Press Coverage

Release Date:
Industries That Boomed During the Pandemic: Security

Industries That Boomed During the Pandemic: Security

In the first half of 2021, there were a total of 1,767 publicly reported data breaches, exposing 18.8 billion records. In dollars, cybercrime in 2021 has so far caused damages totaling a whopping $6 trillion globally. In fact, if cybercrime were a nation, it would have the third-largest economy in the world, trailing only behind the US and China. Although the number of breaches in 2021 is 24% less than in 2020, many companies are still ill-equipped for a completely remote workplace and security initiatives have not been effectively implemented to prevent data breaches and cyberattacks. As a result, the demand for secure and robust networks has accelerated significantly.
Read More
LMJ Consulting uses Stellar Cyber platform to add MDR services to its offerings

LMJ Consulting uses Stellar Cyber platform to add MDR services to its offerings

Stellar Cyber announced that LMJ Consulting is using the Stellar Cyber platform to add MDR services to its offerings. LMJ Consulting has been providing EDR services (based on BlackBerry/Cylance’s EDR-as-a-Service) to MSSPs throughout the West Coast, and it is now using the Stellar Cyber platform to evolve into a full-fledged MDR service provider.
Read More
The differences between open XDR vs. native XDR

The differences between open XDR vs. native XDR

With extended detection and response, security teams get improved threat analytics and response capabilities. Here's what they need to know to choose the right type of XDR. Coined by Palo Alto Networks in 2018, extended detection and response is an evolution of endpoint detection and response. Analyst firm Enterprise Strategy Group, a division of TechTarget, predicted that more than two-thirds of companies will invest in XDR over the next year.
Read More
StellarCyber Improves Incident Correlation and XDR With Artificial Intelligence

StellarCyber Improves Incident Correlation and XDR With Artificial Intelligence

As an analyst, my sole focus is on transformative technologies – and there is no better example of this than artificial intelligence impacting almost all aspects of our lives. Voice AI is being built into cars and home assistants, e-commerce websites use it to make better recommendations and streaming media sites can offer up better content with AI. In the area of corporate IT, AI will have an equally big effect on IT operations, collaboration, and other technologies. However, we might see the biggest impact in cyber security.
Read More
Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Older security technologies may be "good enough" to address compliance regulations -- but they don't protect against modern cybersecurity threats. Is Open XDR the solution? Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools and audits. These regulations have the right goal in mind: protect companies, their intellectual property and their customers. Unfortunately, by the time these laws make it through the government process the attackers have already changed their tactics. They don’t have to play by any rules.
Read More
Stellar Cyber Unveils AI-Powered Incident Correlation

Stellar Cyber Unveils AI-Powered Incident Correlation

Stellar Cyber has announced a significant advancement in security analyst efficiency, allowing them to detect assaults rapidly. Stellar Cyber, the provider of Open XDR, the only intelligent, next-gen security operations platform, has announced a significant advancement in security analyst efficiency, allowing them to detect assaults rapidly. Innovative GraphML algorithms are used in the latest incident correlation technology to automatically aggregate and integrate massive amounts of alerts and events into a considerably smaller number of highly accurate and actionable incidents. The development provides security analysts with far more actionable data on how and where attacks happen and the most serious ones.
Read More
ICYMI: Our Channel News Roundup for the Week of August 2nd

ICYMI: Our Channel News Roundup for the Week of August 2nd

The first “Cloud PCs” from Microsoft, an XDR alliance from Exabeam, acquisitions by Ivanti and its Wavelink unit, and an Olympics equestrian course that stops horses in their tracks are a few of the many stories we have finally managed to tell you about. By James E. Gaskin. Americans like to win, especially in games we invented, like basketball. (Hey, let's nail a peach basket to the wall the throw a ball through it!) We like to win so much, we send our best professional basketballers to the Olympics to play the best amateurs from other countries, augmented by some NBAers (go, Luka!). Surprise, surprise, we usually win. This year, the road had bumps, but in the gold medal game, it will be the United States versus France (with five NBA players).
Read More
Stellar Cyber and BlackBerry partner for AI-powered security

Stellar Cyber and BlackBerry partner for AI-powered security

Stellar Cyber, a next-generation security operations platform, has partnered with BlackBerry to accelerate the adoption of AI-powered security solutions for enterprises and managed security service providers (MSSPs). The companies will combine BlackBerry’s prevention-first AI-driven Unified Endpoint Security offerings with Stellar Cyber’s security operations platform. By joining together in the marketplace, they offer enterprises and MSSPs higher efficiency, a lower rate of false positives, and ‘significantly better protection’ against today’s multi-layered cyberattacks.
Read More
XDR Provider Stellar Cyber Announces Incident Correlation Technology

XDR Provider Stellar Cyber Announces Incident Correlation Technology

Stellar Cyber continues to share more details about the company’s recent Open XDR 4.0 platform launch. The latest capability to note: The software features artificial intelligence-based incident correlation technology. In a briefing with MSSP Alert, Stellar Cyber VP of Product Management Sam Jones noted: The company views XDR as “Everything Detection and Response” rather than just “eXtended Detection and Response.” The reason: Open XDR gathers and normalizes data from network, endpoint, cloud, identity and SaaS productivity applications, Jones asserts. From there, the incident correlation technology uses GraphML algorithms to automatically group and consolidate security alerts and events into precise and actionable incidents, Stellar Cyber said.
Read More
July 27 2021, Sam Jones – Stellar Cyber

July 27 2021, Sam Jones – Stellar Cyber

Sam Jones of Stellar Cyber joins me on ZKast to discuss #cybersecurity, open #XDR, #AI powered incident correlation and a whole lot more. Check it out
Read More
Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) systems cover the entire compute/network infrastructure, so they generate more alerts than security systems that focus on one area, such as endpoints, firewalls or servers. The challenge is knowing what to do with these alerts to enhance analyst productivity. After all, analysts can only deal with one alert at a time, and it often seems that they spend their days playing Whack-a-Mole with them. Moreover, there’s no time to consider alerts in the context of the overall infrastructure to spot complex attacks that trigger a host of alerts.
Read More
Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks

Stellar Cyber introduced a realistic XDR Kill Chain to serve as a new model, addressing the current realities of cyberattacks and focus efforts to stop an attack early and quickly. The new version builds on the MITRE ATT&CK framework to reflect the iterative approach of attackers and the likelihood of attacking any point or multiple points of an organization’s attack surface.
Read More
Extended Detection and Response (XDR) Needs a New Kill Chain

Extended Detection and Response (XDR) Needs a New Kill Chain

When it comes to spotting and defeating today’s advanced cyberattacks, the predominant kill chains used in security products clearly aren’t up to the task. New attacks occur every day, and they are increasingly creative and complex. For example, the SolarWinds hack targeted a user’s email, then used that ID to navigate the company’s network, and then installed malware in the outbound software update server that gave the hackers access to every SolarWinds customer’s network.
Read More
Does XDR Need A New Kill Chain?

