Stellar Cyber Open XDR - logo
Search
Close this search box.

Press Coverage

Release Date

Release Date:
Cybersecurity M&A and Platforms vs. Tools: What it Means for MSSPs

Cybersecurity M&A and Platforms vs. Tools: What it Means for MSSPs

For years, MSSPs and MSPs have been assembling cybersecurity defenses for business clients by piecing together a wide range of individual security applications from multiple vendors to fortify strong, armored walls against cyberattacks.
Read More
Cybersecurity M&A Heats Up: What it Means for MSSPs and MSPs

Cybersecurity M&A Heats Up: What it Means for MSSPs and MSPs

There are also many choices when it comes to advanced security tools such as MDR (managed detection and response) and XDR (eXtended detection and response). Some MSPs work with multiple vendors for this type of advanced security in order to assure better protection for their end customers.
Read More
Cybersecurity Consolidation Ahead: Tool Sprawl Rolls Up to Platforms

Cybersecurity Consolidation Ahead: Tool Sprawl Rolls Up to Platforms

For years, MSSPs and MSPs have been assembling cybersecurity defenses for business clients by piecing together a wide range of individual security applications from multiple vendors to fortify strong, armored walls against cyberattacks.
Read More
Stellar Cyber Integrates with Palo Alto Networks Cortex XSOAR to Speed Cybersecurity Investigation Workflow Process from End-to-End

Stellar Cyber Integrates with Palo Alto Networks Cortex XSOAR to Speed Cybersecurity Investigation Workflow Process from End-to-End

SAN JOSE, Calif.–(BUSINESS WIRE)–#ai–Stellar Cyber, the world’s most open AI-driven security operations platform powered by Open XDR technology, announced a new integration with Palo Alto Networks Cortex XSOAR, the leading security orchestration and response platform, to streamline the cyber investigation workflow process from end-to-end. This integration combines the power of Stellar Cyber Open XDR with Cortex XSOAR, helping security teams decrease mean-time-to-detection (MTTD) and mean-time-to-response (MTTR), two critical metrics most security team leaders track.
Read More
SIEM Evolution: Anticipated Transformations In 2024

SIEM Evolution: Anticipated Transformations In 2024

Security Information and Event Management is a key tool in threat detection and response. With 2024 on the horizon, we will explore the key trends and factors that will change the SIEM landscape. This article will examine these key trends and emerging changes in detail and provide an overview of what to expect in the SIEM landscape in 2024. Users will learn about the shift towards cloud-based security monitoring, the automation of incident response, the importance of data privacy and compliance, the benefits of threat intelligence sharing and collaboration, and the impact of Zero Trust Architecture on SIEM strategies.
Read More
The Importance of Integrating MITRE ATT&CK Into an NDR solution

The Importance of Integrating MITRE ATT&CK Into an NDR solution

Cyber attacks are becoming more common, targeting organizations with ever-sophisticated technologies and techniques. Cyber security professionals are striving daily to safeguard their network; however, with the help of some advanced solutions and frameworks like MITRE ATT &CK, this may be possible.
Read More
How SIEM, EDR, and NDR Work Together

How SIEM, EDR, and NDR Work Together

Organizations face a wide range of cyber threats, ranging from sophisticated malware to advanced persistent threats. These threats have created the need for higher security measures. Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) are three advanced technologies that play an essential role in safeguarding digital infrastructures.
Read More
Integrating Generative AI with XDR

Integrating Generative AI with XDR

Generative AI has been a trending term or topic within the tech industry, requiring top personalities like Elon Musk to speak about the technology. It is quite different from the previous versions of artificial intelligence and has a wide range of use cases, including the cybersecurity sector.
Read More
How AI Will Impact Cybersecurity and Its Implications for SIEM

How AI Will Impact Cybersecurity and Its Implications for SIEM

Artificial Intelligence (AI) is changing the way various industries operate, and cybersecurity is no exception. Over the years, cyber threats have been complex and frequent, and the need for advanced, adaptive security measures is greater than ever. AI and Machine Learning (ML) offer powerful tools to enhance cybersecurity defenses, but they also bring new challenges and risks.
Read More
2024 Outlook for XDR: Emerging Trends and Key Challenges

2024 Outlook for XDR: Emerging Trends and Key Challenges

As cyber threats become more sophisticated, more advanced technology must be integrated into security networks. XDR is a revolutionary solution that offers enhanced visibility and automated response capabilities across various security layers. The XDR system is constantly changing as new trends and numerous challenges influence it.
Read More
MSP Brite Reveals The Latest Cybersecurity Strategies

MSP Brite Reveals The Latest Cybersecurity Strategies

Cyberattacks are always evolving, and so are the tools and techniques organizations use to manage risk. To get the latest industry perspective, Stephen Salinas, head of product marketing at Stellar Cyber, interviewed Trevor Smith, executive vice president at Brite, a New York-based MSSP and technology solution provider.
Read More
Supercharging SecOps Productivity With AI

Supercharging SecOps Productivity With AI

There are plenty of cybersecurity tools that give SecOps analysts visibility into various aspects of their IT and OT infrastructure. In fact, most mid-sized and larger enterprises and MSSPs have a dozen or more such tools in their portfolios.
Read More
Using AI/ML To Combat Cyberattacks

Using AI/ML To Combat Cyberattacks

Machine learning is being used by hackers to find weaknesses in chips and systems, but it also is starting to be used to prevent breaches by pinpointing hardware and software design flaws
Read More
The History, Development, And Current Landscape of SIEM

The History, Development, And Current Landscape of SIEM

Ever since the internet was created, security has become one of the major concerns for individuals and organizations using it. In fact, cybersecurity threats on the internet have continued to evolve and become more complex and sophisticated due to more security tools entering the market. Thus, it is equally important that new cybersecurity technologies are created and the existing ones are refined if individuals and businesses stand any chance of overcoming cybersecurity challenges.
Read More
Can NDR and SIEM Work Together?

Can NDR and SIEM Work Together?

Organizations are continually seeking effective strategies to boost their defenses against the present threat of cyberattacks. One such strategy that is gaining traction is the integration of Network Detection and Response (NDR) with Security Information and Event Management (SIEM) systems. This fusion of technologies holds the promise of enhancing threat detection, response capabilities, and overall security posture. But can NDR and SIEM truly work together synergistically to fortify the cyber defenses of modern organizations? Let's go deeper into this question and explore the dynamics of this integration.
Read More
NDR in the Modern Cybersecurity Landscape

NDR in the Modern Cybersecurity Landscape

Network Detection and Response (NDR) is a critical component in the arsenal of cybersecurity tools, offering advanced capabilities to monitor, analyze, and respond to threats traversing network environments.
Read More
7 Essential Factors for Selecting the Best SIEM Tools

7 Essential Factors for Selecting the Best SIEM Tools

Organizations face huge cyber threats ranging from sophisticated malware to insider attacks. To combat these threats effectively, Security Information and Event Management (SIEM) tools play a major role. SIEM solutions empower organizations to aggregate, analyze, and correlate vast amounts of security data from various sources, enabling real-time threat detection and incident response.
Read More
AI-Driven Cybersecurity: 8 Top Use Cases

AI-Driven Cybersecurity: 8 Top Use Cases

AI’s impact on the cybersecurity sector has been significant, with its market value surpassing $10 billion in 2020 and expected to skyrocket to $46 billion by 2027. This high growth shows AI’s potential in combating cyber threats and fortifying digital defenses. What drives this excitement is AI’s ability to analyze vast datasets, detect patterns, and make informed decisions, fundamentally changing the cybersecurity sector.
Read More
Why Traditional SIEM is Making Way for The Rise of AI-Driven SIEM Solutions

Why Traditional SIEM is Making Way for The Rise of AI-Driven SIEM Solutions

Security Information and Event Management (SIEM) stands as a vital pillar of cybersecurity, furnishing cybersecurity teams with a suite of functionalities for monitoring IT environments. SIEM systems have been instrumental in fortifying digital defences, from data analysis to event correlation, aggregation, reporting, and log management.
Read More
Stellar Cyber Unveils GenAI-Driven Open XDR Investigator

Stellar Cyber Unveils GenAI-Driven Open XDR Investigator

Stellar Cyber, the trailblazer of Open XDR technology, will provide an exclusive preview of its Gen AI-powered Open XDR Investigator at the upcoming RSA Conference in San Francisco, CA, starting May 6. Located at booth 244, the event will showcase the cutting-edge capabilities of the Open XDR Investigator, designed to revolutionize investigations, threat hunting, and response procedures within cybersecurity.
Read More
Stellar Cyber to Preview GenAI-Driven Open XDR Investigator at 2024 RSA Conference

Stellar Cyber to Preview GenAI-Driven Open XDR Investigator at 2024 RSA Conference

GenAI-powered Stellar Cyber Open XDR Investigator is set to revolutionize productivity and effectiveness of manage security services provider (MSSP) and Enterprise security teams, offering unique features that streamline investigations and threat hunting
Read More
Revolution of Security Operations: The Stellar Cyber Story

Revolution of Security Operations: The Stellar Cyber Story

In the rapidly expanding domains of cybersecurity, the demand for creative answers has never been more urgent. Stellar Cyber was started in 2015 by Changming Liu & Aimei Wei to accommodate changes in security operations and ease the burden of analysts in the face of data overload. Drawing from her experience at tech giants like Cisco and Nortel, Wei recognized the pressing issue: the overabundance of alerts, the need for manual data correlation, and the disparate security consoles lurking in enterprises of medium-to-large size and Managed Security Service Providers (MSSPs).
Read More
Stellar Cyber, Acronis Team to Beef Up MSPs’ Cybersecurity

Stellar Cyber, Acronis Team to Beef Up MSPs’ Cybersecurity

Stellar Cyber is partnering with Acronis to deliver a threat detection and response solution that allows MSPs to protect on-premises, cloud, hybrid, and IT/OT environments. Through this partnership, Stellar Cyber and Acronis aim to help organizations protect themselves from advanced cyberattacks by removing artificial obstacles that make it difficult for security teams to identify and mitigate threats effectively.
Read More
An MSSP Shares The Latest In Ransomware: What’s Up, And What To Do About It

An MSSP Shares The Latest In Ransomware: What’s Up, And What To Do About It

Everyone has been concerned with ransomware for years now, but the landscape is always changing, so it’s important to stay up on the latest trends. Stephen Salinas, Stellar Cyber head of product marketing, sat down with Michael Crean, founder of MSSP Solutions Granted and now senior vice president of Managed Security Services at SonicWall, to get his perspective.
Read More
Stellar Cyber Launches MITRE ATT&CK Coverage Analyzer for Partners and Customers

Stellar Cyber Launches MITRE ATT&CK Coverage Analyzer for Partners and Customers

Stellar Cyber, the inventor of Open XDR technology, announced the launch of the MITRE ATT&CK Coverage Analyzer, enabling users to quickly visualize the impact of data source changes on their ability to detect threats in their specific environments. With this new tool, free of charge to all existing customers, security teams can easily baseline their existing MITRE ATT&CK coverage and then run various data sourcing scenarios, getting real-time feedback.
Read More
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer

Stellar Cyber launches MITRE ATT&CK Coverage Analyzer

Stellar Cyber launched the MITRE ATT&CK Coverage Analyzer, enabling users to visualize the impact of data source changes on their ability to detect threats in their specific environments.
Read More
Experts share how to make it harder for hackers to steal your passwords

Experts share how to make it harder for hackers to steal your passwords

It's a massive data breach impacting both current and former customers, but unfortunately, this breach is just the latest of a string of cyberattacks. And no matter if they're large or small, they can still lead to identity theft and massive headaches for consumers.
Read More
Stellar Cyber and Trellix Bridge the Gap in Security Operations

Stellar Cyber and Trellix Bridge the Gap in Security Operations

Security teams, often understaffed and overworked, struggle to keep pace with the onslaught that is cyberattacks. Why? Security tools, while valuable, can create a complex web of siloed data and require significant expertise to manage. This complexity slows down response times and hinders the ability to identify and address threats effectively.
Read More
Is SIEM outdated? Why Traditional SIEM is Dead

Is SIEM outdated? Why Traditional SIEM is Dead

When SIEM was first introduced to the world of computing by Mark Nicolett and Amrit Williams of Gartner (News - Alert), it revolutionized the way businesses and IT professionals approached systems security. By merging information storage/analysis functionality with real-time monitoring and notification of security events, SIEM strategies offer protection from both vulnerabilities caused by internal system errors and outside malicious actors.
Read More
SIEM Implementation: Strategies And Best Practices

SIEM Implementation: Strategies And Best Practices

Security Information and Event Management (SIEM) systems play a pivotal role in the cybersecurity posture of organizations with a suite of real-time monitoring, threat detection, and incident response capabilities.
Read More
Integrating MSSPs with Your SIEM Strategy

Integrating MSSPs with Your SIEM Strategy

Many organizations are getting into Security Information and Event Management (SIEM), mainly due to the sophisticated security protection it offers. But even some of them are taking it further with the integration of Managed Security Service Providers (MSSPs) into these SIEM solutions.
Read More
How Native XDR is Different Than Open XDR

How Native XDR is Different Than Open XDR

Staying ahead of threats requires sophisticated tools and strategies. So, Extended Detection and Response (XDR) serves as a solution, promising to revolutionize threat detection and response capabilities across organizations. However, within XDR, two distinct approaches are distinct: Native XDR and Open XDR. Understanding the pattern of operation between these approaches is vital for organizations seeking to fortify their defenses effectively.
Read More
What is the difference SIEM and other monitoring tools?

What is the difference SIEM and other monitoring tools?

Security Information and Event Management (SIEM) solutions and other monitoring tools stand out as indispensable components of a comprehensive security posture. SIEM systems offer a centralized platform for collecting, analyzing, and correlating security event data, empowering organizations to detect and respond to cyber threats effectively. On the other hand, intrusion detection systems (IDS), network monitoring tools (NetMon), security orchestration, automation, and response (SOAR) platforms, and log management systems (LMS) provide additional layers of security and visibility into an organization’s IT environment.
Read More
The Architecture of a Modern SIEM

The Architecture of a Modern SIEM

In today's digital world, enterprises are continuously confronted with safeguarding their assets against a barrage of cyber threats. So, security Information and Event Management (SIEM) systems have served as indispensable tools in the arsenal of modern cybersecurity defenses.
Read More
Stellar Cyber’s Open XDR for MSSPs Puts Big Cyber on Notice

Stellar Cyber’s Open XDR for MSSPs Puts Big Cyber on Notice

One of the IT industry’s hottest markets is Open XDR, a hybrid of eXtended (or cross-platform) detection and response. The technology focuses on integrating differing tools across the security stack (EDR, SIEM, cloud, etc.) to provide a single, comprehensive view of threats.
Read More
SIEM vs XDR: Capabilities and Key Differences

SIEM vs XDR: Capabilities and Key Differences

All enterprises comprise vast webs of interconnected devices. An average company relies on hundreds of thousands of endpoint devices at any one time. The constant exchange of information necessary to sustain business depends on a network of surrounding infrastructure, such as load balancers, data storage, and APIs.
Read More
The Crucial Role of SIEM Solutions in Enhancing SOC Operations

The Crucial Role of SIEM Solutions in Enhancing SOC Operations

Security Operations Centers (SOCs) defend against evolving cyber threats. The Security Information and Event Management (SIEM) solution, a tool for fortifying organizational defenses, helps this work smoothly.
Read More
Cyber Insurance Providers Offer Their Own MDR

Cyber Insurance Providers Offer Their Own MDR

Beazley Security, the cybersecurity services business unit of the insurance giant Beazley, is getting into the managed XDR business in competition with incumbent players including technology vendors and MSSPs.
Read More
America’s Best Startup Employers

America’s Best Startup Employers

Nearly 5.5 million businesses were launched in the United States last year, making 2023 the highest year on record for new startups, according to the U.S. Census Bureau’s Business Formation Statistics.
Read More
RSM US Partners With Stellar Cyber’s Open XDR Platform To “Unify And Fortify Global Cybersecurity”

RSM US Partners With Stellar Cyber’s Open XDR Platform To “Unify And Fortify Global Cybersecurity”

In recent years, cyber threats have grown markedly in sophistication and frequency, with each attack likely to incur significant costs, reputational damages, system downtime, and legal penalties. Faced with this danger, ensuring strong security across all devices and networks has become a core business priority.
Read More
A Discussion With Michael Hamilton, Founder Of Critical Insight, And Stephen Salinas, Stellar Cyber

A Discussion With Michael Hamilton, Founder Of Critical Insight, And Stephen Salinas, Stellar Cyber

Steve: Good morning, good afternoon, good evening. Thanks for joining us today. My name is Steve Salinas. I’m the head of product marketing here at Stellar Cyber. And today I’m joined by Michael Hamilton, the founder and CISO at Critical Insight.
Read More
How SIEM Alerts Play a Key Role in The Early Detection of Security Threats?

