Stellar Cyber's Press Coverage

Post Types

    A Return to Logs to Unjam the Security Deficit
    Security Boulevard

    A Return to Logs to Unjam the Security Deficit

    Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was that by gathering logs from networking and security devices and running them through the SIEM, security events could be astutely exposed and security teams could gain an upper hand over attackers. The enthusiasm was soon dashed when it was obvious that logs alone were not the answer. In the first place, not everything was covered by logs and security details that were being captured could be manipulated easily as an attacker attempted to cover their tracks. Second, it’s one thing to aggregate logs but another to integrate the findings to produce true intelligence, particularly that which could easily stand apart from false positives.
    Read More
    Security Success Is Based On Operational Efficiency
    Forbes

    Security Success Is Based On Operational Efficiency

    When most people think about cybersecurity, they think about security products, such as firewalls, virtual private networks (VPNs), anti-malware and endpoint solutions. Maybe a security information and event management (SIEM) solution comes up or the advanced means of finding internal attackers or potential breaches. Sometimes, policies and end-user training also come into consideration or even the (overworked) security team.
    Read More
    MDR Provider Deeptree Announces Stellar Cyber Integration
    MSSP Alert

    MDR Provider Deeptree Announces Stellar Cyber Integration

    Managed detection & response (MDR) provider Deeptree adds Stellar Cyber security operations capabilities (SOC) to deliver end-to-end protection against cyberattacks. MSSP Deeptree has integrated Stellar Cyber security operations capabilities into its managed detection and response (MDR) platform. The Stellar Cyber integration will provide the foundation for Deeptree’s next-generation security operations center (SOC), the companies said.
    Read More
    2021 Prediction: Open XDR Goes Mainstream
    VMBlog.com

    2021 Prediction: Open XDR Goes Mainstream

    The cybersecurity world loves acronyms, and XDR is among the newest ones going around. XDR, or eXtended Detection and Response, is a foundational technology that detects cyberattacks anywhere they may occur - on endpoints, in servers, in applications, by users, in the network, or in cloud or SaaS environments.
    Read More
    Stellar Cyber Joins CxO InSyte as Founding Member to Fight Threats
    Ai Techpark

    Stellar Cyber Joins CxO InSyte as Founding Member to Fight Threats

    Actively participates and contributes in trusted CXO community, forum and solutions intelligence to combat the most sophisticated cyber attacksStellar Cyber, the only cohesive intelligent security platform that provides maximum protection by piecing attacks together across the entire IT infrastructure, announced today that it has joined, as a founding member, CxO InSyte,
    Read More
    REVEZ Corporation Sees Strong Demand For Stellar Cyber, The World’s First Open XDR Cybersecurity Platform, In Asia-Pacific
    Aithority

    REVEZ Corporation Sees Strong Demand For Stellar Cyber, The World’s First Open XDR Cybersecurity Platform, In Asia-Pacific

    High-Fidelity Next-Generation SOC Solution that Finds Active Attacks and Boosts Security Team Effectiveness is Major Draw for Customers
    Read More
    Prevent data breaches successfully with Stellar Cyber’s futuristic solutions
    The Silicon Review

    Prevent data breaches successfully with Stellar Cyber’s futuristic solutions

    Executives consider cyberattacks as one of the topmost business concerns, and it outranks other adversaries like brand damage, regulations, and economic uncertainty. In the prevailing cyber landscape, cyberattacks are considered to be inevitable, but security analysts suggest that these attacks can be largely prevented if the companies choose to implement robust security measures. By having a sophisticated security measure in place, we can reduce the chances of someone walking away with the company’s sensitive data.
    Read More
    Stellar Cyber: A New View of Cybersecurity says, Changming Liu
    Startup Info

    Stellar Cyber: A New View of Cybersecurity says, Changming Liu

    First of all, how are you and your family doing in these COVID-19 times? Changming Liu: We are doing fine.Tell us about you, your career, how you founded Stellar Cyber Changming Liu: I have a wealth of leadership, entrepreneurship, management skills, and technical expertise in networking, security, big data, and machine learning. Before co-founding Stellar Cyber, I was a co-founder, CTO, and Board Member at Aerohive Networks, a cloud networking provider that successfully completed an IPO in 2014.
    Read More
    Stellar Cyber’s new toolkit helps security teams test their solutions to verify their cybersecurity effectiveness
    Help Net Security

    Stellar Cyber’s new toolkit helps security teams test their solutions to verify their cybersecurity effectiveness

    Stellar Cyber announced a new toolkit customers can use to verify the platform’s functionality by launching a wide variety of cyberattacks against it.The Red Team toolkit is an offensive attack generator that ‘red team’ (offensive) security analysts can use to test the Stellar Cyber Open-XDR platform’s ability to defend against the latest attacks.
    Read More
    Stellar Cyber Launches Red Team Toolkit for NDR, Other Detections
    Ai Techpark

    Stellar Cyber Launches Red Team Toolkit for NDR, Other Detections

    Toolkit adds Cyberattack Generator to help security analysts verify effectiveness of EDR, SIEM and thwart attacks over the entire cyber kill chainStellar Cyber, the innovator of Open XDR, the only cohesive intelligent security platform that delivers maximum protection, today announced a new toolkit customers can use to verify the platform’s functionality by launching a wide variety of cyberattacks against it.
    Read More
    What SIEMs Are Saying About SOCs
    Cybercrime Magazine