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries. Now that we have seen so many successful multi-stage attacks, we need to reassess the way we correlate the signals we are seeing from all the security tools in our environments. Correlation is helpful but it doesn’t always paint the complete picture. What is the next phase in detection and response?
Read More
Stellar Cyber Puts the Kill Chain in XDR

Stellar Cyber Puts the Kill Chain in XDR

Stellar Cyber updated its extended detection and response (XDR) platform with a new XDR Kill Chain that the security vendor says stop attacks quicker. The new version builds on the MITRE ATT&CK framework, but is purpose built for XDR, according to Sam Jones, VP of product management at Stellar Cyber.
Read More
Open XDR and the Future of Cybersecurity

Open XDR and the Future of Cybersecurity

When “X” means everything. Aimei Wei is the Founder and VP of Engineering at Stellar Cyber. She has over 20+ years of experience building successful products and leading teams in data networking and telecommunications. She has extensive working experience for both early stage startups including Nuera, SS8 Networks and Kineto Wireless as well as well-established companies like Nortel, Ciena and Cisco. Prior to founding Stellar Cyber, she was actively developing Software Defined Networks solutions at Cisco.
Read More
Can XDR Solve Ransomware? – Maurice Stebila

Can XDR Solve Ransomware? – Maurice Stebila

Every day brings news of more breaches and ransomware attacks. Why are organizations failing to protect themselves, and what can we do to combat these cybersecurity threats? Technological advances, such as XDR and AI-driven threat monitoring, offer a way to thwart attackers in an ever-evolving security landscape.
Read More
XDR Demands a New Approach to Security—and Business

XDR Demands a New Approach to Security—and Business

Everybody wants to rule the world, at least according to that Tears for Fears song a few decades back. This principle certainly holds true in the cybersecurity market. With extended detection and response (XDR) and the newer advancement of Open XDR becoming quickly becoming recognized as an important approach to stem the tide of increasing attacks, this business question is actually quite important.
Read More
Aimei Wei of Stellar Cyber: “Mentor people and help them to grow”

Aimei Wei of Stellar Cyber: “Mentor people and help them to grow”

Mentor people and help them to grow — when we hire people, we want to build a diverse team — different national origins, different races and sexes. It’s an amazing experience interacting with people and learning from them. We are all working toward the same vision, so everyone does their best to make the company successful. It’s partnership between our employees and our customers to make them successful. The cybersecurity industry has become so essential and exciting. What is coming around the corner? What are the concerns we should keep an eye out for? How does one succeed in the cybersecurity industry? As a part of this interview series called “Wisdom From The Women Leading Cybersecurity Industry”, we had the pleasure of interviewing Aimei Wei.
Read More
Open XDR vs. SIEM

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution- Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge.
Read More
Coeficiente Comunicaciones First Internet Service Provider in Mexico to Deploy Stellar Cyber Open XDR Platform

Coeficiente Comunicaciones First Internet Service Provider in Mexico to Deploy Stellar Cyber Open XDR Platform

Stellar Cyber, the leading security operations platform for MSSPs, announced today it has extended its market reach in Latin America by adding Coeficiente Comunicaciones, a leading Mexican internet service provider serving more than 30 major cities, to its rapidly-growing customer list. Through this relationship with Stellar Cyber, Coeficiente becomes the first ISP in Mexico with AI-powered cybersecurity protection embedded in its backbone.
Read More
Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be the ultimate security analytics platform. Still, many users feel they haven’t lived up to their promises. Now, extended detection and response (XDR) promises to be the ultimate platform. Should you adopt XDR? What does it mean for your SIEM? Security information and event management (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is extended detection and response. What are its advantages, and should it coexist with or replace a SIEM? This article explores the current cybersecurity landscape, how SIEM fits into that landscape, and how XDR platforms can significantly improve security incident visibility, analysis and response.
Read More
What the Heck Is Open XDR?

What the Heck Is Open XDR?

The technology industry loves its buzzwords, but “open” may be the most overused and abused. Depending on who you are talking to, open may mean anything from fully open source to API integrations, and the latest in a very long list of verbiage offenders is extended detection and response (XDR). XDR vendors have recently glommed on to the open label for their products and approaches, and none of their definitions of open XDR are the same.
Read More
Cyberthreats Go Sideways

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No one wants to get famous because of cyberattacks which can travel inside your network in tens or even hundreds of days without being noticed.
Read More
Stellar Cyber introduces central management functionality in its Open XDR platform

Stellar Cyber introduces central management functionality in its Open XDR platform

Stellar Cyber introduces the centralized management and visibility functionality in its Open XDR platform. This new capability, named Stellar Cyber Central, accompanies Stellar Cyber’s Command Center and enables users to see potential threats and consolidate user management at multiple sites from one single console under a single license, and without having to log into those sites individually – reducing complexity, improving performance, segmenting data to comply with GDPR or other privacy requirements, and reducing the time it takes to identify security incidents.
Read More
Wisdom From The Women Leading The Cybersecurity Industry, With Aimei Wei of Stellar Cyber

Wisdom From The Women Leading The Cybersecurity Industry, With Aimei Wei of Stellar Cyber

Mentor people and help them to grow — when we hire people, we want to build a diverse team — different national origins, different races and sexes. It’s an amazing experience interacting with people and learning from them. We are all working toward the same vision, so everyone does their best to make the company successful. It’s partnership between our employees and our customers to make them successful.
Read More
The Case for Open XDR

The Case for Open XDR

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each security analyst to communicate with other analysts to determine whether each tool’s individual detection (each of which, by itself, may look benign), can correlate with other detections from other tools to reveal a complex attack.
Read More
An industry expert focused on delivering maximum cyberattack protection to organizations: Stellar Cyber

An industry expert focused on delivering maximum cyberattack protection to organizations: Stellar Cyber

In the digital world we live in, businesses must never overlook the benefits of cybersecurity. Year upon year, the number of cyberattacks is reaching staggering rates across the globe. As the internet continues to promote economic growth, every business interaction has now started to use it as a platform. Along with the ever-growing opportunity, businesses have to now deal with concerns and risks around cybersecurity. Experts are advising businesses to make use of automated cybersecurity solutions to face the onslaughts from cyberattacks. Until recent times, businesses were heavily reliant on security systems that were solely focusing on creating a perimeter-based security infrastructure. However, a lot of things have changed now, and considering the power of automated security solutions, older security measures are no longer relevant.
Read More
Are TIPs Finally Converging With SIEMs?

Are TIPs Finally Converging With SIEMs?