How SIEM Alerts Play a Key Role in The Early Detection of Security Threats?

In today’s world, the ability to detect and respond to threats in real-time is paramount. Cybercriminals, adept at exploiting vulnerabilities, can quickly compromise networks, devices, and accounts. The challenge lies in identifying these threats amidst the data generated by the applications and accounts within a typical tech stack. So, Security Information and Event Management (SIEM) technology emerges as a critical tool, acting as a vigilant guardian by continuously monitoring and analyzing security events.
Read More
RSM US, Stellar Cyber Announce ‘Single Pane of Glass’ Security For Midmarket IT

RSM US, Stellar Cyber Announce ‘Single Pane of Glass’ Security For Midmarket IT

RSM US, a provider of professional services including managed security for the midmarket, announced Monday that it is integrating Stellar Cyber's Open XDR unified security platform into its own security offerings. "Stellar Cyber is taking a different approach to what's been offered in the market over the last 15 years," RSM defense director and threat operations leader Todd Willoughby, said in a statement.
Read More
SIEM in 2024: Key Trends and New Changes

SIEM in 2024: Key Trends and New Changes

SIEM, an acronym for Security Information and Event Management, amalgamates Security Information Management (SIM) and Security Event Management (SEM) to provide a comprehensive approach to security.
Read More
RSM US Adopts Stellar Cyber’s Open XDR to Enhance Managed

RSM US Adopts Stellar Cyber’s Open XDR to Enhance Managed

Managed security services provider RSM US has announced that the company has begun to leverage Stellar Cyber’s open extended detection and response (“Open XDR”) platform to simplify the way it delivers cybersecurity coverage for its customers.
Read More
Top 9 Reasons Network Detection and Response (NDR) is Essential

Top 9 Reasons Network Detection and Response (NDR) is Essential

Before looking into the reasons behind the indispensability of NDR, it’s important to comprehend its meaning and functionality. NDR, which stands for Network Detection and Response, is a cybersecurity solution that monitors network traffic data. It has emerged as a critical component in cybersecurity, offering capabilities to identify and thwart threats.
Read More
AI in SIEM: What are the Benefits for Enterprises

AI in SIEM: What are the Benefits for Enterprises

The fundamental role of SIEM is to provide enterprises with threat monitoring, event correlation, incident response, and reporting. By collecting, centralizing, normalizing, and analyzing log data from various sources, including applications and firewalls, SIEM acts as a vigilant guardian, alerting IT security teams to potential threats like failed logins and malware activities.
Read More
Selecting the Best SIEM Tool: Key Factors to Evaluate

Selecting the Best SIEM Tool: Key Factors to Evaluate

SIEM (security information and event management) solutions are fast becoming the favorites of many organizations due to the visibility they offer. But it is not only about visibility; its fast response to threats also contributes heavily to the reasons brands prefer to have them in their cybersecurity arsenal.
Read More
Stellar Cyber’s Open XDR Brings Centralized View to RSM’s Multifaceted Environments

Stellar Cyber’s Open XDR Brings Centralized View to RSM’s Multifaceted Environments

RSM US is the country’s fifth largest accounting firm, employing more than 17,000 people in 93 locales across the US and Canada. Beyond providing extensive financial and consulting services to a wide range of clients, their managed security operations service, offers 24/7 coverage for detecting and remediating cybersecurity threats.
Read More
Stellar Cyber and RSM US Forge a Path to Enhanced Cybersecurity for the Middle Market

Stellar Cyber and RSM US Forge a Path to Enhanced Cybersecurity for the Middle Market

Stellar Cyber and RSM US join forces to revolutionize cybersecurity for middle market entities. Explore how this partnership is enhancing security measures and simplifying the complexities of safeguarding digital environments.
Read More
RSM US Upgrades Managed Security Services with Stellar Cyber Technology

RSM US Upgrades Managed Security Services with Stellar Cyber Technology

RSM US, the country's fifth largest accounting firm and a leading provider of professional services to the middle market, recently announced an update to its service portfolio. The company's global managed security operations service, RSM Defense, will now leverage Stellar Cyber's Open XDR platform for optimum threat visibility and mitigation.
Read More
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams

New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams

Stellar Cyber, a Double Platinum ‘ASTORS’ Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks.
Read More
Securing Supply Chains With Open XDR

Securing Supply Chains With Open XDR

Cyberattacks are on the rise in every industry, but software companies and their clients remain especially vulnerable because of their interconnectedness with clients and IP networks. One compromised system can lead to the infiltration of all of the dependent client systems and their networks.
Read More
Boise State pilot program aims to boost cybersecurity by pairing students with local institutions

Boise State pilot program aims to boost cybersecurity by pairing students with local institutions

Boise State University master’s student Madilyn Bosselmann knew she was in the right field when an overwhelmed manufacturing company in Idaho needed her help completing a complicated U.S. Defense Department cybersecurity certification.
Read More
How Can SIEM Protect Your Organization from Cyber Threats

How Can SIEM Protect Your Organization from Cyber Threats

The heavy reliance on IT infrastructure has its positives and negatives for organizations — with the negatives being the numerous cyber attacks targeted against them. Furthermore, it is now an open secret that combining firewalls and anti-virus software is a Stone Age-esque method of preventing cyber threats. Hence, many organizations seek more sophisticated solutions for protection, such as security information and event management (SIEM).
Read More
Which Private Cloud Tech Companies Are Closest To IPO?

Which Private Cloud Tech Companies Are Closest To IPO?

The market for technology initial public offerings (IPOs) has been in a deep lull since the massive technology market correction in 2022. But with share prices of technology leaders back up, interest rates poised to drop, and a resurgence of interest in technologies such as AI, the technology IPO market could bounce back in 2024.
Read More
Stellar Cyber Named to 2024 Futuriom Report for Third Year in a Row

Stellar Cyber Named to 2024 Futuriom Report for Third Year in a Row

SAN JOSE, Calif., February 05, 2024--(BUSINESS WIRE)--Stellar Cyber, the innovator of Open XDR, announces its place on Futuriom’s 50 most promising companies for the third year in a row. Futuriom, whose focus is next-generation cloud technologies, has identified Stellar Cyber’s groundbreaking Open XDR platform as one of 50 companies that show the most potential for growth over the next decade.
Read More
Stellar Cyber partners with Proofpoint to speed detection of email-driven cyberattacks

Stellar Cyber partners with Proofpoint to speed detection of email-driven cyberattacks

Stellar Cyber announced a new partnership with Proofpoint, a cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks.
Read More
“SIEM Logging”: Strategies to Optimize Log Management for Enhanced Security

“SIEM Logging”: Strategies to Optimize Log Management for Enhanced Security

Within the computer system, a log is a computer-inclined or generated file that kind of captures an event or activity of what happened in an operating system or software. In security information and event management (SIEM), collecting, sorting, and storing these log files is incredibly important for it to achieve its purpose. Apparently, with the collection and processing of these log data, an SIEM solution can detect an anomaly and respond to any threat.
Read More
The Power Of SIEM Logging : Transforming Data into Security Insights

The Power Of SIEM Logging : Transforming Data into Security Insights

Cyber security is constantly evolving with each passing day , and only organizations that keep up with the stringent security requirements can be safe from lethal cyber attacks. SIEM tools are one of the major security solutions organizations add to their arsecal in their fight against these cyber threats.
Read More
The Main Components and Capabilities of a SIEM Architecture

The Main Components and Capabilities of a SIEM Architecture

It is no longer a secret that security information and event management (SIEM) has become one of the favourite security tools for many businesses and companies. This is mainly due to the comprehensive and holistic type of security it offers, even with the addition of helping to meet compliance requirements.
Read More
Why It’s Critical to Integrate SIEM Solutions into Your Organization’s Security Strategy

Why It’s Critical to Integrate SIEM Solutions into Your Organization’s Security Strategy

As cyber threats become more sophisticated, it is in an organization’s best interest to ensure they employ security tools up to the task. One of the security tools that can handle even the most complex cyber threats is Security information and event management (SIEM).
Read More
The Role of SIEM Alerts in Security Operations Center (SOC)

The Role of SIEM Alerts in Security Operations Center (SOC)

Security Information and Event Management (SIEM) is a security solution many businesses and companies are using to help them sort out their web security. SIEM helps an organization monitor its IT infrastructure, detect potential cyber threats, and provide quick responses to such threats.
Read More
What Types of Threats Could Trigger SIEM Alerts?

What Types of Threats Could Trigger SIEM Alerts?

Cyber attacks happen so fast that only organizations with the correct security tools can combat these threats before any lethal damage. SIEMs are one of the most prominent security solutions organizations add to their security architecture, mainly for their holistic type of protection. This security solution collects data logs, correlates them, forms baselines, and uses them to detect abnormal behavior within an IT infrastructure.
Read More
Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

Stellar Cyber and Proofpoint Strategic Alliance to Deliver Comprehensive Email Security Solution For SecOps Teams

SAN JOSE, Calif.–(BUSINESS WIRE)– #ai–Stellar Cyber, the innovator of Open XDR, announced a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this alliance, Proofpoint and Stellar Cyber customers benefit from an out-of-the-box integration enabling swift email investigations and real-time response actions to email-driven attacks. Proofpoint Targeted Attack Protection monitors emails to identify suspicious emails and potentially malicious attachments and URLs.
Read More
Data Privacy Week: What it Means for MSSPs

Data Privacy Week: What it Means for MSSPs

The National Cybersecurity Alliance has designated January 21-27 Data Privacy Week. With that in mind, it’s time to reflect on how MSSPs can use that information in conversations with customers and take a deeper look at the trends around data privacy and data loss protection.
Read More
A Stellar Year for Open XDR Innovator Stellar Cyber

A Stellar Year for Open XDR Innovator Stellar Cyber

Open XDR innovator Stellar Cyber had quite a successful year. Here, we go over the company’s strategy from last year and dive into what we can expect to see from them in 2024.
Read More
AI’s Efficacy is Limitless in Cybercrime

AI’s Efficacy is Limitless in Cybercrime

Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks. Security teams then use more AI in response to the AI-driven threats, and threat actors augment their AI to keep up, and the cycle continues.
Read More
STELLAR CYBER: A YEAR IN REVIEW

STELLAR CYBER: A YEAR IN REVIEW

Stellar Cyber licenses its platform to a large portfolio of Managed Security Service Providers. According to Changming Liu, “relentless pursuit of customer excellence directly led to doubling our top 250 MSSP customer base, now up to nearly 50.
Read More
15-Plus Cybersecurity Education Programs

15-Plus Cybersecurity Education Programs

We know all too well there is a lack of skilled people that MSSPs, MSPs and other cybersecurity organizations need to fill critical roles now and in the future. However, there are no shortage of opportunities for training and certification — at all skill levels.
Read More
How MSSPs and MSPs Can Develop a Skilled Workforce and Attract and Retain Talent

How MSSPs and MSPs Can Develop a Skilled Workforce and Attract and Retain Talent

Your MSSP or MSP is growing. You have funding, resources and people dedicated to your organization’s mission. But the thought that wakes you up in the middle of the night is how to find qualified professionals to fill the open and future technology roles you will need if your business is to grow and prosper.
Read More
Stellar Cyber integrates with SentinelOne for enhanced cybersecurity across environments

Stellar Cyber integrates with SentinelOne for enhanced cybersecurity across environments

Stellar Cyber unveiled its integration with SentinelOne to help organizations protect their on-premises, cloud, hybrid, and IT/OT environments by making use of the latest advancements in cybersecurity technologies
Read More
AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for their attacks.
Read More
Stellar Cyber Partnership with SentinelOne Eliminates the Blind Spots

Stellar Cyber Partnership with SentinelOne Eliminates the Blind Spots

Stellar Cyber has joined with cyber powerhouse SentinelOne with the purpose of eliminating threat actors’ ability to take advantage of built-in delays and blind spots that exist in security stacks.
Read More
Stellar & Blackberry Join to Deliver Open XDR to MSSPs and Enterprise

Stellar & Blackberry Join to Deliver Open XDR to MSSPs and Enterprise

Stellar Cyber, a Double Platinum ‘ASTORS’ Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR, has entered into a new partnership with BlackBerry to deliver a comprehensive threat detection and response solution for Managed Security Service Providers (MSSPs) and enterprises.
Read More
Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats

Stellar Cyber announced a new partnership with BlackBerry to deliver a comprehensive threat detection and response solution enabling MSSPs and enterprises to simplify their security stacks, increase productivity, and reduce the time it takes to detect and respond to cyber threats.
Read More
Stellar Cyber Adds Generative AI to its Open XDR Platform

Stellar Cyber Adds Generative AI to its Open XDR Platform

Stellar Cyber, the innovator of Open XDR, has become one of the first cybersecurity software providers to incorporate Generative AI (GenAI) into its Open XDR Platform. With GenAI functionality tied to its knowledge base, Stellar Cyber can significantly improve security analysts’ productivity by enabling them to get answers to their investigation-related questions by simply asking them as if they were talking to a person.
Read More
Stellar Cyber incorporates GenAI into its Open XDR Platform

Stellar Cyber incorporates GenAI into its Open XDR Platform

With GenAI functionality tied to its knowledge base, Stellar Cyber can significantly improve security analysts’ productivity by enabling them to get answers to their investigation-related questions by simply asking them as if they were talking to a person.
Read More
Stellar Cyber Intros University Program for Cybersecurity Training

Stellar Cyber Intros University Program for Cybersecurity Training

Stellar Cyber, an Open XDR technology company, has introduced its new Stellar Cyber University Program. This program is designed for educational institutions that offer cybersecurity degrees or certifications and also provide non-profit security operations (SOC) services to underserved communities.
Read More
Managed Security Services Provider (MSSP) Market News: 4 December 2023

Managed Security Services Provider (MSSP) Market News: 4 December 2023

Each business day, MSSP Alert delivers a quick lineup of news, analysis and chatter from across the managed security services provider ecosystem.
Read More
Stellar Cyber’s University Partnership Program Teaches Relevant Skills to Future Cybersecurity Professionals

Stellar Cyber’s University Partnership Program Teaches Relevant Skills to Future Cybersecurity Professionals

