Stellar Cyber's Press Coverage

Post Types

Meet Stellar Cyber and the Open-XDR Security Platform
Cybercrime Magazine

Meet Stellar Cyber and the Open-XDR Security Platform

Cybercrime - Meet Stellar Cyber and the Open-XDR Security Platform - Listen the Audio
Read More
Stellar Cyber Debuts Cloud Detection & Response App
MSP Insights

Stellar Cyber Debuts Cloud Detection & Response App

Security provider Stellar Cyber, with the first Open-XDR security platform, announced today that it has released its Cloud Detection & Response (CDR) App, the latest addition to the native-supported family of applications on its platform. The CDR App secures SaaS apps and protects public cloud infrastructure with automated attack detection, both manual and automated threat hunting, pre-built compliance reports, manual and automated response and many other features.
Read More
Moving From Passive To Aggressive In Stopping Network Attackers
Forbes

Moving From Passive To Aggressive In Stopping Network Attackers

One of the unfortunate realities of network security is that it is largely reactive. To be fair, organizations are adept at testing and ensuring that the known holes or vulnerabilities are shored up and systems and devices are kept current and optimized to prevent against a successful attack.
Read More
10 Most Influential Companies of the Year 2020
The CXO Fortune

10 Most Influential Companies of the Year 2020

Stellar Cyber - Changming Liu, CEO. Stellar Cyber is the key definitive cyber security guide to help deal with the never-ending, always-looming cyber threats in the digitized world. The Starlight platform from the company rounds up all the different datasets and brings all the cyber security analysis into one mighty management console.
Read More
Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks
The CEO Views

Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks

Online threats are diverse, and while searching for a target, they don’t discriminate between organizations and individuals. Cyber threats range from network infiltrations and data breaches through spear-phishing and brute force. Cybersecurity is the implementation of technology, processes, and controls to protect the systems, networks, services, devices, and data from cyberattacks. It aims at reducing the risk of cyberattacks and protecting against the unauthorized systems, networks, and technology exploitation.
Read More
The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside
The Silicon Review

The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside

In recent times, the organizations are digital by default, and it is becoming difficult for them to map their digital surrounding. The technology infrastructure of every organization is custom-made, and it is complicated. There is no reward without risk. Digital businesses make use of connected devices, new technologies, and operating platforms. They also embrace new ways of working, building large data storage, and so on.
Read More
Large Organizations Are Not Immune To Ransomware Attacks
Cybercrime Magazine

Large Organizations Are Not Immune To Ransomware Attacks

In the past, this malware gained entry using different techniques: exploit kits via drive-by downloads, remote desktop connections (RDP) with weak passwords, email impersonation, and email spam. In the majority of cases where the phishing email is being delivered, the user is clicking on the link, then they give the macro authorization to run, and ultimately get the malicious file installed. Once installed, the Maze ransomware begins to encrypt critical data on the infected machine. While the encryption process is running, the ransomware also ex-filtrates the data to a server on the internet. When both of those processes are complete, the user is presented with a ransom demand and a method to recover their encrypted data.
Read More
Why Threat Hunting with XDR Matters
DarkReading

Why Threat Hunting with XDR Matters

Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
Read More
Stella Cyber locks in Series A
Venture Capital Journal

Stella Cyber locks in Series A

Silicon Valley-based Stellar Cyber, a security provider, has raised $7.1 million in additional funding, bringing its total Series A tally to $21.8 million.
Read More
Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels
Help Net Security

Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels

Security provider Stellar Cyber, with the first Open-XDR security platform, announced the latest addition to its Starlight platform’s built-in App Store, a new Entity Behavior Analytics app.
Read More
Why Security Platforms Took Center Stage at RSA 2020
eWeek

Why Security Platforms Took Center Stage at RSA 2020

The world’s largest security conference, RSA, came and went earlier this month at its normal home in the Moscone Center in San Francisco. There was some speculation the show might be canceled due to Verizon, AT&T and IBM pulling out, but the show went on with more than 40,000 people, myself included, coming to learn what’s new in the world of cyber security.
Read More
Ransomware’s Dark Future
Forbes

Ransomware’s Dark Future

With each new year comes the inevitable flood of articles touting predictions. In the case of ransomware, predictions started to show up by mid-2019. The consensus? Ransomware is going to get worse. Most see ransomware attacks becoming more prevalent and damaging. More entities will be hit more frequently. There are many points to support such theories.
Read More
Podcast: Solutions to Security Burnout and Overload
Telecom Reseller Podcast

Podcast: Solutions to Security Burnout and Overload

Security staff burnout and overload is a continuing dangerous situation. Security staff cannot look at all the alerts discovering 50% false positives. Security staff sometimes turns off alerts to alleviate alert fatigue. More data does not mean better security, only more work. The mean time to identify and mean time to resolution of security issues is getting longer.
Read More
ITExpo Panel on AI & Cybersecurity
Mobilocity

ITExpo Panel on AI & Cybersecurity

I was fortunate to have been asked by the folks at TMC to moderate this interesting panel at the ITExpo Conference in Ft. Lauderdale last week. The session includes comments on the state of AI and ML in Security as well as what should be done to make threat protection and employee policies more rigorous. Security is a continual process not an event you check off and say you’ve done.
Read More
As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity
MSP Today

As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity

It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures. By Arti LoftusFebruary 21, 2020 It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures.
Read More