When all vendors in a new product category use the same use case to explain their value, I become concerned. About 15 years ago, when bombs were a constant threat in many parts of the world, I heard multiple vendors of intelligent video surveillance explaining the same use case. The message was, “Say someone walks into a lobby/park/manufacturing plant carrying a briefcase/backpack. Then, they leave without it. Our smart surveillance system will alert you to that fact.” The value proposition was simple: fewer eyes-on-glass needed. Automated systems work 24/7. Save money, catch bad guys. Yet, I have never encountered a vendor who could cite a successful, real-life situation where the use case was proven. It was hypothetical, although it would have been very useful during the hours before the 2013 Boston Marathon.
Read More
Stellar Cyber Open XDR Security Platform Gains Threat Intelligence Capabilities

Stellar Cyber Open XDR Security Platform Gains Threat Intelligence Capabilities

Stellar Cyber has integrated its Threat Intelligence Platform (TIP) into its Open XDR platform, according to a prepared statement. In doing so, Open XDR eliminates the need for Stellar Cyber customers to subscribe to and manage third-party threat intelligence feeds. Open XDR users can leverage TIP to automatically collect and aggregate feeds from multiple sources into a single consolidated threat intelligence resource. This enhances Open XDR’s threat detection, investigation, hunting and response capabilities.
Read More
Stellar Cyber Feeds Third-Party Threat Intel Into XDR

Stellar Cyber Feeds Third-Party Threat Intel Into XDR

Stellar Cyber integrated third-party threat intelligence feeds into its extended detection and response (XDR) platform, which the security vendor says means customers don’t have to subscribe to and manage third-party feeds. The move natively integrates Stellar Cyber’s Threat Intelligence Platform (TIP) with its Open XDR platform.
Read More
Three Wishes to Revitalize SIEM and Your SOC

Three Wishes to Revitalize SIEM and Your SOC

How many times have you hoped that a magic genie would somehow appear and grant three wishes? If the wishes were for your SIEM or security operations team, what would that be (and what kind of security certifications would you require of your genie)? The most common wish I encounter is for a security team that delivers a new level of effectiveness. The other two wishes are usually greater efficiency—the idea of being able to do more with less—and being able to hire qualified and experienced candidates for positions that have remained unfilled for long periods of time. (Enterprising and budget-savvy CISOs may substitute one of these for wishing for an additional three wishes, if that is permissible.)
Read More
Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain vulnerable Enterprises are seeking to optimize their existing investments in critical WAF infrastructure in ways that further reduce risk, increase productivity, and accelerate response times
Read More
Omdia Research Spotlight: XDR

Omdia Research Spotlight: XDR

Few emerging cybersecurity market segments are garnering more attention than XDR. Here, Omdia highlights its recent research on XDR. Extended Detection and Response (XDR) technology is quickly taking the enterprise cybersecurity industry by storm. The term XDR, first coined in 2018 by Omdia Principal Analyst Rik Turner, is defined by Omdia as a single, stand-alone solution that offers integrated threat detection and response capabilities.
Read More
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain

Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain

The Cyber Kill Chain and MITRE ATT&CK are popular reference frameworks to analyze breaches, but amid the rise of XDR, we may need a new one. If you work in information security, you will be aware of Lockheed Martin's Cyber Kill Chain and/or the MITRE ATT&CK Framework. Both are attempts to create a common language in which to describe the various stages of an attack, and the tactics utilized by the attackers.
Read More
SIEM and XDR Solutions: Key Questions MSSPs Should Ask

SIEM and XDR Solutions: Key Questions MSSPs Should Ask

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, one would ideally like to collect as much data as possible and store it as long as needed. But having a SIEM or XDR system that sucks up every packet or every log entry creates an ongoing demand for more storage, which can be expensive over the long term whether you’re using on-site resources or the cloud. Another issue is that searches or queries on huge volume of data can take a long time when a quick response may be critical for stopping an attack.
Read More
Stellar Cyber Open XDR platform stores metadata and offers flexible storage options

Stellar Cyber Open XDR platform stores metadata and offers flexible storage options

Stellar Cyber announced that its open and highly flexible approach to the long-term storage of large volumes of security data eases concerns about storage complexity and costs seen in legacy SIEMs or some proprietary XDR solutions used by security operations centers. Cybersecurity is essentially a data problem, with best practices necessitating capturing and retaining all available data to properly evaluate potential threats and keep an audit trail for future investigations.
Read More
The Best Network Protection: Go Deep or Go Broad?

The Best Network Protection: Go Deep or Go Broad?

Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their security solutions. Mostly, the choice varies between predominantly one or the other. Going deep typically means careful monitoring and analysis of certain types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that are broader may lack the clarity and fidelity to make fast, accurate alerting. They also may miss important indicators.
Read More
The Women Who Shaped the Tech World

The Women Who Shaped the Tech World

Technology has always been - and continues to be – a field dominated by men. However, women have always played a crucial role in tech. The stories of some of these pioneers and current leaders have only recently gained widespread attention. But if women are half of the population why does their tech representation fail to reflect this? The problems that women in tech face can explain a lot of the disparities in not just representation, but pay and other issues. We assembled a panel of current tech leaders to discuss the history of women in tech, and the path forward.
Read More
Futility or Fruition? Rethinking Common Approaches To Cybersecurity

Futility or Fruition? Rethinking Common Approaches To Cybersecurity

The recently disclosed breach of FireEye should give everyone pause over both the importance and difficulty of security. This high-profile breach left the vendor with a black eye and some serious questions. The disclosure almost immediately had every security vendor writing blogs and articles about the importance of this or that in accordance to what they sell and market. Opportunity strikes!
Read More
The Realities of Extended Detection and Response (XDR) Technology

The Realities of Extended Detection and Response (XDR) Technology

While the term XDR has become pervasive, the technology and market remain a work in progress with lots of innovation and market confusion. Given all the hype around extended detection and response (XDR) technology, it's worth starting this article by defining the term "XDR." XDR is an integrated suite of security products spanning hybrid IT architectures (such as LAN, WAN, infrastructure-as-a-service, data centers, etc.) designed to interoperate and coordinate on threat prevention, detection, and response. XDR unifies control points, security telemetry, analytics, and operations into one enterprise system.
Read More
SolarWinds SUNBURST Backdoor DGA And Infected Domain Analysis

SolarWinds SUNBURST Backdoor DGA And Infected Domain Analysis

On December 13, 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised SolarWinds, and trojanized SolarWinds Orion business software updates in order to distribute backdoor malware called SUNBURST. Because of the popularity of SolarWinds, the attacks have affected multiple government agencies and many Fortune 500 companies. It also appeared in the recent CISA Emergency Directive 20-01.
Read More
Myth Buster: Data Fatigue is Not Real