All too often, students graduate from college without being exposed to the fantastic career opportunities in the cybersecurity industry,” said Paul Levasseur, Vice President of Customer Enablement at Stellar Cyber.
Read More
Stellar Cyber Launches Field-Proven University Program

Stellar Cyber Launches Field-Proven University Program

This is true even for cybersecurity — an industry with millions of available roles. Anecdotally, it can take 6 months or up to a year for a graduate to land their first job in cybersecurity. Sometimes, they have to settle for different roles that will eventually help them advance to the one they initially wanted.
Read More
Stellar Cyber launches University Program to equip future cybersecurity professionals and empower underserved communities

Stellar Cyber launches University Program to equip future cybersecurity professionals and empower underserved communities

There’s been a significant increase in the number of cyberattacks in recent years. According to a report from Check Point Research, global cyberattacks increased by 38% in 2022, compared to 2021. The growing cyber threats have also led to an increase in the demand for cybersecurity expertise and skills
Read More
Stellar Cyber named one of 10 Representative Vendors in the 2023 Gartner® Market Guide for Extended Detection and Response

Stellar Cyber named one of 10 Representative Vendors in the 2023 Gartner® Market Guide for Extended Detection and Response

Stellar Cyber, the innovator of Open XDR technology, has been included as one of ten Representative Vendors in the Gartner report, Market Guide for Extended Detection and Response.
Read More
STELLAR CYBER LAUNCHES FIELD-PROVEN UNIVERSITY PROGRAM, PROVIDES SOC SERVICES TO UNDERSERVED COMMUNITIES

STELLAR CYBER LAUNCHES FIELD-PROVEN UNIVERSITY PROGRAM, PROVIDES SOC SERVICES TO UNDERSERVED COMMUNITIES

Cybersecurity is the industry of the future. If we only consider the financial damage of security incidents, the data shows that the cost of cybercrime is expected to double by 2027.
Read More
Stellar Cyber launches field-proven University program to enable educational organizations…

Stellar Cyber launches field-proven University program to enable educational organizations…

With the launch of the University Program, Stellar Cyber aims to help the next generation of cybersecurity professionals develop fundamental digital skills while also providing not-for-profit security operations services to underserved communities that lack ready access to the tools, technology, and other resources required to teach and defend against cybersecurity attacks.
Read More
EDTECHStellar Cyber Launches University Cybersecurity Partnership Program, Enabling Hands-on Cybersecurity Training…

EDTECHStellar Cyber Launches University Cybersecurity Partnership Program, Enabling Hands-on Cybersecurity Training…

Most students who complete their studies lack relevant work experience. In cybersecurity, that skill gap is even more pronounced because the industry is evolving at an accelerated pace. Professionals and vendors have to keep up with an increasing number of hacking attempts and sophisticated exploits.
Read More
Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber launches a field-proven university program to enable educational organizations to deliver hands-on cybersecurity training and provide soc services to underserved communities.
Read More
Stellar Cyber amplifies field-proven university program

Stellar Cyber amplifies field-proven university program

Stellar Cyber, the innovative company behind the Open XDR technology, has unveiled a new initiative aimed at filling the cybersecurity skills gap experienced globally. The company has announced the launch of the University Cybersecurity Partnership Program, targeted at universities, colleges, and K-12 educational institutions across the globe.
Read More
Stellar Cyber amplifies field-proven university program

Stellar Cyber amplifies field-proven university program

Stellar Cyber, the innovative company behind the Open XDR technology, has unveiled a new initiative aimed at filling the cybersecurity skills gap experienced globally. The company has announced the launch of the University Cybersecurity Partnership Program, targeted at universities, colleges, and K-12 educational institutions across the globe.
Read More
Stellar Cyber unveils novel cyber workforce program

Stellar Cyber unveils novel cyber workforce program

Universities and underserved communities that lack the necessary resources to ensure defenses against cybersecurity threats are being prioritized by California-based IT security company Stellar Cyber in its new cyber workforce program, EdScoop reports.
Read More
Redefining Cybersecurity: Aimei Wei’s Game-Changing Vision at Stellar Cyber

Redefining Cybersecurity: Aimei Wei’s Game-Changing Vision at Stellar Cyber

Welcome to our exclusive interview with Aimei Wei, the dynamic CTO of Stellar Cyber. Today, Aimei shares her remarkable journey in the tech world, her pivotal role in shaping Stellar Cyber's innovative cybersecurity approaches, and her vision of the evolving landscape of AI in cybersecurity. As we delve into her insights and experiences, prepare to be inspired by her unique perspective on technology, leadership, and the future of cyber defense
Read More
New cyber workforce program invites universities, underserved communities

New cyber workforce program invites universities, underserved communities

The California IT security firm Stellar Cyber on Tuesday announced a new program that plans to provide higher education institutions with cybersecurity technology, curriculums and experts in an effort to develop the next generation of cybersecurity professionals.
Read More
Integration Spotlight: Stellar Cyber Open XDR

Integration Spotlight: Stellar Cyber Open XDR

By integrating D3 Smart SOAR (Security Orchestration, Automation, and Response) with Stellar Cyber Open XDR, organizations can create a seamless incident response workflow that minimizes time to contain and enables better decision-making. This article outlines how the integration works and how it can be complemented by other remediation tools.
Read More
Black Friday: How Retailers Can Get Through the Cyber Turbulence Unscathed

Black Friday: How Retailers Can Get Through the Cyber Turbulence Unscathed

From Black Friday bonanzas to Cyber Monday marvels, the retail sector sees an immense spike in online traffic, making it a playground for cyber adversaries. Eugene Yiga considers the strategic foresight and tactical fortification needed to navigate the cyber turbulence of retail’s busiest period
Read More
Cyber Threat: Aviation’s Clear and Present Danger?

Cyber Threat: Aviation’s Clear and Present Danger?

Cybersecurity vulnerability looms over the worldwide aviation industry, calling for a firm embrace on cybersecurity awareness, standards and best practices.
Read More
Why the NDR Platform is the Right Solution for Threat Intelligence

Why the NDR Platform is the Right Solution for Threat Intelligence

Today scientists are working around the clock to come up with safer platforms or advanced security measures. This follows rampant cyber-attacks across the continents in the recent past. Unfortunately, millions of individuals and organizations continue to count losses due to attacks on their platforms. For instance, in 2020, the online phishing and fraud activity averaged at more than 19,000 new threats being created daily. This is where the Network Detection and Response platform comes into play.
Read More
What You Should Look For in an NDR Platform

What You Should Look For in an NDR Platform

Cyber attacks are becoming more sophisticated for organizations, so they are actively searching for new web security tools to add to their arsenal. One of the tools many organizations are integrating into their security framework is Network Detection and Response (NDR) platforms.
Read More
The Top 6 Key Features of a Modern NDR Platform Attribution

The Top 6 Key Features of a Modern NDR Platform Attribution

Companies and organizations have always relied on many security tools to fight their battles against cyber criminals. Some of the important tools are often firewalls, anti-viruses, and even EDR solutions. However, security operations centers (SOCs) are now aware that these security tools are often not enough for the type of sophisticated attacks by cybercriminals.
Read More
What Are the Components of a Good NDR Strategy

What Are the Components of a Good NDR Strategy

One of the many tools an organization employs to fight sophisticated cyber attacks is Network Detection and Response (NDR) platforms. An NDR platform is basically a web security technology that helps with the monitoring, detection, analysis, and prevention of cyber attacks.
Read More
What Are the Benefits of Network Detection and Response?

What Are the Benefits of Network Detection and Response?

Cyber threats in today’s world have moved beyond the normal phishing attacks, as cybercriminals are fully invested in the business of creating new methods of attacks. Furthermore, organizations (both small and large) have become the soft targets of these cybercriminals, who are willing to go to any length to carry out a successful attack.
Read More
What is Network Detection and Response (NDR)?

What is Network Detection and Response (NDR)?

In the ever-evolving digital world, organizations must safeguard their networks and sensitive data against sophisticated cyber threats. Have you ever heard NDR in relation to cybersecurity? Whether you have or not, do you know what is network detection and response?.
Read More
NDR’s Role in Enhancing Cybersecurity with Open XDR: How Stellar Cyber Emphasizes Network Level Defense

NDR’s Role in Enhancing Cybersecurity with Open XDR: How Stellar Cyber Emphasizes Network Level Defense

Open XDR (Open Extended Detection and Response) is one acronym that stands out in the cybersecurity space that is otherwise riddled with marketing acronyms. It presents a compelling solution to address emerging threats in the ever-changing cyber threat landscape. It is a comprehensive approach to cybersecurity that goes beyond endpoints and takes advantage of various security tools and data sources.
Read More
More cybersecurity firm closures expected after IronNet shutters

More cybersecurity firm closures expected after IronNet shutters

Cybersecurity insiders don’t believe the looming bankruptcy of former high-flier IronNet will be an isolated collapse, as the industry battles a tough economy following years of speculative investment.
Read More
2024 cybersecurity predictions: GenAI edition

2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our online lives. From generating marketing content, creating images for advertisements and blogs, or even writing malicious code, we are all interacting with the results of generative AI in some ways daily.
Read More
Open XDR with AI is a Market Opportunity for MSSPs

Open XDR with AI is a Market Opportunity for MSSPs

Cybersecurity is more than important to a managed security services provider's (MSSP) business, it IS the business. To be competitive, MSSPs must be leaders in cybersecurity technology and best practices.
Read More
A Year Later; Results of Boise State University’s Cyberdome Program in Partnership With Stellar Cyber

A Year Later; Results of Boise State University’s Cyberdome Program in Partnership With Stellar Cyber

Last year, Boise State University announced a new initiative for students in Idaho — the Cyberdome program.
Read More
Students Have Analyzed Over 53,000 Potential Cyber Attacks in the First Year of Boise State University’s Cyberdome Program

Students Have Analyzed Over 53,000 Potential Cyber Attacks in the First Year of Boise State University’s Cyberdome Program

Collaborations between universities and local communities mostly involve cleaning or rebuilding the area in one way or another.
Read More
The Ingenuity of Turning Any EDR Solution Into a Powerful Open XDR System

The Ingenuity of Turning Any EDR Solution Into a Powerful Open XDR System

In Frost & Sullivan’s “Frost Radar™: Extended Detection and Response 2023” report, the business consulting and market research firm lists Stellar Cyber as an innovator in the endpoint detection and response (EDR) field. Notably, it is the only non-EDR company lauded for its trailblazing approach to developing endpoint detection and response technology to address modern threats.
Read More
Unlocking Game-Changing Cybersecurity With Open XDR

Unlocking Game-Changing Cybersecurity With Open XDR

Gartner recently released their Market Guide for Extended Detection and Response report. The report’s Market Description section states that “XDR can improve Security Operations staff productivity by converting a large stream of alerts into a condensed number of incidents that can be manually investigated efficiently,” and by “reducing training and skills needed to complete operational tasks by providing a common management and workflow experience across security products.”
Read More
Boise State’s Cyberdome marks successful first year in cybersecurity

Boise State’s Cyberdome marks successful first year in cybersecurity

Boise State University's Cyberdome initiative, in partnership with Stellar Cyber, has marked its first year of operation as a resounding success. The programme, which is part of Boise State’s Institute for Pervasive Cybersecurity, aims to offer top-notch cybersecurity services to rural areas in Idaho, while also providing invaluable hands-on experience to students.
Read More
Boise State University’s Cyberdome Program Soars in First Year of Operation

Boise State University’s Cyberdome Program Soars in First Year of Operation

The Cyberdome uses Stellar Cyber’s Open XDR platform to bring free, world-class cybersecurity services to Idaho cities, counties and schools while giving students real-world experience.
Read More
How do SIEM alternatives put a stop to alert fatigue?

How do SIEM alternatives put a stop to alert fatigue?

In March 2023, the vendor of communications software technology, 3CX, suffered a supply chain attack. The Trojan virus infected the app, and it led to users to download the malicious version of the software to their devices. A week before threat hunters confirmed the attack, users, and vendors kept receiving security alerts about the service. Since there were many similar notifications in the past, they assumed the notifications were more false alarms.
Read More
Stellar Cyber named one of 10 Representative Vendors in the 2023 Gartner® Market Guide for Extended Detection and Response

Stellar Cyber named one of 10 Representative Vendors in the 2023 Gartner® Market Guide for Extended Detection and Response

Stellar Cyber, the innovator of Open XDR technology, has been included as one of ten Representative Vendors in the Gartner report, Market Guide for Extended Detection and Response.
Read More
Meet The 10 Representative Vendors in Gartner’s Market Guide for Extended Detection and Response for 2023

Meet The 10 Representative Vendors in Gartner’s Market Guide for Extended Detection and Response for 2023

The future of cybersecurity prioritizes tools that simplify security operations. One such solution is Extended Detection and Response (XDR). It’s a necessity for any company that is scaling its infrastructure and needs actionable and relevant data to keep a business safe from known and emerging cyber exploits. Gartner’s latest Market Guide for Extended Detection and Response lists key vendors that offer XDR services. Also, it explores the future of XDR technology and its place within the cybersecurity space.
Read More
Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services Now

Four Reasons MSPs and Resellers Need to Offer Cybersecurity Services Now

With every breach and data leak splashed across your favorite news website or X feed, your customers’ concern about being the next victim of a cyberattack increases. Whether you are a reseller or a managed service provider (MSP), your customers know that the blame and fallout will land on their desks if they experience a business disruption due to a cyberattack.
Read More
Gartner’s Extended Detection and Response Guide Lists Stellar Cyber as One of the Top 10 XDR Vendors

Gartner’s Extended Detection and Response Guide Lists Stellar Cyber as One of the Top 10 XDR Vendors

Gartner has released its Market Guide for Extended Detection and Response Vendors for 2023. Among major companies that offer Extended Detection and Response technology — such as Cisco, Microsoft, Trend Micro, and Palo Alto Networks,— is now Stellar Cyber.
Read More
3 Crucial Roles Artificial Intelligence Plays in Next Gen SIEM

3 Crucial Roles Artificial Intelligence Plays in Next Gen SIEM

Artificial intelligence is quickly becoming a staple in cybersecurity. Many companies now offer security solutions that integrate machine learning and other forms of AI to enhance threat detection, mitigation, and prevention. Most of the top results for a Google search with the keyword phrase “cybersecurity solution” are cybersecurity providers that offer AI-enhanced products.
Read More
Oracle Cloud Infrastructure (OCI) Offers Stellar Cyber XDR Platform

Oracle Cloud Infrastructure (OCI) Offers Stellar Cyber XDR Platform

Oracle Cloud Infrastructure (OCI) users now can use the Stellar Cyber Open eXtended detection and response (XDR) Platform to manage their security operations, according to a prepared statement.
Read More
Stellar Cyber Open XDR solution now available on OCI

Stellar Cyber Open XDR solution now available on OCI

Stellar Cyber has announced the availability of its Open XDR platform on Oracle Cloud Infrastructure (OCI). Customers of both Oracle and Stellar Cyber can utilise the solution to reduce cyber risk and improve security analyst efficiency and effectiveness.
Read More
Why Modern Organizations Need a SIEM Alternative

Why Modern Organizations Need a SIEM Alternative

Security Information and Event Management (SIEM) has been a staple of every cybersecurity stack for a long time. However, SIEM is fast becoming legacy functionality due to the changing nature of cybersecurity. Developed more than 2 decades ago, SIEM served a valuable purpose then.
Read More
Leveraging Next Gen SIEM for Robust Cyber Defense

Leveraging Next Gen SIEM for Robust Cyber Defense

Security information and event management (SIEM) is one of the crucial components in the SOC triad, alongside network detection and response (NDR) and endpoint detection and response (NDR). Expanding attack surfaces and more complex modern systems create new security problems that cannot be adequately handled by detection and response systems alone.
Read More
Open XDRイノベーターのStellar Cyber、日立ソリューションズ社製「秘文」との製品提携を発表 脅威を迅速に検出し、情報漏洩を最小限に抑える

Open XDRイノベーターのStellar Cyber、日立ソリューションズ社製「秘文」との製品提携を発表 脅威を迅速に検出し、情報漏洩を最小限に抑える

Open XDRのイノベーターであるStellar Cyberは2023年7月26日
Read More
Groundbreaking Integration: Stellar Cyber Safeguards OT Environments Alongside IT

Groundbreaking Integration: Stellar Cyber Safeguards OT Environments Alongside IT

Stellar Cyber, a cybersecurity company that specializes in providing an Open XDR (Extended Detection and Response) platform, has revealed that its Open XDR Platform users can now safeguard their Operational Technology (OT) environments seamlessly alongside their IT environments, all under a single unified platform and license.
Read More
Stellar Cyber’s Open XDR Platform Now Secures OT Environments

Stellar Cyber’s Open XDR Platform Now Secures OT Environments

Stellar Cyber, the innovator of Open XDR technology, announced today that all Stellar Cyber Open XDR Platform users can now secure their OT environments on the same platform with the same license they use to secure their IT environments. Combining IT and OT security in a single platform gives security teams a permanent advantage over attackers who frequently attempt to exploit weaknesses and vulnerabilities identified in an IT environment to move laterally into an OT environment to carry out an attack, and vice versa.
Read More
Is SIEM Still Relevant? Which SIEM Alternatives Are The Answer To Its Shortcomings?

