersecurity is in the news a lot, and typically in a bad way. We learn...
Read More
Cybersecurity Challenges and Solutions
Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data,...
Read More
A Conversation about the New Wave of Cybersecurity
Its time, again, to change the conversation in cybersecurity. It’s neither data-driven nor AI-driven cybersecurity,...
Read More
Meet Stellar Cyber and the Open-XDR Security Platform
Meet Stellar Cyber and the Open-XDR Security Platform. Cybercrime Magazine interview of Steve Garrison Listen...
Read More
Why are leading market research firms so excited about XDR?
Q&A with CEO and Co-Founder Changming Liu Q. Why do you think people including CISOs...
Read More
Big companies are not immune to Ransomware!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than...
Read More
Why XDR?
(Extended Detection and Response)
Why XDR (Extended Detection and Response) ? Timing is everything As the security industry...
Read More
What is XDR ?
(Extended Detection and Response)
There’s a new acronym out there in the security space: it’s XDR (Extended Detection and...
Read More
A Single PAIN of Glass
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than...
Read More
Myth Buster: Data Fatigue is not real!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than...
Read More
XDR Without Limits
The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure....
Read More
A brief history of machine learning in cybersecurity
How to connect all the dots in a complex threat landscape Originally published in Security...
Read More
A Platform to Support XDR
Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if...
Read More
MDR-as-a-Service – Is it the Holy Grail as Some Say?
MDR-as-a-Service – Is it the Holy Grail as Some Say? David Barton, Stellar Cyber CISO...
Read More
SIEM is dead! Long live C.I.A.
For years, I have heard the benefits of log forwarding and collection. Send all your...
Read More
Introducing “Swipe Left” Security
You may have heard about the idea of shifting left in security: as developers move...
Read More
Security as a Service – Where do I start?
Security as a Service – Where do I start? A discussion with David Barton, CISO...
Read More
Bundling Security Services to Improve Pricing and Close Ratios
Today’s businesses succeed by selling a handful of bundled items to a large number of...
Read More
The 2019 Capital One Breach
Data breaches are major security threats for enterprises and end users. Previously, we discussed the...
Read More
New Ransomware called LooCipher has been found in the Wild
According to Bleeping Computer, a new ransomware called LooCipher has been found in the wild....
Read More
Stellar Cyber with John Peterson, Chief Product Officer
On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson,...
Read More
DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.
DNS has come under fire lately as nation-states and hacker groups have targeted DNS as...
Read More
Distributed Security Intelligence
Distributed Security Intelligence Artificial Intelligence is radically transforming the cybersecurity industry. To successfully use A.I...
Read More
Artificial Intelligence Primer
Artificial Intelligence and Machine Learning are the technologies that are at the forefront of what...
Read More
What Are DGAs and How to Detect them?
Domain Generation Algorithms (DGAs) are a class of algorithms that periodically and dynamically generate large...
Read More
The 2017 Equifax Breach
In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach...
Read More