Myth Buster: Data Fatigue is Not Real

The noise is real. Of that, we can agree. It started way back in history – whoops, wrong topic (shout out to all of you who know that lyric). Basic packet captures – the final arbiter of proof, started all this and has continued nonstop until this very day. Every security analyst worth his/her salt asks for the packet captures. Why do we have all this data? Do we need it all? With IOT today, my toaster can tell me how many toast points I have burned since 2019. Do we care? Should we care? To be honest, I’m not sure I want folks to know I struggle getting my toast just right :).
Read More
Stellar Cyber Wins TMC Cybersecurity Excellence Award

Stellar Cyber Wins TMC Cybersecurity Excellence Award

Stellar Cyber, the only intelligent next-gen security operations platform powered by Open XDR, announced today that it has won an Internet Telephony Cybersecurity Excellence Award. Any company running a network could be a target for a hacker to try to produce Ransomware, get free service, gather other people’s information or cause irreparable disruption to the target company. Small and mid-sized security teams, in particular, struggle to assemble the right tools to give them insight into these complex attacks, but AI and machine learning technology can make a big difference.
Read More
ANALYSIS: Intelligent Next Generation Security Operations Platform – Stellar Cyber

ANALYSIS: Intelligent Next Generation Security Operations Platform – Stellar Cyber

I’ll begin by making a bold statement: Stellar Cyber is a beast. For you who may be thinking, “he’s about to demolish this product”, I’m sorry to disappoint you. Today’s enterprises are beasts. Combinations of centralized, distributed private cloud and public cloud networks, and the cybercriminals who attack them are even bigger beasts and it takes one to manage one.
Read More
Is The Intelligent SOC A Smart Idea?

Is The Intelligent SOC A Smart Idea?

Albert Zhichun Li, Ph.D., is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. Much has been touted about the intelligent SOC, particularly from security vendors hawking their latest wares. It's a familiar high-tech chorus, the idea of next-generation products and their next-generation capabilities that will eventually be supplanted by a generation beyond that. Reactions vary to the idea of an intelligent SOC. There is some level of taking offense by hardworking security professionals currently staffing a SOC. "Wait a minute, are you telling me that our SOC is not intelligent?"
Read More
Interview With Changming Liu – Stellar Cyber

Interview With Changming Liu – Stellar Cyber

Changming Liu, CEO and Co-Founder of Stellar Cyber, did us the honor of sitting down for an interview with Aviva Zacks of Safety Detectives. He told her how his company is riding the XDR wave. Safety Detectives: What motivated you to start Stellar Cyber?
Read More
MSSP – Build or Partner

MSSP – Build or Partner

If you are wanting to accelerate your steps towards offering managed security, you have a few options, including build or partner. Today’s episode discusses some of the pros and cons of both the build and partner methods. MSP Zone Guest: Brian Stoner, Stellar Cyber Program Highlights What are some of the common MSSP challenges? Should MSPs build or partner? Has Work From Home disrupted the legacy managed security deliverable? What is a SOC? Is it just a NOC with a SIEM?
Read More
What Is Network Security In 2021?

What Is Network Security In 2021?

The historical definition of network security is to use a firewall to screen users coming into the network, but as IT technology and security technology have evolved, the definition is much broader now. Today, network security is everything a company does to ensure the security of its networks and everything connected to them. This includes the network, the cloud (or clouds), endpoints, servers, users and applications
Read More
The Third Wave in Cybersecurity

The Third Wave in Cybersecurity

On the surface, having lots of data becomes less of a problem with AI-driven security, as ML usually requires lots of data to train the model and learn the patterns. On the contrary, not enough data is obviously a problem as the less data, the less accurate and thus the less useful the ML model becomes. However, as time went by, researchers gradually realized that having the right data was far more important. Too much data without the right information is just a waste of computing power for ML as well as a waste of storage space. Earlier UEBA vendors with solutions based on logs from SIEM tools learned this hard lesson: the SIEM might have collected lots of logs, but only a few of them contain the right information related to user behaviors. So, although data-driven security builds a great foundation for AI-driven security, in order to build scalable and accurate AI-driven security, the right data is far more important.
Read More
XDR Platform Provider Stellar Cyber Launches MSSP Partner Program

XDR Platform Provider Stellar Cyber Launches MSSP Partner Program

Stellar Cyber unveils Jumpstart, a partner program that enables MSSPs to integrate its Open XDR extended detection & response platform into their portfolios. Stellar Cyber, an extended detection and response (XDR) platform provider, has unveiled the Jumpstart partner program for MSSPs. The partner program launch comes after Stellar Cyber earlier this year hired Cylance veteran Brian Stoner as its VP of service providers and raised $7.1 million in an expanded Series A financing round.
Read More
How MSSPs Differentiate. Flexible Solutions. Brian Stoner,VP of Service Providers at Stellar Cyber

How MSSPs Differentiate. Flexible Solutions. Brian Stoner,VP of Service Providers at Stellar Cyber

Brian Stoner is a high-impact channel expert and thought leader with extensive experience working with all channels but more specifically MSP and MSSP partners. Before joining Stellar Cyber he has over 15 years of cybersecurity experience with high growth start-ups like FireEye and Cylance where he led the service provider programs. He was also the Vice President of Business Development for Solutionary – one of the top MSSP partners that was acquired by NTT. Brian has several articles that have been published regarding cybersecurity and the channel. He has an MBA with Distinction from Keller Graduate School and a bachelor’s degree from Southern Illinois University – Carbondale. Learn more about Stellar Cyber at stellarcyber.ai/
Read More
Why XDR (Extended Detection and Response)

Why XDR (Extended Detection and Response)

Historically, security buyers evaluated products on an individual basis in which firewall vendor A would have a bakeoff against firewall vendor B, and endpoint detection and response (EDR) vendor C would be compared to EDR vendor D. Conceptually, this might make sense, because having “best of breed” everywhere should offer the best protection.
Read More
A Return to Logs to Unjam the Security Deficit

A Return to Logs to Unjam the Security Deficit

Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was that by gathering logs from networking and security devices and running them through the SIEM, security events could be astutely exposed and security teams could gain an upper hand over attackers. The enthusiasm was soon dashed when it was obvious that logs alone were not the answer. In the first place, not everything was covered by logs and security details that were being captured could be manipulated easily as an attacker attempted to cover their tracks. Second, it’s one thing to aggregate logs but another to integrate the findings to produce true intelligence, particularly that which could easily stand apart from false positives.
Read More
Security Success Is Based On Operational Efficiency

Security Success Is Based On Operational Efficiency

When most people think about cybersecurity, they think about security products, such as firewalls, virtual private networks (VPNs), anti-malware and endpoint solutions. Maybe a security information and event management (SIEM) solution comes up or the advanced means of finding internal attackers or potential breaches. Sometimes, policies and end-user training also come into consideration or even the (overworked) security team.
Read More
MDR Provider Deeptree Announces Stellar Cyber Integration