Is SIEM Still Relevant? Which SIEM Alternatives Are The Answer To Its Shortcomings?

Security Information Event Management (SIEM) was a breakthrough in 1999. The first version of the tool guaranteed a lot. However, security professionals would soon find out that traditional SIEM fails to live up to its many promises. Regardless, companies still use it to this day.
Read More
Next gen SIEM: Unleashing the power of AI in cybersecurity

Next gen SIEM: Unleashing the power of AI in cybersecurity

AI has been in the news over the past several months, but not everyone is welcoming it excitedly. Many renowned tech personalities have expressed their concerns over the risks associated with it and there are valid fears about artificial intelligence doing more harm than good. For example, there have been reports of AI helping cybercriminals produce less detectable malware.
Read More
AI In Cybersecurity – Risks and Rewards

AI In Cybersecurity – Risks and Rewards

The global cybersecurity workforce grew to a record 4.7 million people in 2022, according to an (ISC)2 2022 workforce study, but the same study found that the sector still needs 3.4 million more security professionals – an increase of over 26% from 2021’s numbers. This workforce shortage, combined with the ever-rising frequency and complexity of cyberattacks, means that organizations face greater risks than ever before.
Read More
Bolstering Security Ahead of July 4th Weekend – Insights from Industry Experts

Bolstering Security Ahead of July 4th Weekend – Insights from Industry Experts

With the Fourth of July weekend just around the corner, many people are gearing up for a fun-filled holiday. But as we celebrate our independence, it's important to remember that we also need to be vigilant about our security.
Read More
Innovation In Cyber Security: NDR Meets XDR

Innovation In Cyber Security: NDR Meets XDR

Network detection and response (NDR) and extended detection and response (XDR) are two of the most powerful security solutions enterprises employ to fend off persistent and complex cyber-attacks. They were designed to work independently, as they have different scopes and employ different detection capabilities, data sources, and incident response approaches.
Read More
UK MSSP Endida Partners with Stellar Cyber, Expands Cybersecurity Services

UK MSSP Endida Partners with Stellar Cyber, Expands Cybersecurity Services

Endida is using the Stellar Cyber Open eXtended detection and response (XDR) platform to power its threat detection and response services.Open XDR helps Endida’s security teams onboard new customers and integrate their relevant security data sources into their operations, the company said in a prepared statement. In doing so, Open XDR provides Endida’s customers with security insights within hours of onboarding.
Read More
SIEM Alternatives; How Does OpenXDR Make Traditional SIEM Obsolete?

SIEM Alternatives; How Does OpenXDR Make Traditional SIEM Obsolete?

OpenXDR is one of the most cost-effective SIEM alternatives that help businesses detect and mitigate threats within hectic modern architectures. A single cyber incident impacts every aspect of a business—from system downtime, revenue losses, and reputation damage to disrupted operations.
Read More
Stellar Cyber collaborates with Mimecast to minimize email-based attack impacts

Stellar Cyber collaborates with Mimecast to minimize email-based attack impacts

Stellar Cyber announced a new technology partnership with Mimecast, an email and collaboration security company.This powerful technology integration makes it easy for Stellar Cyber and Mimecast customers to swiftly mitigate the risk of damaging email-based attacks, such as phishing attacks, by automating the sharing of vital attack data between the two solutions, reducing attacker dwell time and speeding response.
Read More
ARE YOU READY   FOR A STEP FORWARD?

ARE YOU READY FOR A STEP FORWARD?

“The Risk Management in Cyber Security: Are You Ready for a Step Forward?” was the title of an international professional conference organized by the Slovenian company CREAplus at the CUBO Golf course in Ljubljana.
Read More
Managed Security Services Provider (MSSP) Market News: 5 June 2023

Managed Security Services Provider (MSSP) Market News: 5 June 2023

Each business day, MSSP Alert delivers a quick lineup of news, analysis and chatter from across the managed security services provider ecosystem.
Read More
Stellar Cyber Named a Strong Performer in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

Stellar Cyber Named a Strong Performer in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

Stellar Cyber, the innovator of Open XDR technology, today announced that it has been named a Strong Performer in the Gartner Peer Insights Voice of the Customer for Network Detection and Response.
Read More
Stellar Cyber Adds David Wagner to Lead Global Service Provider Sales

Stellar Cyber Adds David Wagner to Lead Global Service Provider Sales

Wagner’s decades of success working with MSSPs globally suggest accelerated Open XDR adoption by world’s leading service providers
Read More
5 Channel Partner & MSP News Updates for 23 May 2023

5 Channel Partner & MSP News Updates for 23 May 2023

Welcome to Tuesday. Here are five technology news updates, insights, chatter, and plenty more to start your day on May 23, 2023.
Read More
Stellar Cyber Announces Support for Amazon Security Lake to Speed Data Processing and Threat Detection

Stellar Cyber Announces Support for Amazon Security Lake to Speed Data Processing and Threat Detection

Stellar Cyber, the innovator of Open XDR technology, announced support for the Amazon Security Lake from Amazon Web Services (AWS). Organizations using the Stellar Cyber Open XDR Platform and AWS can directly ingest data from the Amazon Security Lake into Stellar Cyber, automatically enabling richer data analysis and faster threat detection.
Read More
XDR Provider Stellar Cyber Offers Amazon Security Lake Support

XDR Provider Stellar Cyber Offers Amazon Security Lake Support

Organizations can now ingest data from the Amazon Web Services (AWS) Amazon Security Lake into the Stellar Cyber Open eXtended Detection and Response (XDR) Platform, the company announced.
Read More
Why Next Gen SIEM Is Crucial In Ensuring Cloud Security

Why Next Gen SIEM Is Crucial In Ensuring Cloud Security

Cloud technology adoption continues to grow at a robust pace, which means the cloud security market is also set for more growth. One study forecasts a 24.4 percent CAGR for cloud security for the period 2022-2032. Interestingly, the optimistic predictions for cloud security are fueled by the emergence of more advanced, more sophisticated, and more aggressive threats.
Read More
Transitioning to Next Gen SIEM: The Future of Cyber Threat Detection

Transitioning to Next Gen SIEM: The Future of Cyber Threat Detection

Cyber threat detection has changed and continues to change as the threat landscape evolves. Detection that is solely based on threat identities no longer works given the prevalence of sophisticated zero-day attacks. Similarly, rules-based detection is no longer as effective as it was before. Cybercriminals can rapidly produce new malware or tweak their attacks to evade detection.
Read More
How AI and ML are Reshaping Cybersecurity: Advancing Towards the Best SIEM Alternatives

How AI and ML are Reshaping Cybersecurity: Advancing Towards the Best SIEM Alternatives

It is given that organizations should have an effective way of managing all information about their security and be capable of addressing security events as they arise. That’s why since its introduction in 2005, security information and event management (SIEM) has been regarded as a vital component of cybersecurity.
Read More
SIEM alternatives and their advantages

SIEM alternatives and their advantages

Security Information and Event Management (SIEM) was created nearly two decades ago. Back then, organizations already had the means to detect threats and gather relevant information, but they lacked the efficiency in analyzing and responding to these threats. SIEM provided a solution to systematize the handling of security data and events.
Read More
What Enterprise C-level Executive Customers Want From MSSPs

What Enterprise C-level Executive Customers Want From MSSPs

A CIOs or CISOs job is never easy, but it’s more difficult now because cyberattacks are more frequent and more complex than ever before. Cybersecurity is a top priority for enterprises, and fundamentally, C-level executives are responsible for managing the risk of security breaches at cost points the business can afford. When there’s a serious attack, those executives can lose their jobs.
Read More
RSAC 2023: 10 Coolest Cybersecurity Startup Companies

RSAC 2023: 10 Coolest Cybersecurity Startup Companies

In March, Stellar Cyber launched its first partner program focused on resellers and distributors as it seeks to accelerate its growth with the channel. The startup already had a program aimed at managed security service providers (MSSPs).
Read More
How Does Next-Gen SIEM Prevent Data Overload For Security Analysts?

How Does Next-Gen SIEM Prevent Data Overload For Security Analysts?

Discover how a next-gen SIEM can help security analysts reduce data overload and improve their response times to threats. Learn more now!
Read More
The Role of Next Gen SIEM in the Era of IoT and 5G

The Role of Next Gen SIEM in the Era of IoT and 5G

The hype over 5G may have already fizzled out, but it is undeniable that the technology already exists and is benefiting industries and customers worldwide. It’s the same with the Internet of Things. Businesses, nonprofits, government agencies, and households already make use of IoT devices, with some unaware that they are already interfacing with an IoT ecosystem in their everyday lives.
Read More
Machine Learning and AI: The Future of SIEM Alternatives in Cybersecurity

Machine Learning and AI: The Future of SIEM Alternatives in Cybersecurity

It’s not without good reason. In a recent study, IBM found that the average total cost of a data breach reached $4.35 million in 2022 globally and $9.44 million in the US. This underscores the need for more effective and proactive cybersecurity solutions that provide more advanced detection and response capabilities.
Read More
NTT DATA Global Solutions Chooses Stellar Cyber’s Open XDR Platform To Improve Internal SOC

NTT DATA Global Solutions Chooses Stellar Cyber’s Open XDR Platform To Improve Internal SOC

In the world of increased cyber risks, Japanese IT giant NTT DATA has chosen Stellar Cyber’s Open XDR (Extended Detection and Response) platform to identify threats and fight back in real time. In 2015, the Silicon Valley-based Open XDR innovator Stellar Cyber started with the idea to simplify security operations — help businesses combat data overload, and speed up the reaction time of SOC teams.
Read More
Protecting Critical Infrastructure: The Role of Next Gen SIEM in Securing Modern Utilities

Protecting Critical Infrastructure: The Role of Next Gen SIEM in Securing Modern Utilities

Microsoft’s 2022 Digital Defense Report reveals that there has been an increase of cyberattacks that target critical infrastructure. The report says that around 40 percent of nation-state attacks in 2022 targeted critical infrastructure.
Read More
Stellar Cyber Unveils New Vendor-Focused Partner Program

Stellar Cyber Unveils New Vendor-Focused Partner Program

Stellar Cyber has launched a new partner program focused on resellers and distributors. The InterStellar Partner Program – the company’s first to be geared at the reseller and distributor sector – looks to be aimed at helping the company accelerate its growth within the channel. Until now, the company’s MSSP Jumpstart Partner Program was geared toward managed security service providers.
Read More
Stellar Cyber Introduces InterSTELLAR Partner Program Focused on Partner Enablement to Fast-Track Open XDR Solutions

Stellar Cyber Introduces InterSTELLAR Partner Program Focused on Partner Enablement to Fast-Track Open XDR Solutions

Stellar Cyber, the innovator of Open XDR and recently named one of 10 Hot XDR Security Companies You Should Watch In 2023 by CRN magazine, as well as a Top Cybersecurity Vendor Assisting MSSPs by MSSP Alert, today announced its InterSTELLAR Partner Program to accelerate revenue for resellers of the Stellar Cyber Open XDR platform.
Read More
Stellar Cyber Introduces InterSTELLAR Partner Program For Resellers to Fast-Track Open XDR Solutions

Stellar Cyber Introduces InterSTELLAR Partner Program For Resellers to Fast-Track Open XDR Solutions

Their unified Open XDR platform has been helping companies to keep their sanity amid the increased number of cyber threats, a high number of security solutions to guard complex architectures, and large volumes of data incoming from the protective tools.
Read More
Open XDR Innovator Stellar Cyber Launches InterSTELLAR Partner Program For Resellers

Open XDR Innovator Stellar Cyber Launches InterSTELLAR Partner Program For Resellers

Stellar Cyber’s Open Extended Detection and Response (Open XDR) platform unites the top security solutions and helps security teams identify and remediate problems early ⁠— regardless of the ever-growing attack surfaces and increased number of cyber threats.
Read More
Stellar Cyber Introduces InterSTELLAR Partner Program

Stellar Cyber Introduces InterSTELLAR Partner Program

Stellar Cyber, an innovator of open XDR, unveils its InterSTELLAR Partner Program to accelerate revenue for resellers of the Stellar Cyber Open XDR platform.
Read More
Open XDR Vendor Stellar Cyber Debuts Partner Program For Resellers

Open XDR Vendor Stellar Cyber Debuts Partner Program For Resellers

Stellar Cyber, which offers an extended detection and response (XDR) platform focused on the needs of smaller cybersecurity teams, has launched its first partner program focused on resellers and distributors as it seeks to accelerate its growth with the channel.
Read More
Stellar Cyber, Hitachi Solutions Partner for XDR in Japan

Stellar Cyber, Hitachi Solutions Partner for XDR in Japan

Hitachi Solutions will distribute Stellar Cyber's Open eXtended detection and response (XDR) platform in Japan. Hitachi Solutions will resell the Stellar Cyber Open eXtended detection and response (XDR) platform in the Japanese market, according to a prepared statement.
Read More
Stellar Cyber Launches First Partner Program for Resellers, Distributors

Stellar Cyber Launches First Partner Program for Resellers, Distributors

Stellar Cyber has launched InterStellar, its first partner program for resellers and distributors. InterStellar enables reseller partners to become proficient with the company‘s Open extended detection and Response (XDR) solution. Stellar Cyber already has a JumpStart program for MSSPs.
Read More
Prepare For These 3 Cybersecurity Changes With A SIEM Alternative

Prepare For These 3 Cybersecurity Changes With A SIEM Alternative

Depending on how far you look into the future, the evolution of technology offers cybercriminals some pretty interesting and lucrative opportunities, resulting in more sophisticated cyberattacks.
Read More
Making Co-Managed Security Services a Win-Win

Making Co-Managed Security Services a Win-Win

Organizations like to work with MSSPs for co-managed security services for lots of reasons. The trick is to make sure the arrangement works for you as well as it does for your clients. Of course, co-management brings you added revenue and payback for the security services in which you have invested. For your clients, it enables them to enhance their security by offloading it to experts whose mission in life is to stay up to date on the latest hacks and remedies.
Read More
10 Hot XDR Security Companies You Should Watch In 2023

10 Hot XDR Security Companies You Should Watch In 2023

These XDR (extended detection and response) vendors are enabling businesses to collect and correlate data feeds across their security tools and environments — ultimately providing an improved way to prioritize threats.
Read More
How Do Playbooks Help CISOs Improve SecOps?