MDR Provider Deeptree Announces Stellar Cyber Integration

Managed detection & response (MDR) provider Deeptree adds Stellar Cyber security operations capabilities (SOC) to deliver end-to-end protection against cyberattacks. MSSP Deeptree has integrated Stellar Cyber security operations capabilities into its managed detection and response (MDR) platform. The Stellar Cyber integration will provide the foundation for Deeptree’s next-generation security operations center (SOC), the companies said.
Read More
2021 Prediction: Open XDR Goes Mainstream

2021 Prediction: Open XDR Goes Mainstream

The cybersecurity world loves acronyms, and XDR is among the newest ones going around. XDR, or eXtended Detection and Response, is a foundational technology that detects cyberattacks anywhere they may occur - on endpoints, in servers, in applications, by users, in the network, or in cloud or SaaS environments.
Read More
Stellar Cyber Joins CxO InSyte as Founding Member to Fight Threats

Stellar Cyber Joins CxO InSyte as Founding Member to Fight Threats

Actively participates and contributes in trusted CXO community, forum and solutions intelligence to combat the most sophisticated cyber attacks Stellar Cyber, the only cohesive intelligent security platform that provides maximum protection by piecing attacks together across the entire IT infrastructure, announced today that it has joined, as a founding member, CxO InSyte,
Read More
REVEZ Corporation Sees Strong Demand For Stellar Cyber, The World’s First Open XDR Cybersecurity Platform, In Asia-Pacific

REVEZ Corporation Sees Strong Demand For Stellar Cyber, The World’s First Open XDR Cybersecurity Platform, In Asia-Pacific

High-Fidelity Next-Generation SOC Solution that Finds Active Attacks and Boosts Security Team Effectiveness is Major Draw for Customers
Read More
Prevent data breaches successfully with Stellar Cyber’s futuristic solutions

Prevent data breaches successfully with Stellar Cyber’s futuristic solutions

Executives consider cyberattacks as one of the topmost business concerns, and it outranks other adversaries like brand damage, regulations, and economic uncertainty. In the prevailing cyber landscape, cyberattacks are considered to be inevitable, but security analysts suggest that these attacks can be largely prevented if the companies choose to implement robust security measures. By having a sophisticated security measure in place, we can reduce the chances of someone walking away with the company’s sensitive data.
Read More
Stellar Cyber: A New View of Cybersecurity says, Changming Liu

Stellar Cyber: A New View of Cybersecurity says, Changming Liu

First of all, how are you and your family doing in these COVID-19 times? Changming Liu: We are doing fine. Tell us about you, your career, how you founded Stellar Cyber Changming Liu: I have a wealth of leadership, entrepreneurship, management skills, and technical expertise in networking, security, big data, and machine learning. Before co-founding Stellar Cyber, I was a co-founder, CTO, and Board Member at Aerohive Networks, a cloud networking provider that successfully completed an IPO in 2014.
Read More
Stellar Cyber’s new toolkit helps security teams test their solutions to verify their cybersecurity effectiveness

Stellar Cyber’s new toolkit helps security teams test their solutions to verify their cybersecurity effectiveness

Stellar Cyber announced a new toolkit customers can use to verify the platform’s functionality by launching a wide variety of cyberattacks against it. The Red Team toolkit is an offensive attack generator that ‘red team’ (offensive) security analysts can use to test the Stellar Cyber Open-XDR platform’s ability to defend against the latest attacks.
Read More
Stellar Cyber Launches Red Team Toolkit for NDR, Other Detections

Stellar Cyber Launches Red Team Toolkit for NDR, Other Detections

Toolkit adds Cyberattack Generator to help security analysts verify effectiveness of EDR, SIEM and thwart attacks over the entire cyber kill chain Stellar Cyber, the innovator of Open XDR, the only cohesive intelligent security platform that delivers maximum protection, today announced a new toolkit customers can use to verify the platform’s functionality by launching a wide variety of cyberattacks against it.
Read More
What SIEMs Are Saying About SOCs

What SIEMs Are Saying About SOCs

With more complex cyberattacks on the rise, and with COVID-19 adding additional challenges to protecting the enterprise, is the SIEM the go-forward core of a next-gen security operations center (SOC), or is it time to consider new ideas? We discuss daily the cybersecurity challenges with global thought leaders, but we wanted to get better insights into this challenge question to better understand the market. To that end, we contracted LeadtoMarket to perform a study with customers who have industry-leading SIEM platforms, to understand what is needed for customers to rethink their SOC practices and to consider a means to radically reduce costs and dramatically improve performance by reducing the complexity of day-to-day cybersecurity operations.
Read More
Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber

Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber

Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber - SoundCloud
Read More
30 Most Innovative companies to Watch

30 Most Innovative companies to Watch

Stellar Cyber: Our comprehensive security platform provides maximum protection of applications and data wherever they resideIn today’s online age, the number of threats to businesses and their customers increases every day. The largest obstacle in cybersecurity is the perpetual security risk that quickly evolves over short periods of time, leaving businesses with a widening gap in manpower and the resources needed to protect their data. In the past decades, Stellar Cyber has witnessed some significant advances in the detection and management of various cybersecurity threats, but in today’s fast-paced IT world, a new problem has arisen in the world of cybersecurity: companies are often drowning in too much information from too many tools, each of which has its own solution with its own management console.
Read More
10 Best Cyber Security Companies 2020

10 Best Cyber Security Companies 2020

Stellar Cyber: The only comprehensive security platform providing maximum protection of applications and data wherever they reside Every company with an online presence is subject to cyberattacks, and the challenge is to mitigate those attacks by spotting and correcting them as quickly as possible. We present to you Stellar Cyber whose top security infrastructure data collection, analysis and automated anywhere detection and response (XDR) mechanisms elevate productivity and strengthen security analysts to eliminate threats in a few minutes instead of days or weeks.
Read More
The precision of security undermined by a failure to correlate

The precision of security undermined by a failure to correlate

If Paul Newman’s Cool Hand Luke character were to address the security industry, his opening line would likely be: “What we have here is a failure to correlate.” Today, one of the major deficiencies affecting security is not a lack of data or even an aggregation of data, but the central problem is one of correlating data and connecting the dots to find otherwise hidden traces of attack activity.
Read More
Now Tech: Security Analytics Platforms, Q3 2020

Now Tech: Security Analytics Platforms, Q3 2020

You can use security analytics platforms to provide better visibility into your environments, detect threats and support investigations, and orchestrate a response across the environment. But to realize these benefits, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use this report to understand the value they can expect from a security analytics provider and to select one based on size and functionality.
Read More
Stellar Cyber’s Aimei Wei Named One Of The Top 100 Women In Cybersecurity For 2020

Stellar Cyber’s Aimei Wei Named One Of The Top 100 Women In Cybersecurity For 2020

During Black Hat USA 2020, Stellar Cyber Founder Aimei Wei Named a Top 100 Winner in this Prestigious Awards Category Exclusively for Women in Cybersecurity. Stellar Cyber, the only cohesive security AI/ML platform that delivers maximum protection today announced that its Founder and SVP Engineering Aimei Wei has been named a Top 100 Women in Cybersecurity for 2020 by Cyber Defense Magazine, the leading cybersecurity publication in the industry.
Read More
Can Machine Learning For Enterprise Security Advance Like Voice Recognition?

Can Machine Learning For Enterprise Security Advance Like Voice Recognition?

Albert Zhichun Li, Ph.D., is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. Not long ago, the state of voice recognition was quite primitive, and interacting with it was painful. Call management systems using voice recognition were fraught with errors, making it difficult to navigate to a desired destination or produce the correct result. But that was then, and this is now. Voice recognition has come a long way. It's now generally effortless and even enjoyable to ask things of Alexa, Siri or Google Assistant, and call systems work reasonably well. No one can deny the progress made in voice recognition.
Read More
Opportunities for women in the cybersecurity.

Opportunities for women in the cybersecurity.

Opportunities for women in the cybersecurity.
Read More
Why CEOs Are Getting Hacked, And What To About It

Why CEOs Are Getting Hacked, And What To About It

It’s neither data-driven nor AI-driven cybersecurity, which you might have heard before — it’s both and more, much more. It is correlation-driven cybersecurity. It is about correlations of many detections, from very basic like NGFW to very advanced like AI-based EDR, from various data sources in a single cohesive platform. We hear about many security challenges from prospects, customers and partners — why? Because it is part of what humans do — share pain! As you may or may not know, attackers have access to the same tools as we all do. They have access to both Big Data and AI technologies for more advanced attacks.
Read More
Intellectual Property Breaches Illustrate New Generation Of Security Threats

Intellectual Property Breaches Illustrate New Generation Of Security Threats

Albert Zhichun Li, Ph.D., is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. For many companies, a data breach has become almost a way of life and business as usual. Damages — from customer loyalty and reputation to financial penalties and damage to infrastructure — while sizable, seemingly have not significantly impaired the largest enterprises.
Read More
Why There Are Silos And Gaps In SOCs… And What To Do About It

Why There Are Silos And Gaps In SOCs… And What To Do About It

The experts at Stellar Cyber asked their co-founder and CEO Changming Liu 7 questions about the cutting edge Open XDR Security Platform, which has gained a lot of industry attention and users.
Read More
Building A Cybersecurity Company And Lessons Learned From Being A Mom

Building A Cybersecurity Company And Lessons Learned From Being A Mom

Aimei Wei is a woman who loves to solve problems. That’s one reason she’s passionate about her role in cybersecurity. “Solving cybersecurity problems is challenging, but it’s also a fascinating industry and career,” said Wei, founder and VP of Engineering at Stellar Cyber, a provider of security solutions, software and analysis tools. “It’s like you are a detective.”
Read More
CyFlare deploys the Stellar Cyber platform as the core of its SOC service

CyFlare deploys the Stellar Cyber platform as the core of its SOC service

Stellar Cyber announced that CyFlare has deployed the Stellar Cyber platform as the core of its Security Operations Center (SOC) service. While many MSSPs cobble together complete solutions from a dozen or more different products and then have trouble correlating detections to stop complex attacks, Stellar Cyber’s platform is a complete solution with more than 20 natively-supported applications that present detections in an intuitive dashboard.
Read More
MSSP CyFlare Partners with Stellar Cyber, Deploys SOCaaS

MSSP CyFlare Partners with Stellar Cyber, Deploys SOCaaS

CyFlare, a Top 200 MSSP, has unveiled a security operations center-as-a-service (SOCaaS) offering powered by the Stellar Cyber Open-XDR cybersecurity platform, according to a prepared statement. The news comes after Stellar Cyber raised $7.1 million in an expanded Series A financing round earlier this year.
Read More
Defend your enterprise from cyber threat and mitigate risks: Stellar Cyber

Defend your enterprise from cyber threat and mitigate risks: Stellar Cyber

“Application-based, intelligent and open platform, Starlight is the first automated detection and response Open-XDR security platform.”
Read More
5 Best Security Companies to watch 2020

5 Best Security Companies to watch 2020

METCloud is an award winning IT Managed Service Provider. It has been built around the highest level of cyber security technologies available. It tailors its innovative services to specifically align with your organisation’s requirements, ensuring METCloud is the only cloud platform you need.
Read More
Stellar Cyber adds cloud detection and response to its XDR offering

Stellar Cyber adds cloud detection and response to its XDR offering

Stellar Cyber, a provider of threat detection and response technology spanning multiple domains of enterprise infrastructure, has launched a capability for cloud environments to complement the endpoint and network dimensions already addressed by its Starlight platform. It calls it cloud detection and response (CDR), a term Omdia has championed for a while. XDR covers endpoint, network, and cloud The vendor refers to Starlight as an Open-XDR platform, adopting the parlance that Omdia coined in 2018, referring to a spectrum of detection and response technologies for endpoint (EDR), network (NDR), and other areas, eventually including cloud. NDR is sometimes referred to as network traffic analysis (NTA), but Omdia sees the latter as a subset of NDR, in that traffic analysis is necessary to detect threats, but NDR adds the critically important response capability that enables organizations to also mitigate threats. NTA was developed earlier for the purpose of network performance monitoring rather than as a security function. Indeed, a number of NTA vendors, such as Gigamon, Netscout, and ExtraHop, have expanded into NDR in recent years, to align with the direction of the security market and expand their target audience from network operations to security teams.
Read More
Meet Stellar Cyber and the Open-XDR Security Platform

Meet Stellar Cyber and the Open-XDR Security Platform

Cybercrime - Meet Stellar Cyber and the Open-XDR Security Platform - Listen the Audio
Read More
Stellar Cyber Debuts Cloud Detection & Response App

Stellar Cyber Debuts Cloud Detection & Response App

Security provider Stellar Cyber, with the first Open-XDR security platform, announced today that it has released its Cloud Detection & Response (CDR) App, the latest addition to the native-supported family of applications on its platform. The CDR App secures SaaS apps and protects public cloud infrastructure with automated attack detection, both manual and automated threat hunting, pre-built compliance reports, manual and automated response and many other features.
Read More
Moving From Passive To Aggressive In Stopping Network Attackers

Moving From Passive To Aggressive In Stopping Network Attackers

One of the unfortunate realities of network security is that it is largely reactive. To be fair, organizations are adept at testing and ensuring that the known holes or vulnerabilities are shored up and systems and devices are kept current and optimized to prevent against a successful attack.
Read More
10 Most Influential Companies of the Year 2020

10 Most Influential Companies of the Year 2020

Stellar Cyber - Changming Liu, CEO. Stellar Cyber is the key definitive cyber security guide to help deal with the never-ending, always-looming cyber threats in the digitized world. The Starlight platform from the company rounds up all the different datasets and brings all the cyber security analysis into one mighty management console.
Read More
Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks

Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks

Online threats are diverse, and while searching for a target, they don’t discriminate between organizations and individuals. Cyber threats range from network infiltrations and data breaches through spear-phishing and brute force. Cybersecurity is the implementation of technology, processes, and controls to protect the systems, networks, services, devices, and data from cyberattacks. It aims at reducing the risk of cyberattacks and protecting against the unauthorized systems, networks, and technology exploitation.
Read More
The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside

The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside

In recent times, the organizations are digital by default, and it is becoming difficult for them to map their digital surrounding. The technology infrastructure of every organization is custom-made, and it is complicated. There is no reward without risk. Digital businesses make use of connected devices, new technologies, and operating platforms. They also embrace new ways of working, building large data storage, and so on.
Read More
Large Organizations Are Not Immune To Ransomware Attacks

Large Organizations Are Not Immune To Ransomware Attacks

In the past, this malware gained entry using different techniques: exploit kits via drive-by downloads, remote desktop connections (RDP) with weak passwords, email impersonation, and email spam. In the majority of cases where the phishing email is being delivered, the user is clicking on the link, then they give the macro authorization to run, and ultimately get the malicious file installed. Once installed, the Maze ransomware begins to encrypt critical data on the infected machine. While the encryption process is running, the ransomware also ex-filtrates the data to a server on the internet. When both of those processes are complete, the user is presented with a ransom demand and a method to recover their encrypted data.
Read More
Why Threat Hunting with XDR Matters

Why Threat Hunting with XDR Matters

Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
Read More
Stella Cyber locks in Series A

Stella Cyber locks in Series A

Silicon Valley-based Stellar Cyber, a security provider, has raised $7.1 million in additional funding, bringing its total Series A tally to $21.8 million.
Read More
Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels

Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels

Security provider Stellar Cyber, with the first Open-XDR security platform, announced the latest addition to its Starlight platform’s built-in App Store, a new Entity Behavior Analytics app.
Read More
Why Security Platforms Took Center Stage at RSA 2020

Why Security Platforms Took Center Stage at RSA 2020

The world’s largest security conference, RSA, came and went earlier this month at its normal home in the Moscone Center in San Francisco. There was some speculation the show might be canceled due to Verizon, AT&T and IBM pulling out, but the show went on with more than 40,000 people, myself included, coming to learn what’s new in the world of cyber security.
Read More
Ransomware’s Dark Future

Ransomware’s Dark Future

With each new year comes the inevitable flood of articles touting predictions. In the case of ransomware, predictions started to show up by mid-2019. The consensus? Ransomware is going to get worse. Most see ransomware attacks becoming more prevalent and damaging. More entities will be hit more frequently. There are many points to support such theories.
Read More
Podcast: Solutions to Security Burnout and Overload

Podcast: Solutions to Security Burnout and Overload

Security staff burnout and overload is a continuing dangerous situation. Security staff cannot look at all the alerts discovering 50% false positives. Security staff sometimes turns off alerts to alleviate alert fatigue. More data does not mean better security, only more work. The mean time to identify and mean time to resolution of security issues is getting longer.
Read More
ITExpo Panel on AI & Cybersecurity

ITExpo Panel on AI & Cybersecurity

I was fortunate to have been asked by the folks at TMC to moderate this interesting panel at the ITExpo Conference in Ft. Lauderdale last week. The session includes comments on the state of AI and ML in Security as well as what should be done to make threat protection and employee policies more rigorous. Security is a continual process not an event you check off and say you’ve done.
Read More
As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity

As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity

It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures. By Arti LoftusFebruary 21, 2020 It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures.
Read More
Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies

Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies

Security provider Stellar Cyber, with the first Open-XDR platform, announced its new Firewall Traffic Analysis (FTA) Application, which supercharges firewalls by analyzing their data to spot undetected anomalies.
Read More
CHECK POINT, STELLAR CYBER TARGET ML FOR CYBERSECURITY

CHECK POINT, STELLAR CYBER TARGET ML FOR CYBERSECURITY

Startup Stellar Cyber has teamed with Check Point Software Technologies (NASDAQ: CHKP) in a move that demonstrates a strong market trend toward API-fueled alliances in cybersecurity as well as other cloud-enabled functions.
Read More
Stellar Cyber adds a User Behavior Analytics App to its Security App Store

Stellar Cyber adds a User Behavior Analytics App to its Security App Store

Security provider Stellar Cyber, with the first Open-XDR security platform, added a User Behavior Analytics (UBA) App to its Security App Store, making it much easier to track threats by specific users.
Read More
Stellar Cyber Provides Maximum Protection Of Applications And Data Wherever They Reside

Stellar Cyber Provides Maximum Protection Of Applications And Data Wherever They Reside

Stellar Cyber makes Starlight, the first open detection/response (Open-XDR) cybersecurity platform, connecting dots across security infrastructure and automatically responding to attacks wherever they occur.
Read More
Stellar Cyber Leverages App Store Thinking With New Threat-Hunting App Library

Stellar Cyber Leverages App Store Thinking With New Threat-Hunting App Library

Security provider Stellar Cyber, with the first Open-XDR security platform, today announced its new Threat-Hunting App Library, which eliminates an analyst's need to use custom queries in order to search for cyber threats or create custom widgets and dashboards to make sense of the data under investigation.
Read More
A brief history of machine learning in cybersecurity

A brief history of machine learning in cybersecurity

As the volume of cyberattacks grows, security analysts have become overwhelmed. To address this issue, developers are showing more interest in using Machine Learning (ML) to automate threat-hunting. In fact, researchers have tried to implement ML in cybersecurity solutions since the late 1980s, but progress has been slow. Today, ML is showing increasing promise with the advent of Big Data because the quality of information from which ML can learn is improving. However, there is much more to be done.
Read More
Stellar Cyber adds a new “Data Streaming” Application to its Starlight platform

Stellar Cyber adds a new “Data Streaming” Application to its Starlight platform

Security provider Stellar Cyber, with the first Open-XDR security application platform, announced that it has added a new “Data Streaming” Application to its Starlight platform.
Read More
A Platform to Support XDR

A Platform to Support XDR

Let’s start with some conditionals: First, if you focus on indicators, then detection and response can be preventive (think about it). Second, if you substitute enterprise systems and devices for endpoints, then EDR evolves to XDR (AKA anything-DR). And third, if you have a great security platform, then managed service providers can become managed security service providers. These conditionals effectively introduce Stellar Cyber.
Read More
Black Hat 2019 – User Friendly

Black Hat 2019 – User Friendly

Join us for Stellar Cyber coverage starting at 17:45 seconds, recorded live from the floor of Black Hat 2019 in Las Vegas. This annual cyber security conference covers the aspects of information security. We feature interviews from DHS to the actual hackers themselves. William SIkkens, Jeremy and Gretchen Winkler, Chaz Wellington
Read More
Splunk Killers Unite, but Will These Next-Gen SIEMs Win?