How Do Playbooks Help CISOs Improve SecOps?

Aimei Wei, founder and CTO, Stellar Cyber: Every day brings a new solution for CISOs to consider. Unfortunately, blending the insights these tools offer and using them to answer tough questions from the board and analysts is challenging.
Read More
What’s the Deal with Open XDR

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts.
Read More
Inside the Trends Driving Top Cloud Startups In 2023

Inside the Trends Driving Top Cloud Startups In 2023

Last year, U.S. Federal Reserve took the punch bowl away from the financial markets, putting an end to the easy money and stratospheric valuations in the venture capital (VC) and startup markets. This also precipitated an economic slowdown and potential recession. What’s that mean for the hottest startups in cloud infrastructure?
Read More
How Next Gen SIEM Addresses The Risks Of Disjointed Security Tools

How Next Gen SIEM Addresses The Risks Of Disjointed Security Tools

The use of multiple applications from different providers has been the norm among organizations for decades now. It rarely happens that a company uses software provided by the same developer in all areas. This is noticeable when it comes to enterprise cybersecurity, as organizations tend to use different tools for their web application firewall, virus and malware defense, email scanning, and other security-related purposes.
Read More
Addressing the Top 3 Causes of SIEM Platform Failures—You Likely Didn’t Expect #2

Addressing the Top 3 Causes of SIEM Platform Failures—You Likely Didn’t Expect #2

The effectiveness of security information and event management (SIEM) has been assailed a number of times. A few days ago, the CEO of a well-known cybersecurity firm even called for the elimination and replacement of SIEM, arguing that there are better solutions available.
Read More
How Next Gen SIEM Addresses One of the Major Cyber Threats of 2023

How Next Gen SIEM Addresses One of the Major Cyber Threats of 2023

IBM has just released its predictions for cybersecurity in 2023, and one of the most notable items on the list is how threat actors are likely to sidestep new security technologies. “Almost as fast as the cybersecurity industry releases new security tools, adversaries evolve their techniques to circumvent them,” says IBM Security X-Force Head of Research John Dwyer.
Read More
Open XDR Is the Next Big Thing in Cybersecurity, and Stellar Cyber Is Already Two Steps Ahead

Open XDR Is the Next Big Thing in Cybersecurity, and Stellar Cyber Is Already Two Steps Ahead

There are many cybersecurity trends that promise to shape the future of security — including passwordless credentials and giving even more power to artificial intelligence.
Read More
Stellar Cyber integrates with Deep Instinct’s deep learning technology

Stellar Cyber integrates with Deep Instinct’s deep learning technology

Open XDR company Stellar Cyber on Wednesday announced a new integration with Deep Instinct aimed at helping enterprises and MSSPs more effectively detect and mitigate attacks.
Read More
Stellar Cyber and Deep Instinct integrate to help enterprises identify threats

Stellar Cyber and Deep Instinct integrate to help enterprises identify threats

Stellar Cyber and Deep Instinct integration makes it easy for enterprise and MSSP customers using the Stellar Cyber Open XDR platform to deliver Deep Instinct’s prevention capabilities across the entire attack surface.
Read More
Had it With SIEM? Learn More About Effective SIEM Alternative, OpenXDR

Had it With SIEM? Learn More About Effective SIEM Alternative, OpenXDR

On paper, SIEM (Security Information and Event Management) seems perfect. The management tool analyzes all the data coming from security tools, generates a report for cyber analysts, and responds to threats in real time. In reality, there is a consensus that SIEM is a solution that typically creates more problems than it solves.
Read More
Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR

Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR

Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM to emerge now, or it may already be long overdue. There is a need for a more powerful upgrade to the system that has been in place for nearly two decades.
Read More
Malwarebytes collaborates with Stellar Cyber to increase productivity and efficiency of security teams

Malwarebytes collaborates with Stellar Cyber to increase productivity and efficiency of security teams

Malwarebytes partners with Stellar Cyber to help resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and anything in between.
Read More
What Could Be Better Than Next Gen SIEM?

What Could Be Better Than Next Gen SIEM?

Security information and event management or SIEM has become a crucial part of modern cybersecurity. A 2022 SIEM report shows that 80 percent of cybersecurity professionals regard SIEM as extremely important to security posture. This number marks a six-point increase from the previous year’s findings.
Read More
4 Major Benefits of Next Gen SIEM

4 Major Benefits of Next Gen SIEM

Security analysts are up against more cyberattacks than ever, increased attack surfaces, and more protective tools on the cloud and premises than ever before. All of that is accompanied by cybersecurity experts that are leaving the field. Stress, poor company culture, and long hours have prompted top talent to seek alternative employment.
Read More
5 Instances Where Correlation Is Used by SIEM Platforms to Fend Off Attacks

5 Instances Where Correlation Is Used by SIEM Platforms to Fend Off Attacks

Organizations may have a love-hate relationship with Security Information and Event Management (SIEM), but it is clear that it is one of the prominent enterprise cybersecurity solutions they cannot do away with. Around a fifth say that they are not getting the full value of their SIEM systems, but not many express intentions to abandon SIEM altogether.
Read More
How to address the gaps with Open XDR sensors

How to address the gaps with Open XDR sensors

For many experienced security professionals, they would meet the idea of the “new normal” with a healthy dose of “what exactly does that mean?” On one hand, the new normal connotes a world where the predominant or increasing number of applications, resources, and infrastructure is public-cloud-based, employees work from home or remote locations and the traditional WAN and LAN idea has been on a sharp decline. It reflects data breaches becoming almost commonplace and perimeter security somewhat antiquated. On the other hand, we really don’t have a normal, because both resources and attack techniques are constantly changing. Everything is new—applications, user devices, third-party involvement and integration and external sites, as well as all the new ways that attackers can gain a foothold and get to data or assets.
Read More
Meet The Female Founders Reshaping The Male-Dominated Cybersecurity Industry

Meet The Female Founders Reshaping The Male-Dominated Cybersecurity Industry

The recent Women in the Workplace report from McKinsey & Co. and LeanIn revealed that we are in the midst of “The Great Breakup.” Women are leaving their corporate jobs, switching positions, and failing to rise in the management ranks. Unfortunately, matters are even worse in the cybersecurity industry, where women make up just 24 percent of the total workforce and occupy only 11 percent of the C-level positions.
Read More
How a NextGen SIEM Platform Supports Fledgling Digital Transformation Efforts

How a NextGen SIEM Platform Supports Fledgling Digital Transformation Efforts

While there are no recent surveys on how many organizations are yet to embrace digital technologies, it is safe to say that a majority of companies are pushing efforts toward digital transformation.
Read More
New SIEM Alternative Offers Excellent Data Security Features

New SIEM Alternative Offers Excellent Data Security Features

Data breaches are becoming increasingly common these days. A growing number of hackers are becoming very brazen and conducting some truly frightening cyberattacks. One report shows that the number of annual data breaches increased around 60% between 2010 and 2021.
Read More
4 Ways Conventional SIEM Advances into NextGen SIEM

4 Ways Conventional SIEM Advances into NextGen SIEM

An IDC study reveals that most organizations regard security information and event management (SIEM) as sacred. There appears to be a consensus that SIEM is a crucial part of cybersecurity. However, with the rapidly evolving nature of cyber threats, there are those who say that SIEM is an inadequate solution.
Read More
Stellar Cyber Open XDR now available on Oracle Cloud Marketplace

Stellar Cyber Open XDR now available on Oracle Cloud Marketplace

Stellar Cyber has achieved Powered by Oracle Cloud Expertise for its SaaS security operations platform, which is available on Oracle Cloud Marketplace. The Stellar Cyber Open XDR Platform includes XDR (eXtended Detection and Response) and other valuable capabilities needed for security operations, including next-generation security information and event management (NG-SIEM), network detection and response (NDR), Threat Intelligence Platform (TIP) and security orchestration and automated response (SOAR).
Read More
Stellar Cyber’s Leading Open XDR Platform Is Now Available On Oracle Cloud Marketplace

Stellar Cyber’s Leading Open XDR Platform Is Now Available On Oracle Cloud Marketplace

Stellar Cyber provides a solution for a major source of headaches for IT teams — an excessive number of security tools that require regular management and an overwhelming amount of data that has to be analyzed.
Read More
Oracle Cloud Marketplace Has a New Addition ⁠— Stellar Cyber’s Open XDR Platform, Powered by Oracle Cloud Expertise

Oracle Cloud Marketplace Has a New Addition ⁠— Stellar Cyber’s Open XDR Platform, Powered by Oracle Cloud Expertise

Stellar Cyber, a member of the Oracle Partner Network (OPN), unlocks a new achievement as it joins other top applications on Oracle Cloud Marketplace. This Silicon Valley-based company is the leading provider of Open XDR. By far, it has been a necessity for cyber analysts who have been combating data and tool fatigue. As a new addition to the marketplace, it will complement other essential and unique solutions that run on the Oracle Cloud.
Read More
Defining XDR –There’s No Ignoring XDR

Defining XDR –There’s No Ignoring XDR

Most understand XDR as the evolution of endpoint detection and response (EDR) that covers the areas of the attack surface beyond the endpoint, including assets like cloud workloads, containers, and user identities. Others believe XDR is a technology overlay supplementing existing security controls and SOC technology by collecting, processing, analyzing, and acting on security telemetry from numerous sources.
Read More
How a NextGen SIEM Platform Addresses the Challenges Faced by a Conventional SIEM

How a NextGen SIEM Platform Addresses the Challenges Faced by a Conventional SIEM

A 2022 SIEM Report shows how important security information and event management (SIEM) is to organizations. An overwhelming 80 percent of the study’s respondents agree that SIEM is extremely significant to their security. A primary threat detection mechanism, SIEM is critical in the handling of vulnerabilities and attacks as well as in post-incident forensics.
Read More
Crucial Functions of an Effective Network Detection and Response Platform

Crucial Functions of an Effective Network Detection and Response Platform

Network detection and response (NDR) is an important component of an organization’s security strategies. As IBM Security Product Marketing Manager Stephanie Torto notes, “Today’s threats call for deep network visibility and actionable insights that help security teams respond faster. NDR solutions can provide both.”
Read More
Product Review: Stellar Cyber Open XDR Platform

Product Review: Stellar Cyber Open XDR Platform

Almost every vendor, from email gateway companies to developers of threat intelligence platforms, is positioning themselves as an XDR player. But unfortunately, the noise around XDR makes it harder for buyers to find solutions that might be right for them or, more importantly, avoid ones that don't meet their needs.
Read More
6 Necessary Features of SIEM Alternatives

6 Necessary Features of SIEM Alternatives

Is Security Information and Event Management (SIEM) replaceable? The answer to this question is not going to be a simple yes or no. The closest scientific study that approximates an answer to this question is a survey that reveals enterprises’ love-hate relationship with SIEM. Attribution link: https://latesthackingnews.com/2022/09/21/6-necessary-features-of-siem-alternatives/
Read More
IS THERE A VIABLE SIEM REPLACEMENT?

IS THERE A VIABLE SIEM REPLACEMENT?

Details of a 451 Research study, as shared by 451 Research Research Director of Information Security Scott Crawford in a guest blog post, show an overwhelming acknowledgment of the importance of security information and event management (SIEM) among organizations. Nearly three quarters say that it is “very important.”
Read More
Product showcase: The Stellar Cyber Open XDR platform

Product showcase: The Stellar Cyber Open XDR platform

As enterprises find themselves dealing with ever-increasing threats and the boundaries of their organization disappearing, security teams are more challenged than ever to deliver consistent security outcomes across the environment. Stellar Cyber aims to help lean enterprise security teams meet this challenge day in and day out.
Read More
Hands-on Review: Stellar Cyber Security Operations Platform for MSSPs

Hands-on Review: Stellar Cyber Security Operations Platform for MSSPs

As threat complexity increases and the boundaries of an organization have all but disappeared, security teams are more challenged than ever to deliver consistent security outcomes. One company aiming to help security teams meet this challenge is Stellar Cyber.
Read More
Barmak Meftah Joins Open XDR Leader Stellar Cyber as Board Advisor

Barmak Meftah Joins Open XDR Leader Stellar Cyber as Board Advisor

Stellar Cyber, the innovator of Open XDR, today announced that Barmak Meftah has joined the company as an advisor to the Board of Directors. Meftah, who is Co-founder and General Partner of Ballistic Ventures and was formerly President of AT&T Cybersecurity and President and CEO of AlienVault, brings over 25 years of innovative cybersecurity market and management experience to his advisory role at Stellar Cyber.
Read More
Former AlienVault CEO Advises Open XDR Security Startup Stellar Cyber

Former AlienVault CEO Advises Open XDR Security Startup Stellar Cyber

AlienVault and AT&T Cybersecurity veteran Barmak Meftah has joined Stellar Cyber as a board advisor. Meftah will assist the Open XDR security startup with product development and marketing strategies.
Read More
Cybersecurity Infrastructure Needs a New Model

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them)
Read More
How Seemingly Insignificant Data Points Add Precision to Open XDR

How Seemingly Insignificant Data Points Add Precision to Open XDR

Sam Jones, VP of product management discusses how Open XDR can help correlate otherwise ignored security alerts to identify intrusions early, preventing devastating breaches and attacks.
Read More
Security Ideology Might be the Biggest Problem

Security Ideology Might be the Biggest Problem

It’s hard to go through a day without some mention of security strategy. Everyone has a model for security, and professional organizations and top industry analyst groups are constantly offering new or updated models to manage an organization’s security—from budgeting, to staffing, to the types of tools and systems that are needed.
Read More
Data breaches are more costly for these 10 industries

Data breaches are more costly for these 10 industries

The cost of data breaches around the world is growing. The global average cost of a data breach in 2021 totaled $4.24 million, according to IBM research. Data breaches result from unintended leaks or targeted cybercrimes where an unauthorized person accesses, transmits, or steals sensitive information.
Read More
External Exposure Was The Root Cause Of 82% Of Incidents

External Exposure Was The Root Cause Of 82% Of Incidents

According to a new report from Tetra Defense, the Root Point of Compromise (RPOC) for attacks against U.S. companies was external exposure. Patchable and preventable external vulnerabilities were found to be responsible for the bulk of attacks:
Read More
NDR vs. Open XDR – What’s the difference?

NDR vs. Open XDR – What’s the difference?

Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR? NDR is special because it focuses on the nerve center of an organization’s IT infrastructure: the network. Wireless or wired device, endpoint or server, application, user or cloud – all are connected to the network, and the network never lies. It’s the foundation of truth about what’s happening in the IT infrastructure.
Read More
Zyston adopts Stellar Cyber Open XDR platform to accelerate analyst productivity

Zyston adopts Stellar Cyber Open XDR platform to accelerate analyst productivity

Stellar Cyber announced that Zyston has adopted the Stellar Cyber platform as the core of its security operations center. Intrigued by the concept of XDR but unwilling to lock itself into a relationship with just one security vendor, Zyston chose Stellar Cyber’s Open XDR platform for its collection of native tools as well as its ability to integrate with popular third-party tools.
Read More
Best Threat Intelligence Solutions: our top picks

Best Threat Intelligence Solutions: our top picks

In a world where data has become a currency for cyber felons, threat intelligence solutions are a must. They collect and analyze data in order to comprehend cyber threats, letting you make better security decisions. But that’s not all – threat intelligence enables us to notice and deal with cyberattacks much faster. This guarantees high threat prevention rates, limiting their chances of disrupting your business processes.
Read More
Global cybersecurity agencies issue guidance to secure MSPs, their customers from cyber threats

Global cybersecurity agencies issue guidance to secure MSPs, their customers from cyber threats

Transnational cybersecurity agencies warned organizations of recent reports that observe an increase in malicious cyber activity targeting managed service providers (MSPs) and expect this trend to continue.
Read More
Ransomware Deals Deathblow to 157-year-old College

Ransomware Deals Deathblow to 157-year-old College

Illinois-based Lincoln College was established during the U.S. Civil War. Since then it has weathered two world wars, the Spanish Flu, the Great Depression, the Great Recession and a devastating fire. But two things it couldn’t survive?
Read More
Open XDR and the Secret to Great Golf

Open XDR and the Secret to Great Golf

One of the disheartening things in security today is reckoning with the true factors of success. It’s not that most security practices are a dismal failure; in fact, it’s likely that the number of prevented threats is significant. On the other hand, a data breach is practically a foregone conclusion for any organization with valuable data. Even intelligence agencies and security vendors do not seem to be immune from a breach. Security seems essentially powerless to prevent breaches and attacks.
Read More
Effective Security Depends on Your Point of View – Why Open XDR is Necessary to Meet Today’s Challenges

Effective Security Depends on Your Point of View – Why Open XDR is Necessary to Meet Today’s Challenges

A few years ago, a shift occurred in security where it became less about assessing and protecting locality and more about seeing the big picture. Like science, journalism, judicial consideration, and even witness credibility, effective security depends on your point of view. Point of view skews or informs a full and accurate understanding of what is happening, why, and whether it is significant.
Read More
Integrating Asset Management Into Your SOC With Open XDR Can Be A Force Multiplier For Your Business

Integrating Asset Management Into Your SOC With Open XDR Can Be A Force Multiplier For Your Business

As an MSSP, being proactive in your approach to cybersecurity is a best practice. Ensuring that your customers are doing their part to update and patch their systems is critical. If you can integrate your asset management with your SOC/XDR platform there are huge gains to be realized.
Read More
4 essentials of enterprise security

4 essentials of enterprise security

Every year, assaults on the world's technology infrastructure continue to mount. And as last year's widely publicized cyberattacks demonstrate, they can have serious real-world consequences.
Read More
Stellar Cyber collaborates with CYRISMA to help organizations eliminate security blind spots

Stellar Cyber collaborates with CYRISMA to help organizations eliminate security blind spots

Stellar Cyber announced a partnership under which CYRISMA now is fully integrated into the Stellar Cyber Open XDR platform. The CYRISMA integration brings a rich suite of asset management capabilities to the Stellar Cyber Open XDR platform, including:
Read More
Open XDR strategies combine data from siloed tools to help security teams identify and stop attacks

Open XDR strategies combine data from siloed tools to help security teams identify and stop attacks

Detection and response was based on a time when resources and assets were mainly on-premises and attacks were minimally progressive and linear and targeted a single portion of the attack surface. Today, those conditions have changed, and individualized detection and response generally impedes—rather than helps—organizations that are overworked and understaffed with too many unimportant or imprecise alerts.
Read More
Only 30% of the cyber workforce is in the 19-34 age demographic

Only 30% of the cyber workforce is in the 19-34 age demographic

New research from CompTIA on the tech workforce found that 52% of those who work in cybersecurity are in the 35-54 age demographic, and only 30% of the cyber workforce is in the 19-34 age group. The research raises the question as to whether the industry could do more to attract young people.
Read More
LokiLocker Ransomware Poised to Proliferate

LokiLocker Ransomware Poised to Proliferate

LokiLocker, a new ransomware family discovered by BlackBerry, is distinguishing itself by threatening to overwrite the Master Boot Record (MBR) of a victim’s system, leading to the wiping of all files. That, of course, leaves the infected machine unusable, BlackBerry said of the ransomware-as-a-service (RaaS). But there’s a twist—or two or three. “Like its namesake god Loki, this threat seems to have a few subtle tricks up its sleeve—not least of which is being a potential ‘false flag’ tactic that points the finger at Iranian threat actors,” according to a BlackBerry Threat Intelligence blog post.
Read More
MSPAlliance, Boise State Create Specialized Cyber Security Curriculum

MSPAlliance, Boise State Create Specialized Cyber Security Curriculum

MSPAlliance revealed plans to work with Boise State University to offer students specialized training for managed IT service roles. There is major demand for knowledgeable IT professionals, furthermore those with cyber security expertise. CEO Charles Weaver explained MSPAlliance intends to work with Boise State’s cyber security program on a special curriculum, helping students become familiar with common tools and programs (such as Stellar Cyber’s Open XDR) they will need experience with in professional settings.
Read More
Boise State to offer specialized cyber training for managed service provider roles

Boise State to offer specialized cyber training for managed service provider roles

The industry group MSPAlliance announced plans Tuesday to train Boise State University students for cybersecurity roles at companies specializing in providing managed IT services. Managed service providers compete with other industries for cybersecurity and computer science graduates, MSPAlliance CEO Charles Weaver told EdScoop. Additionally, MSPs use different tools and techniques than cybersecurity workers monitoring only one organization.
Read More
Stellar Cybers To Release Universal EDR On Its Open XDR Platform

Stellar Cybers To Release Universal EDR On Its Open XDR Platform

Universal EDR is the industry's first open, high-fidelity XDR technology that enables the unification and amplification of data from all EDRs. With the rise of advanced persistent threats (APTs) and other sophisticated cyberattacks, endpoint detection and response (EDR) has become necessary for security teams. An EDR's role is to proactively monitor, detect, and remediate or isolate endpoint device hazards as they occur. Stellar Cyber, the pioneer of Open XDR, has come up with a Universal EDR, an open, heterogeneous Endpoint Detection and Response (EDR) platform that optimizes and augments event and warning data from any single or combination of EDRs from any vendor. Using the Stellar Cyber Open XDR platform, data from various EDRs is suitably processed to produce coherent, low-noise findings independent of the EDR source. As a result, high-fidelity detection of real-world assault activity is operationalized for rapid reaction. Thus, Universal EDR preserves the openness of the Stellar Cyber platforms while combining data from third-party EDRs or multiple EDRs as if they were native to the platform. Simultaneously, businesses can switch EDRs or employ several EDRs, and Universal EDR will automatically calibrate the data for more precise attack detection overall.
Read More
Is XDR The Right Solution for Today’s Security Threats?

Is XDR The Right Solution for Today’s Security Threats?

XDR and Open XR are two of the latest buzzwords in the cybersecurity tools market, but there are many definitions of XDR and several approaches to delivering it. Let’s clear the air a little. In general, cybersecurity products use preventive physical and software measures to protect the network and its assets from unauthorized access, modification, destruction, and misuse. These products typically protect specific assets on the network
Read More
Boise State Offering Security as a Service to Rural Agencies

Boise State Offering Security as a Service to Rural Agencies

With the addition of Stellar Cyber’s Open XDR platform, Boise State's Cyberdome program will offer enterprise-level cybersecurity services, led by students and mentors, to state and local agencies with limited resources.
Read More
‘Ticking time bomb’: Russian ransomware attacks are coming. What small businesses should do right now.

‘Ticking time bomb’: Russian ransomware attacks are coming. What small businesses should do right now.

As Russian military forces escalate attacks in Ukraine, the United States is bracing for another kind of invasion closer to home. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has increased monitoring of ransomware targeting businesses. Jen Easterly, who heads CISA, says the nation should brace for “an uptick in ransomware.”
Read More
Boise State welcomes local governments to the ‘Cyberdome’

Boise State welcomes local governments to the ‘Cyberdome’

Boise State University announced a partnership this week that will offer cybersecurity services to local governments around Idaho through a new program it’s calling the “Cyberdome.”
Read More
Biden warns Russian cyberattacks are coming. What your business should do right now.

Biden warns Russian cyberattacks are coming. What your business should do right now.

As Russian military forces escalate attacks in Ukraine, the United States is bracing for another kind of invasion closer to home. President Joe Biden warned again Monday that Russia may be preparing to wage cyberattacks against the United States in retaliation for the economic sanctions the U.S. and its NATO allies have levied against Moscow.
Read More
Cybersecurity Talent Shortage: Is Open XDR a Catalyst for New Ideas That Close the Gap?

Cybersecurity Talent Shortage: Is Open XDR a Catalyst for New Ideas That Close the Gap?

This is discussed at meetings, in reports, and in the media on a regular basis. Many of the service providers that I work with share this concern all the time. It is not uncommon to hear that millions of cybersecurity jobs go unfilled every year. What can be done to solve this problem?
Read More
8 Tips For Small Businesses To Stop Cyber ​​Attacks

8 Tips For Small Businesses To Stop Cyber ​​Attacks

As Russian military attacks in Ukraine escalate, the United States prepares for a different type of invasion in the nearer vicinity. Department of Homeland Security Cybersecurity and Infrastructure Security Agency has ramped up surveillance of ransomware targeting businesses. Jen Easterly, who heads CISA, says the nation should prepare “A surge in ransomware.”
Read More
How AI-powered XDR can secure the hybrid workforce

How AI-powered XDR can secure the hybrid workforce

A year ago, NOV Inc. was in the middle of evaluating a new security product to help with securing its globally distributed workforce, spread across more than 60 countries. The oilfield equipment maker was considering deploying an extended detection and response (XDR) solution from SentinelOne — and as part of the evaluation, NOV deployed the XDR platform across a company it had recently acquired.
Read More
Boise State University offering cybersecurity help to Idaho communities through Cyberdome program

Boise State University offering cybersecurity help to Idaho communities through Cyberdome program

Boise State University and Stellar Cyber announced a new partnership on Wednesday that will see the company's Open XDR Platform adopted by the university's Institute for Pervasive Cybersecurity. Boise State created its Cyberdome initiative as a way to promote cybersecurity skill development and create a collaborative hub for competency-based training that aims to reduce cyber risk in rural communities and help expand Idaho's cyber workforce.
Read More
Open XDR vs. SIEM

Open XDR vs. SIEM

Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge. For many enterprises, SIEM is the main tool for aggregating and analyzing data from the infrastructure.
Read More
One in Seven Ransomware Attacks on Critical Infrastructure and Industrial Systems Expose Sensitive OT Information

One in Seven Ransomware Attacks on Critical Infrastructure and Industrial Systems Expose Sensitive OT Information

The Mandiant Threat Intelligence team analyzed data posted in ransomware extortion sites and discovered that ransomware attacks exposed sensitive OT information of victimized companies that depend on this technology for production. According to the researchers, access to this type of data could allow attackers to create an accurate picture of the target’s culture, plans, and operations and craft successful attacks.
Read More
Build A New Superpower For Your MSSP Business!

Build A New Superpower For Your MSSP Business!

Providing endpoint security for all your customers is a major challenge. First, it is very rare that partners can deploy an entire endpoint security stack. In many cases, there are servers or other endpoints that do not get covered, or you have customers in the middle of contracts with one EDR provider or another and they are unwilling to switch early. Next. you have the challenge of administering all those tools and integrating them into your SOC platform.
Read More
Stellar Cyber’s Open XDR Debuts ‘Universal EDR’ to Optimize Data

Stellar Cyber’s Open XDR Debuts ‘Universal EDR’ to Optimize Data

Stellar Cyber, who took home the Gold in the 2021 ‘ASTORS’ Awards Homeland Security Awards Program for Best Cyber Analytics Solution, has announced Universal EDR – an open, heterogeneous Endpoint Detection and Response (EDR) technology that optimizes and augments event and alert data from any single or combination of EDRs from any vendor.
Read More
Democratizing security with Open XDR

Democratizing security with Open XDR

There is no denying the notion of strength in unity. Similarly, inclusiveness and the broad participation of many is another idea that is widely cherished. These are both principles that are essential for achieving success in security in these challenging times. Conventional security has separate tools, alerts, policies, procedures, teams, and reporting. At one time, this approach made sense by applying specialization to specific areas of the attack surface or data and computing infrastructure specific to the needs and vulnerabilities of each. Attacks were generally focused and not overly progressive.
Read More
SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages, and should it coexist with or replace a SIEM? This paper explores the current cybersecurity landscape, how SIEM fits into that landscape, and how XDR platforms can significantly improve security incident visibility, analysis and response.
Read More
Hackers have begun adapting to wider use of multi-factor authentication

Hackers have begun adapting to wider use of multi-factor authentication

Proofpoint researchers have found that “phish kits” available for purchase online are beginning to adapt to MFA by adding transparent reverse proxies to their list of tools. Security researchers at Proofpoint are warning of a new threat that’s only likely to become more serious as time goes on: Hackers who publish phishing kits are beginning to add multi-factor authentication bypassing capabilities to their software.
Read More
Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely. When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats, such as ransomware and phishing attacks, that can severely impact a business. Some of the outcomes include a ruined reputation or major loss of money.
Read More
Ransomware Attacks Expose OT Information

Ransomware Attacks Expose OT Information

One out of every seven leaks from industrial organizations posted in ransomware extortion sites is likely to expose sensitive OT documentation, researchers said. Access to this type of data can enable attackers to learn about an industrial environment, identify paths of least resistance, and engineer cyber physical attacks, according to a post written by Mandiant Threat Intelligence Researchers Daniel Kapellmann Zafra, Corey Hidelbrandt, Nathan Brubaker, and Keith Lunden.
Read More
Hot Cloud Tech Companies To Watch In 2022

Hot Cloud Tech Companies To Watch In 2022

There has been a lot of hand-wringing about the future of the cloud in the markets recently, with a market correction in some of the high-flying cloud technology stocks. But the markets are likely to bounce back. The market for cloud technology innovation will remain strong for many years as we undergo a massive technology shift putting applications, data, and intelligence in the cloud.
Read More
Healthcare industry most common victim of third-party breaches last year

Healthcare industry most common victim of third-party breaches last year

Black Kite released its annual Third-Party Breach Report, which examines the impact of third-party cyber breaches in 2021. Ransomware was the most common attack method behind third-party breaches in 2021, initiating more than one out of four incidents analyzed. Despite immense cybersecurity improvements following the onset of the COVID-19 pandemic, the healthcare industry was the most common victim of attacks caused by third parties, accounting for 33% of incidents last year. With its rich and diverse personally-identifiable information (PII) data, the government sector accounted for 14% of third party attacks in 2021.
Read More
A third -party Black Kite 2022 violation report has been released

A third -party Black Kite 2022 violation report has been released

Ransomware has become the most common form of third -party attacks, accounting for 27% of violations reviewed in 2021. Software publishers were the most common source of third -party breaches for the third consecutive year, accounting for 23% of related cases.
Read More
NCSC Joins US In Miitigating Russian State Interference

NCSC Joins US In Miitigating Russian State Interference

The UK’s National Cyber Security Centre has joined US calls to be wary of Russian state interference in critical infrastructure IT systems including telecoms networks, energy and utility suppliers, transport operations and logistics and distribution specialists.
Read More
Data compromises increased by 68% in 2021