Splunk Killers Unite, but Will These Next-Gen SIEMs Win?

There’s a new brand of security information and event management (SIEM) startups that are making moves — and gunning for incumbents including Splunk and IBM. Three in particular, Exabeam, Chronicle, and Stellar Cyber, announced significant deals and product news this past week aimed at displacing the old guard and pulling a bigger piece of the lucrative $124 billion market.
Read More
Stellar Cyber launches Starlight 3.1 for AI threat detection

Stellar Cyber launches Starlight 3.1 for AI threat detection

Stellar Cyber, a security analytics vendor, launched Starlight 3.1 as its first unified security analytics platform, using AI and machine learning to detect and thwart attacks.
Read More
Automation: Moving Security from Human to Machine Speed, and All its Implications

Automation: Moving Security from Human to Machine Speed, and All its Implications

Shifting Security from Human to Machine Speed The process of automation to move security from human to machine speed is the next frontier in cybersecurity. “Skills shortages, technical complexity and the threat landscape will continue to drive the move to automation and outsourcing,” marketing research firm Gartner says.
Read More
Artificial Intelligence & the Security Market

Artificial Intelligence & the Security Market

Starlight is intended to augment the expertise and activity of human security staff, Senzing Software "hunts for bad guys" in ways that are essentially impossible for humans to duplicate.
Read More
A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection

A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection

A solution that not only has network data but server data, user data, and application data will be better prepared to find breach events because the dataset is more complete.
Read More
AI compensates for the shortage of security personnel Reduce load by scrutinizing mass alerts-Jaze Communication

AI compensates for the shortage of security personnel Reduce load by scrutinizing mass alerts-Jaze Communication

Jaz Communications has begun to use Starlight, a security solution developed by Silicon Valley based CEO Stella Cyber ​​(Chanmin Liu). The solution uses AI technology to detect network anomalies and security breaches.
Read More
The Cybersecurity Talent Gap = an Industry Crisis

The Cybersecurity Talent Gap = an Industry Crisis

A war is raging for cybersecurity talent. Both the government and the private sector are scrambling for talent. Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. By one estimate, there will be 3.5 million unfilled cybersecurity jobs by 2021. Author: Dave Barton is Chief Information Security Officer, Stellar Cyber.
Read More
Stellar Cyber with John Peterson, Chief Product Officer

Stellar Cyber with John Peterson, Chief Product Officer

On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber (stellarcyber.ai) an innovative cyber security company using artificial intelligence (AI) and machine learning (ML) to empower SMBs (small and medium sized businesses) to gain access to the same types of advanced security tools that Fortune 500 companies do. John discusses how the founders of Stellar Cyber (formerly named Aella Della) got their start and how their security platform provides a unique approach via their customers' MSSPs (managed security service providers) and their SOCs (security operation centers). John discusses the struggle of any company to managed all of the cyber security tools they use due to resource and budget constraints.
Read More
John Peterson talks future of cybersecurity at businesses

John Peterson talks future of cybersecurity at businesses

CGTN's Mark Niu spoke to John Peterson, chief product officer at Aella Data, about the growing market of information security.
Read More
RSA cybersecurity conference discusses looming threats and how to fight them

RSA cybersecurity conference discusses looming threats and how to fight them

As attacks become more sophisticated and frequent, the startup Stellar Cyber is fighting back with artificial intelligence and machine learning.
Read More
‘7 Minutes’ with Stellar Cyber VP Jared Hufferd

‘7 Minutes’ with Stellar Cyber VP Jared Hufferd

Security analytics provider Stellar Cyber recently closed $13.2 million in series A funding and soon will launch Starlight 3.0, a data-and artificial intelligence (AI)-driven platform for pervasive data collection, breach detection, investigation and response.
Read More
Artificial Intelligence & the Security Market

Artificial Intelligence & the Security Market

Stellar Cyber came out of stealth mode just before this year's RSA Conference. The company's product, Starlight, is billed as a virtual security analyst able to perform a breach detection across massive networks. This week, the company added multi-tenancy to the product in Starlight 2.0
Read More
Hottest cybersecurity products at RSA 2018

Hottest cybersecurity products at RSA 2018

The RSA Conference has become a key venue for cybersecurity vendors to announce new products. Here are a few of the most interesting new tools being shown there. Starlight Key features: Stellar Cyber reckons its Starlight pervasive breach detection system can detect a breach within minutes, rather than days.
Read More
Stellar Cyber Unveils Breach Detection System for  MSSPs, and Vars

Stellar Cyber Unveils Breach Detection System for MSSPs, and Vars

Stellar Cyber, which provides artificial intelligence-based cybersecurity solutions for MSSPs and VARs, has introduced the Starlight pervasive breach detection system (PBDS). Starlight unifies collected data and conducts advanced analysis across network infrastructure, according to a prepared statement. It uses advanced machine learning to provide high-fidelity alerts and integrates with existing perimeter defense, security information and event management (SIEM) and traditional cybersecurity solutions.
Read More
Stellar Cyber Emerges From Stealth, Launches AI-Based Threat Detection

Stellar Cyber Emerges From Stealth, Launches AI-Based Threat Detection

Stellar Cyber, a security company founded by former Juniper Networks, Fortinet, Barracuda, and Aerohive executives, exited stealth mode with its artificial intelligence-based breach detection platform Starlight. The AI startup will officially launch at RSA Conference later this month. It competes against other cybersecurity startups using AI and machine-learning to automate threat detection and response such as Darktrace, Vectra Networks, ProtectWise, StackRox, and Jask.
Read More
Managed Security Services Provider (MSSP) News: 29 March 2018

Managed Security Services Provider (MSSP) News: 29 March 2018

Each morning MSSP Alert broadcasts a quick lineup of news, analysis and chatter from across the global managed security services provider, SOC (security operations center) and IT outsourcing ecosystem. Today's MSSP & cybersecurity news involves Stellar Cyber
Read More
Former Juniper, Cisco, Fortinet Execs Bring Cybersecurity Startup Out of Stealth

Former Juniper, Cisco, Fortinet Execs Bring Cybersecurity Startup Out of Stealth

A new cybersecurity startup founded by execs formerly with Juniper Networks, Fortinet, Barracuda Networks, Cisco and more, has exited stealth mode with the launch of a partner program and a new artificial-intelligence (AI)-driven pervasive breach detection system (PBDS). Stellar Cyber is backed by NetScreen co-founder Feng Deng and his venture firm, Northern Light Venture Capital, as well as various security industry veterans and investors. Its Starlight PBDS unifies collected data and conducts advanced analysis to deliver alerts designed to reduce detection time from months to minutes, and alerting volume from thousands to only a few.
Read More