Data compromises increased by 68% in 2021

The Identity Theft Resource Center (ITRC) on Monday reported that the 1,862 data compromises it recorded in 2021 was up more than 68% compared with 2020 — and for last year, cloud-based supply chain attacks were classified as the fourth most common attack vector. In other important findings from the ITRC report, ransomware-related data breaches have doubled in each of the past two years. At the current rate, the ITRC said ransomware will surpass phishing as the No. 1 root cause of data compromises in 2022. Also in the report, the manufacturing and utilities sector saw the largest percentage increase in data compromises at 217% over 2020.
Read More
NSA, FBI, and CISA Issue Joint Cybersecurity Alert on Russian State-Sponsored Attacks on Critical Infrastructure, Government, and Aviation Networks

NSA, FBI, and CISA Issue Joint Cybersecurity Alert on Russian State-Sponsored Attacks on Critical Infrastructure, Government, and Aviation Networks

The Federal Bureau of Investigation (FBI), The National Security Agency (NSA), and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity alert on Russian state-sponsored attacks targeting state, local, tribal, and territorial (SLTT) governments, critical infrastructure organizations, and aviation networks.
Read More
McAfee Enterprise-FireEye relaunches as Trellix, aims to be ‘market leader’ in XDR

McAfee Enterprise-FireEye relaunches as Trellix, aims to be ‘market leader’ in XDR

The cybersecurity giant formed last fall through the merger of McAfee Enterprise and FireEye has a new name, Trellix, and a new mission to become the dominant force in the fast-growing market for extended detection and response (XDR). “Where we’re going is to be the market leader in XDR,” said Trellix CEO Bryan Palma in an interview with VentureBeat.
Read More
UK NCSC also flags Russian state-sponsored cyber threats targeting critical infrastructure

UK NCSC also flags Russian state-sponsored cyber threats targeting critical infrastructure

The U.K.’s National Cyber Security Centre (NCSC) added on Thursday its support to new advice from international partners on countering Russian state-sponsored cyber threats targeting critical infrastructure. The agency added its support to the stand taken by its U.S. counterparts earlier in the week warning of Russian state interference in critical infrastructure systems, including telecoms networks, energy and utility suppliers, transport operations, and logistics and distribution specialists.
Read More
Everything about XDR is around Correlations, not Hype

Everything about XDR is around Correlations, not Hype

In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it, but the hard work that goes into building the detections takes years. It is not enough to say that you have a big data platform that you can dump things into and search; you need actionable detections that lead to meaningful correlations. Here are two key things to consider as you look at XDR.
Read More
Stellar Cyber Takes Home the Gold in 2021 ‘ASTORS’ Awards Program

Stellar Cyber Takes Home the Gold in 2021 ‘ASTORS’ Awards Program

Stellar Cyber is pleased to announce the Stellar Cyber Open XDR Platform, has earned the Gold ‘ASTORS’ Award for Best Cyber Analytics Solution in the 2021 ‘ASTORS’ Homeland Security Awards Program. National Security requires scanning every potential ingress point for cyberattacks. Networks are the prime vector for cyberattacks, and network security focuses on spotting those attacks. Stellar Cyber addresses the challenge that network security is broken because it creates too many alerts and alert fatigue.
Read More
213K Florida Digestive Health patients informed of 2020 data compromise

213K Florida Digestive Health patients informed of 2020 data compromise

Florida Digestive Health Specialists recently notified 212,509 patients that their data was potentially compromised one year ago, during the hack of multiple employee email accounts.
Read More
Cybercriminals Launching Log4Shell Attacks on VMware Software

Cybercriminals Launching Log4Shell Attacks on VMware Software

The cyber alert service says an unknown threat group is attempting to exploit a log4j vulnerability in VMware Horizon servers to establish a presence within affected networks. If successful, attackers could steal data or deploy ransomware. VMware confirmed the exploitation attempts. “The attack likely consists of a reconnaissance phase, where the attacker uses the Java naming and directory interface (JNDI) via Log4Shell payloads to call back to malicious infrastructure,” the NHS alert said. “Once a weakness has been identified, the attack then uses the lightweight directory access protocol (LDAP) to retrieve and execute a malicious Java class file that injects a web shell into the (VMware) Blast Secure Gateway service.”
Read More
AG of New York: Investigation Uncovered 1.1 Million Compromised Accounts Used for Credential Stuffing Attacks Against 17 Online Companies

AG of New York: Investigation Uncovered 1.1 Million Compromised Accounts Used for Credential Stuffing Attacks Against 17 Online Companies

The Federal Bureau of Investigation (FBI), The National Security Agency (NSA), and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity alert on Russian state-sponsored attacks targeting state, local, tribal, and territorial (SLTT) governments, critical infrastructure organizations, and aviation networks.
Read More
NHS Warns Of Log4j Pwnage

NHS Warns Of Log4j Pwnage

NHS digital cyber team has alerted of Log4Shell attacks on VMware software. The cyber alert service says an unknown threat group targeted the unpatched Horizon systems in order to establish a presence within affected networks. If successful, attackers could steal data or deploy ransomware. This isn’t good timing as NHS just like other health care systems worldwide are being overwhelmed by the Omicron variant of COVID. Though when is it a good time to get pwned.
Read More
Credential Stuffing Compromises More Than 1.1 Million Online Accounts

Credential Stuffing Compromises More Than 1.1 Million Online Accounts

That’s according to New York Attorney General Letitia James. Credential stuffing is a cyberattack in which attackers use lists of compromised user credentials to breach into a system. Users tend to reuse the same passwords across multiple online services.
Read More
New York Warns Credential Stuffing Hit 1 Million Accounts

New York Warns Credential Stuffing Hit 1 Million Accounts

The Office of the New York State Attorney General on Wednesday released findings of an investigation of credential stuffing attacks, revealing that some 1.1 million online accounts had been compromised in cyberattacks.
Read More
Cybersecurity Challenges In 2022 And Tackling Them

Cybersecurity Challenges In 2022 And Tackling Them

According to a report, there’s a 125 per cent increase in cyberattacks year-over-year, and the impact was observed for almost every industry. An uptick drives the growth inactivity by the nation-state and cybercrime actors, targeted ransomware and extortion operations.
Read More
Terralogic brings Stellar Cyber Open XDR platform to its customers across India

Terralogic brings Stellar Cyber Open XDR platform to its customers across India

Stellar Cyber announced that a top 250 MSSP and technology integrator Terralogic has adopted the Stellar Cyber Open XDR platform to bring new levels of visibility and security to its customers across India. “We are always seeking new tools that help us deliver world-class security services for our customers,” said Sandeep Vijayaraghavan, VP of Cybersecurity at Terralogic. “The Stellar Cyber Open XDR platform is the first we’ve seen that unifies and correlates data from our various security tools to present a single, comprehensive view of our customers’ security.”
Read More
Stellar Cyber 2022 Predictions: XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

Stellar Cyber 2022 Predictions: XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

Initial definitions of XDR envisioned eXtended Detection and Response - a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, XDR is "a single, stand-alone solution that offers integrated threat detection and response capabilities." To meet Omdia's criteria to be classified as a "comprehensive" XDR solution, a product must offer threat detection and response functionality across endpoints, networks and cloud computing environments.
Read More
How XDR correlates disparate systems data and delivers the visibility modern organizations need

How XDR correlates disparate systems data and delivers the visibility modern organizations need

It’s hard to argue that today’s security tools and policies are exceedingly effective. While the industry has prevented a good number of cyberattacks, the fact remains that motivated attackers will continue to gain access to data and systems. Even the NSA, FBI and top security vendors are not immune from this reality. Perpetuating existing approaches to security will not change this equation. Something has to fundamentally change.
Read More
Stellar Cyber raises $38M to provide 360-degree visibility across attack surface

Stellar Cyber raises $38M to provide 360-degree visibility across attack surface

Stellar Cyber, the innovator of Open XDR, has raised $38 million in an oversubscribed series B funding round led by Highland Capital Partners, with full participation from all existing investors including Valley Capital Partners, SIG, and Northern Light Venture Capital, and new strategic investor Samsung. This new round brings Stellar Cyber’s total funding to more than $68 million.
Read More
Cybersecurity Funding: Highland, Samsung Back Stellar Cyber Open XDR

Cybersecurity Funding: Highland, Samsung Back Stellar Cyber Open XDR

Stellar Cyber Open XDR, backed by growing MSSP security partner adoption, gains funding from Highland Capital Partners & Samsung Next. Open XDR security software provider Stellar Cyber has raised $38 million in Series B funding. Highland Capital Partners led the round, with participation from all existing investors and new strategic investor Samsung Next. The new funding arrives as Stellar Cyber’s Open XDR software continues to gain momentum with MSSPs. Stellar Cyber’s total funding since inception now stands at more than $68 million.
Read More
Open XDR startup Stellar Cyber raises $38M to expand its platform

Open XDR startup Stellar Cyber raises $38M to expand its platform

Extended detection and response startup Stellar Cyber announced today that it has raised $38 million in new funding to expand its Open XDR platform. The Series B round was led by Highland Capital Partners and included Samsung and existing investors. Including the new funding, Stellar Cyber has raised $68 million to date. Founded in 2015, Stellar Cyber offers Open XDR, which it describes as an “everything detection and response” service versus the traditional XDR meaning. The service is designed to reduce enterprise risk significantly by early identification and remediation of all attack activities. It’s said to do so while slashing costs, retaining investments in existing tools and accelerating the productivity of analysts.
Read More
Why We Invested in Stellar Cyber, Open XDR for enterprise-level security

Why We Invested in Stellar Cyber, Open XDR for enterprise-level security

Stellar Cyber is simplifying cyberthreat detection and response with its open extended detection and response (XDR) platform for enterprise networks and managed security service providers (MSSPs). XDR is an emerging product category solving three major pain points when it comes to security operations. First, it provides an open solution to replace a multitude of siloed security analytics tools from legacy providers. Next, it automates much of the cybersecurity process, which reduces the need for skilled IT professionals – in short supply in today’s labor market. Finally, it provides a more efficient way for organizations to manage and respond to a growing volume of security alerts.
Read More
Why Network Detection and Response (NDR)? See the Entire Elephant in the Room

Why Network Detection and Response (NDR)? See the Entire Elephant in the Room

Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern attacks leveraging more complex approaches, the definition is much broader now.
Read More
Barracuda adds powerful tool for MSSP partners with Stellar Cyber Open XDR integration

Barracuda adds powerful tool for MSSP partners with Stellar Cyber Open XDR integration

Stellar Cyber will provide increased enhanced visibility and automated incident correlation to impacted Barracuda solutions, as well as benefits specific to Barracuda MSSPs. Today, cybersecurity vendor Barracuda Networks is announcing a new integration of its security platform with Stellar Cyber, which makes a security operations platform based on Open XDR.
Read More
Open XDR vs. SIEM

Open XDR vs. SIEM

Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge. For many enterprises, SIEM is the main tool for aggregating and analyzing data from the infrastructure.
Read More
XDR Report – Stellar Cyber Open XDR: Making security fun again

XDR Report – Stellar Cyber Open XDR: Making security fun again

Endpoint detection and response (EDR) is a crucial part of extended detection and response (XDR), but XDR does not just mean extended EDR – the “extended” part of the label refers to extended coverage, visibility, integration, analytic, detection, investigation and response capabilities XDR solutions offer.
Read More
How Open XDR Can Prevent Cyberattacks

How Open XDR Can Prevent Cyberattacks

Analytics seems to be the answer for almost anything, and security is no exception. Most professionals agree that analytics could hold the key to uncovering early actions from attackers with the goal of minimizing or eliminating damage and theft. Behavioral analytics has the ability to find abnormal behaviors—if it can achieve an acceptable level of fidelity without drowning security teams in a flood of alerts and false positives. The gulf between behavioral analytics’ potential and the current reality is wide. Like most compute applications, behavioral analytics are limited by what information they have and how it is used. It’s the garbage in, garbage out principle.
Read More
Security Is A Big Data Problem

Security Is A Big Data Problem

As cyberattacks get more sophisticated, Changming Liu, CEO and Co-founder at Stellar Cyber, talks about how its platform addresses the complexity of cyberattacks and why it’s essential for organisations to have high-speed, high-fidelity threat detection and automated response across the entire attack surface. How do enterprises achieve the required security and agility from the latest tools in a way that will positively impact their business operation? Companies spend millions on securing their infrastructure, but attacks are increasing and growing more sophisticated every day. Analysts are besieged with alerts, many of which are meaningless, and it takes days, weeks, or months to discover some complex attacks. Stellar Cyber addresses this problem by aggregating alerts into incidents and prioritising them to be easy to spot.
Read More
Industries That Boomed During the Pandemic: Security

Industries That Boomed During the Pandemic: Security

In the first half of 2021, there were a total of 1,767 publicly reported data breaches, exposing 18.8 billion records. In dollars, cybercrime in 2021 has so far caused damages totaling a whopping $6 trillion globally. In fact, if cybercrime were a nation, it would have the third-largest economy in the world, trailing only behind the US and China. Although the number of breaches in 2021 is 24% less than in 2020, many companies are still ill-equipped for a completely remote workplace and security initiatives have not been effectively implemented to prevent data breaches and cyberattacks. As a result, the demand for secure and robust networks has accelerated significantly.
Read More
LMJ Consulting uses Stellar Cyber platform to add MDR services to its offerings

LMJ Consulting uses Stellar Cyber platform to add MDR services to its offerings

Stellar Cyber announced that LMJ Consulting is using the Stellar Cyber platform to add MDR services to its offerings. LMJ Consulting has been providing EDR services (based on BlackBerry/Cylance’s EDR-as-a-Service) to MSSPs throughout the West Coast, and it is now using the Stellar Cyber platform to evolve into a full-fledged MDR service provider.
Read More
The differences between open XDR vs. native XDR

The differences between open XDR vs. native XDR

With extended detection and response, security teams get improved threat analytics and response capabilities. Here's what they need to know to choose the right type of XDR. Coined by Palo Alto Networks in 2018, extended detection and response is an evolution of endpoint detection and response. Analyst firm Enterprise Strategy Group, a division of TechTarget, predicted that more than two-thirds of companies will invest in XDR over the next year.
Read More
StellarCyber Improves Incident Correlation and XDR With Artificial Intelligence

StellarCyber Improves Incident Correlation and XDR With Artificial Intelligence

As an analyst, my sole focus is on transformative technologies – and there is no better example of this than artificial intelligence impacting almost all aspects of our lives. Voice AI is being built into cars and home assistants, e-commerce websites use it to make better recommendations and streaming media sites can offer up better content with AI. In the area of corporate IT, AI will have an equally big effect on IT operations, collaboration, and other technologies. However, we might see the biggest impact in cyber security.
Read More
Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Older security technologies may be "good enough" to address compliance regulations -- but they don't protect against modern cybersecurity threats. Is Open XDR the solution? Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools and audits. These regulations have the right goal in mind: protect companies, their intellectual property and their customers. Unfortunately, by the time these laws make it through the government process the attackers have already changed their tactics. They don’t have to play by any rules.
Read More
Stellar Cyber Unveils AI-Powered Incident Correlation

Stellar Cyber Unveils AI-Powered Incident Correlation

Stellar Cyber has announced a significant advancement in security analyst efficiency, allowing them to detect assaults rapidly. Stellar Cyber, the provider of Open XDR, the only intelligent, next-gen security operations platform, has announced a significant advancement in security analyst efficiency, allowing them to detect assaults rapidly. Innovative GraphML algorithms are used in the latest incident correlation technology to automatically aggregate and integrate massive amounts of alerts and events into a considerably smaller number of highly accurate and actionable incidents. The development provides security analysts with far more actionable data on how and where attacks happen and the most serious ones.
Read More
ICYMI: Our Channel News Roundup for the Week of August 2nd

ICYMI: Our Channel News Roundup for the Week of August 2nd

The first “Cloud PCs” from Microsoft, an XDR alliance from Exabeam, acquisitions by Ivanti and its Wavelink unit, and an Olympics equestrian course that stops horses in their tracks are a few of the many stories we have finally managed to tell you about. By James E. Gaskin. Americans like to win, especially in games we invented, like basketball. (Hey, let's nail a peach basket to the wall the throw a ball through it!) We like to win so much, we send our best professional basketballers to the Olympics to play the best amateurs from other countries, augmented by some NBAers (go, Luka!). Surprise, surprise, we usually win. This year, the road had bumps, but in the gold medal game, it will be the United States versus France (with five NBA players).
Read More
Stellar Cyber and BlackBerry partner for AI-powered security

Stellar Cyber and BlackBerry partner for AI-powered security

Stellar Cyber, a next-generation security operations platform, has partnered with BlackBerry to accelerate the adoption of AI-powered security solutions for enterprises and managed security service providers (MSSPs). The companies will combine BlackBerry’s prevention-first AI-driven Unified Endpoint Security offerings with Stellar Cyber’s security operations platform. By joining together in the marketplace, they offer enterprises and MSSPs higher efficiency, a lower rate of false positives, and ‘significantly better protection’ against today’s multi-layered cyberattacks.
Read More
XDR Provider Stellar Cyber Announces Incident Correlation Technology

XDR Provider Stellar Cyber Announces Incident Correlation Technology

Stellar Cyber continues to share more details about the company’s recent Open XDR 4.0 platform launch. The latest capability to note: The software features artificial intelligence-based incident correlation technology. In a briefing with MSSP Alert, Stellar Cyber VP of Product Management Sam Jones noted: The company views XDR as “Everything Detection and Response” rather than just “eXtended Detection and Response.” The reason: Open XDR gathers and normalizes data from network, endpoint, cloud, identity and SaaS productivity applications, Jones asserts. From there, the incident correlation technology uses GraphML algorithms to automatically group and consolidate security alerts and events into precise and actionable incidents, Stellar Cyber said.
Read More
July 27 2021, Sam Jones – Stellar Cyber

July 27 2021, Sam Jones – Stellar Cyber

Sam Jones of Stellar Cyber joins me on ZKast to discuss #cybersecurity, open #XDR, #AI powered incident correlation and a whole lot more. Check it out
Read More
Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) systems cover the entire compute/network infrastructure, so they generate more alerts than security systems that focus on one area, such as endpoints, firewalls or servers. The challenge is knowing what to do with these alerts to enhance analyst productivity. After all, analysts can only deal with one alert at a time, and it often seems that they spend their days playing Whack-a-Mole with them. Moreover, there’s no time to consider alerts in the context of the overall infrastructure to spot complex attacks that trigger a host of alerts.
Read More
Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks

Stellar Cyber introduced a realistic XDR Kill Chain to serve as a new model, addressing the current realities of cyberattacks and focus efforts to stop an attack early and quickly. The new version builds on the MITRE ATT&CK framework to reflect the iterative approach of attackers and the likelihood of attacking any point or multiple points of an organization’s attack surface.
Read More
Extended Detection and Response (XDR) Needs a New Kill Chain

Extended Detection and Response (XDR) Needs a New Kill Chain

When it comes to spotting and defeating today’s advanced cyberattacks, the predominant kill chains used in security products clearly aren’t up to the task. New attacks occur every day, and they are increasingly creative and complex. For example, the SolarWinds hack targeted a user’s email, then used that ID to navigate the company’s network, and then installed malware in the outbound software update server that gave the hackers access to every SolarWinds customer’s network.
Read More
Does XDR Need A New Kill Chain?

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries. Now that we have seen so many successful multi-stage attacks, we need to reassess the way we correlate the signals we are seeing from all the security tools in our environments. Correlation is helpful but it doesn’t always paint the complete picture. What is the next phase in detection and response?
Read More
Stellar Cyber Puts the Kill Chain in XDR

Stellar Cyber Puts the Kill Chain in XDR

Stellar Cyber updated its extended detection and response (XDR) platform with a new XDR Kill Chain that the security vendor says stop attacks quicker. The new version builds on the MITRE ATT&CK framework, but is purpose built for XDR, according to Sam Jones, VP of product management at Stellar Cyber.
Read More
Open XDR and the Future of Cybersecurity

Open XDR and the Future of Cybersecurity

When “X” means everything. Aimei Wei is the Founder and VP of Engineering at Stellar Cyber. She has over 20+ years of experience building successful products and leading teams in data networking and telecommunications. She has extensive working experience for both early stage startups including Nuera, SS8 Networks and Kineto Wireless as well as well-established companies like Nortel, Ciena and Cisco. Prior to founding Stellar Cyber, she was actively developing Software Defined Networks solutions at Cisco.
Read More
Can XDR Solve Ransomware? – Maurice Stebila

Can XDR Solve Ransomware? – Maurice Stebila

Every day brings news of more breaches and ransomware attacks. Why are organizations failing to protect themselves, and what can we do to combat these cybersecurity threats? Technological advances, such as XDR and AI-driven threat monitoring, offer a way to thwart attackers in an ever-evolving security landscape.
Read More
XDR Demands a New Approach to Security—and Business

XDR Demands a New Approach to Security—and Business

Everybody wants to rule the world, at least according to that Tears for Fears song a few decades back. This principle certainly holds true in the cybersecurity market. With extended detection and response (XDR) and the newer advancement of Open XDR becoming quickly becoming recognized as an important approach to stem the tide of increasing attacks, this business question is actually quite important.
Read More
Aimei Wei of Stellar Cyber: “Mentor people and help them to grow”

Aimei Wei of Stellar Cyber: “Mentor people and help them to grow”

Mentor people and help them to grow — when we hire people, we want to build a diverse team — different national origins, different races and sexes. It’s an amazing experience interacting with people and learning from them. We are all working toward the same vision, so everyone does their best to make the company successful. It’s partnership between our employees and our customers to make them successful. The cybersecurity industry has become so essential and exciting. What is coming around the corner? What are the concerns we should keep an eye out for? How does one succeed in the cybersecurity industry? As a part of this interview series called “Wisdom From The Women Leading Cybersecurity Industry”, we had the pleasure of interviewing Aimei Wei.
Read More
Open XDR vs. SIEM

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution- Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge.
Read More
Coeficiente Comunicaciones First Internet Service Provider in Mexico to Deploy Stellar Cyber Open XDR Platform

Coeficiente Comunicaciones First Internet Service Provider in Mexico to Deploy Stellar Cyber Open XDR Platform

Stellar Cyber, the leading security operations platform for MSSPs, announced today it has extended its market reach in Latin America by adding Coeficiente Comunicaciones, a leading Mexican internet service provider serving more than 30 major cities, to its rapidly-growing customer list. Through this relationship with Stellar Cyber, Coeficiente becomes the first ISP in Mexico with AI-powered cybersecurity protection embedded in its backbone.
Read More
Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be the ultimate security analytics platform. Still, many users feel they haven’t lived up to their promises. Now, extended detection and response (XDR) promises to be the ultimate platform. Should you adopt XDR? What does it mean for your SIEM? Security information and event management (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is extended detection and response. What are its advantages, and should it coexist with or replace a SIEM? This article explores the current cybersecurity landscape, how SIEM fits into that landscape, and how XDR platforms can significantly improve security incident visibility, analysis and response.
Read More
What the Heck Is Open XDR?

What the Heck Is Open XDR?

The technology industry loves its buzzwords, but “open” may be the most overused and abused. Depending on who you are talking to, open may mean anything from fully open source to API integrations, and the latest in a very long list of verbiage offenders is extended detection and response (XDR). XDR vendors have recently glommed on to the open label for their products and approaches, and none of their definitions of open XDR are the same.
Read More
Cyberthreats Go Sideways

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No one wants to get famous because of cyberattacks which can travel inside your network in tens or even hundreds of days without being noticed.
Read More
Stellar Cyber introduces central management functionality in its Open XDR platform

Stellar Cyber introduces central management functionality in its Open XDR platform

Stellar Cyber introduces the centralized management and visibility functionality in its Open XDR platform. This new capability, named Stellar Cyber Central, accompanies Stellar Cyber’s Command Center and enables users to see potential threats and consolidate user management at multiple sites from one single console under a single license, and without having to log into those sites individually – reducing complexity, improving performance, segmenting data to comply with GDPR or other privacy requirements, and reducing the time it takes to identify security incidents.
Read More
Wisdom From The Women Leading The Cybersecurity Industry, With Aimei Wei of Stellar Cyber

Wisdom From The Women Leading The Cybersecurity Industry, With Aimei Wei of Stellar Cyber

Mentor people and help them to grow — when we hire people, we want to build a diverse team — different national origins, different races and sexes. It’s an amazing experience interacting with people and learning from them. We are all working toward the same vision, so everyone does their best to make the company successful. It’s partnership between our employees and our customers to make them successful.
Read More
The Case for Open XDR

The Case for Open XDR

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each security analyst to communicate with other analysts to determine whether each tool’s individual detection (each of which, by itself, may look benign), can correlate with other detections from other tools to reveal a complex attack.
Read More
An industry expert focused on delivering maximum cyberattack protection to organizations: Stellar Cyber

An industry expert focused on delivering maximum cyberattack protection to organizations: Stellar Cyber

In the digital world we live in, businesses must never overlook the benefits of cybersecurity. Year upon year, the number of cyberattacks is reaching staggering rates across the globe. As the internet continues to promote economic growth, every business interaction has now started to use it as a platform. Along with the ever-growing opportunity, businesses have to now deal with concerns and risks around cybersecurity. Experts are advising businesses to make use of automated cybersecurity solutions to face the onslaughts from cyberattacks. Until recent times, businesses were heavily reliant on security systems that were solely focusing on creating a perimeter-based security infrastructure. However, a lot of things have changed now, and considering the power of automated security solutions, older security measures are no longer relevant.
Read More
Are TIPs Finally Converging With SIEMs?

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many parts of the world, I heard multiple vendors of intelligent video surveillance explaining the same use case. The message was, “Say someone walks into a lobby/park/manufacturing plant carrying a briefcase/backpack. Then, they leave without it. Our smart surveillance system will alert you to that fact.” The value proposition was simple: fewer eyes-on-glass needed. Automated systems work 24/7. Save money, catch bad guys. Yet, I have never encountered a vendor who could cite a successful, real-life situation where the use case was proven. It was hypothetical, although it would have been very useful during the hours before the 2013 Boston Marathon.
Read More
Stellar Cyber Open XDR Security Platform Gains Threat Intelligence Capabilities

Stellar Cyber Open XDR Security Platform Gains Threat Intelligence Capabilities

Stellar Cyber has integrated its Threat Intelligence Platform (TIP) into its Open XDR platform, according to a prepared statement. In doing so, Open XDR eliminates the need for Stellar Cyber customers to subscribe to and manage third-party threat intelligence feeds. Open XDR users can leverage TIP to automatically collect and aggregate feeds from multiple sources into a single consolidated threat intelligence resource. This enhances Open XDR’s threat detection, investigation, hunting and response capabilities.
Read More
Stellar Cyber Feeds Third-Party Threat Intel Into XDR

Stellar Cyber Feeds Third-Party Threat Intel Into XDR

Stellar Cyber integrated third-party threat intelligence feeds into its extended detection and response (XDR) platform, which the security vendor says means customers don’t have to subscribe to and manage third-party feeds. The move natively integrates Stellar Cyber’s Threat Intelligence Platform (TIP) with its Open XDR platform.
Read More
Three Wishes to Revitalize SIEM and Your SOC

Three Wishes to Revitalize SIEM and Your SOC

How many times have you hoped that a magic genie would somehow appear and grant three wishes? If the wishes were for your SIEM or security operations team, what would that be (and what kind of security certifications would you require of your genie)? The most common wish I encounter is for a security team that delivers a new level of effectiveness. The other two wishes are usually greater efficiency—the idea of being able to do more with less—and being able to hire qualified and experienced candidates for positions that have remained unfilled for long periods of time. (Enterprising and budget-savvy CISOs may substitute one of these for wishing for an additional three wishes, if that is permissible.)
Read More
Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain vulnerable Enterprises are seeking to optimize their existing investments in critical WAF infrastructure in ways that further reduce risk, increase productivity, and accelerate response times
Read More
Omdia Research Spotlight: XDR

Omdia Research Spotlight: XDR

Few emerging cybersecurity market segments are garnering more attention than XDR. Here, Omdia highlights its recent research on XDR. Extended Detection and Response (XDR) technology is quickly taking the enterprise cybersecurity industry by storm. The term XDR, first coined in 2018 by Omdia Principal Analyst Rik Turner, is defined by Omdia as a single, stand-alone solution that offers integrated threat detection and response capabilities.
Read More
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain

Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain

The Cyber Kill Chain and MITRE ATT&CK are popular reference frameworks to analyze breaches, but amid the rise of XDR, we may need a new one. If you work in information security, you will be aware of Lockheed Martin's Cyber Kill Chain and/or the MITRE ATT&CK Framework. Both are attempts to create a common language in which to describe the various stages of an attack, and the tactics utilized by the attackers.
Read More
SIEM and XDR Solutions: Key Questions MSSPs Should Ask

SIEM and XDR Solutions: Key Questions MSSPs Should Ask

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, one would ideally like to collect as much data as possible and store it as long as needed. But having a SIEM or XDR system that sucks up every packet or every log entry creates an ongoing demand for more storage, which can be expensive over the long term whether you’re using on-site resources or the cloud. Another issue is that searches or queries on huge volume of data can take a long time when a quick response may be critical for stopping an attack.
Read More
Stellar Cyber Open XDR platform stores metadata and offers flexible storage options

Stellar Cyber Open XDR platform stores metadata and offers flexible storage options

Stellar Cyber announced that its open and highly flexible approach to the long-term storage of large volumes of security data eases concerns about storage complexity and costs seen in legacy SIEMs or some proprietary XDR solutions used by security operations centers. Cybersecurity is essentially a data problem, with best practices necessitating capturing and retaining all available data to properly evaluate potential threats and keep an audit trail for future investigations.
Read More
The Best Network Protection: Go Deep or Go Broad?

The Best Network Protection: Go Deep or Go Broad?

Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their security solutions. Mostly, the choice varies between predominantly one or the other. Going deep typically means careful monitoring and analysis of certain types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that are broader may lack the clarity and fidelity to make fast, accurate alerting. They also may miss important indicators.
Read More
The Women Who Shaped the Tech World

The Women Who Shaped the Tech World

Technology has always been - and continues to be – a field dominated by men. However, women have always played a crucial role in tech. The stories of some of these pioneers and current leaders have only recently gained widespread attention. But if women are half of the population why does their tech representation fail to reflect this? The problems that women in tech face can explain a lot of the disparities in not just representation, but pay and other issues. We assembled a panel of current tech leaders to discuss the history of women in tech, and the path forward.
Read More
Futility or Fruition? Rethinking Common Approaches To Cybersecurity

Futility or Fruition? Rethinking Common Approaches To Cybersecurity

The recently disclosed breach of FireEye should give everyone pause over both the importance and difficulty of security. This high-profile breach left the vendor with a black eye and some serious questions. The disclosure almost immediately had every security vendor writing blogs and articles about the importance of this or that in accordance to what they sell and market. Opportunity strikes!