    What SIEMs Are Saying About SOCs

    With more complex cyberattacks on the rise, and with COVID-19 adding additional challenges to protecting the enterprise, is the SIEM the go-forward core of a next-gen security operations center (SOC), or is it time to consider new ideas? We discuss daily the cybersecurity challenges with global thought leaders, but we wanted to get better insights into this challenge question to better understand the market. To that end, we contracted LeadtoMarket to perform a study with customers who have industry-leading SIEM platforms, to understand what is needed for customers to rethink their SOC practices and to consider a means to radically reduce costs and dramatically improve performance by reducing the complexity of day-to-day cybersecurity operations.
    Read More
    Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber
    Cybercrime Magazine - SoundCloud

    Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber

    Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber - SoundCloud
    Read More
    30 Most Innovative companies to Watch
    CIO Bulletin

    30 Most Innovative companies to Watch

    Stellar Cyber: Our comprehensive security platform provides maximum protection of applications and data wherever they resideIn today’s online age, the number of threats to businesses and their customers increases every day. The largest obstacle in cybersecurity is the perpetual security risk that quickly evolves over short periods of time, leaving businesses with a widening gap in manpower and the resources needed to protect their data.In the past decades, Stellar Cyber has witnessed some significant advances in the detection and management of various cybersecurity threats, but in today’s fast-paced IT world, a new problem has arisen in the world of cybersecurity: companies are often drowning in too much information from too many tools, each of which has its own solution with its own management console.
    Read More
    10 Best Cyber Security Companies 2020
    CIO Bulletin

    10 Best Cyber Security Companies 2020

    Stellar Cyber: The only comprehensive security platform providing maximum protection of applications and data wherever they reside Every company with an online presence is subject to cyberattacks, and the challenge is to mitigate those attacks by spotting and correcting them as quickly as possible.We present to you Stellar Cyber whose top security infrastructure data collection, analysis and automated anywhere detection and response (XDR) mechanisms elevate productivity and strengthen security analysts to eliminate threats in a few minutes instead of days or weeks.
    Read More
    The precision of security undermined by a failure to correlate
    Help Net Security

    The precision of security undermined by a failure to correlate

    If Paul Newman’s Cool Hand Luke character were to address the security industry, his opening line would likely be: “What we have here is a failure to correlate.” Today, one of the major deficiencies affecting security is not a lack of data or even an aggregation of data, but the central problem is one of correlating data and connecting the dots to find otherwise hidden traces of attack activity.
    Read More
    Now Tech: Security Analytics Platforms, Q3 2020
    Forrester

    Now Tech: Security Analytics Platforms, Q3 2020

    You can use security analytics platforms to provide better visibility into your environments, detect threats and support investigations, and orchestrate a response across the environment. But to realize these benefits, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use this report to understand the value they can expect from a security analytics provider and to select one based on size and functionality.
    Read More
    Stellar Cyber’s Aimei Wei Named One Of The Top 100 Women In Cybersecurity For 2020
    MSP Insights

    Stellar Cyber’s Aimei Wei Named One Of The Top 100 Women In Cybersecurity For 2020

    During Black Hat USA 2020, Stellar Cyber Founder Aimei Wei Named a Top 100 Winner in this Prestigious Awards Category Exclusively for Women in Cybersecurity. Stellar Cyber, the only cohesive security AI/ML platform that delivers maximum protection today announced that its Founder and SVP Engineering Aimei Wei has been named a Top 100 Women in Cybersecurity for 2020 by Cyber Defense Magazine, the leading cybersecurity publication in the industry.
    Read More
    Can Machine Learning For Enterprise Security Advance Like Voice Recognition?
    Forbes

    Can Machine Learning For Enterprise Security Advance Like Voice Recognition?

    Albert Zhichun Li, Ph.D., is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. Not long ago, the state of voice recognition was quite primitive, and interacting with it was painful. Call management systems using voice recognition were fraught with errors, making it difficult to navigate to a desired destination or produce the correct result. But that was then, and this is now. Voice recognition has come a long way. It's now generally effortless and even enjoyable to ask things of Alexa, Siri or Google Assistant, and call systems work reasonably well. No one can deny the progress made in voice recognition.
    Read More
    Opportunities for women in the cybersecurity.
    TechBlogWriter

    Opportunities for women in the cybersecurity.

    Opportunities for women in the cybersecurity.
    Read More
    Why CEOs Are Getting Hacked, And What To About It
    Cybercrime Magazine

    Why CEOs Are Getting Hacked, And What To About It

    It’s neither data-driven nor AI-driven cybersecurity, which you might have heard before — it’s both and more, much more. It is correlation-driven cybersecurity. It is about correlations of many detections, from very basic like NGFW to very advanced like AI-based EDR, from various data sources in a single cohesive platform. We hear about many security challenges from prospects, customers and partners — why? Because it is part of what humans do — share pain! As you may or may not know, attackers have access to the same tools as we all do. They have access to both Big Data and AI technologies for more advanced attacks.
    Read More
    Intellectual Property Breaches Illustrate New Generation Of Security Threats
    Forbes

    Intellectual Property Breaches Illustrate New Generation Of Security Threats

    Albert Zhichun Li, Ph.D., is Chief Security Scientist at Stellar Cyber. He has over 15 years of experience in cybersecurity research. For many companies, a data breach has become almost a way of life and business as usual. Damages — from customer loyalty and reputation to financial penalties and damage to infrastructure — while sizable, seemingly have not significantly impaired the largest enterprises.
    Read More
    Why There Are Silos And Gaps In SOCs… And What To Do About It
    Cybercrime Magazine

    Why There Are Silos And Gaps In SOCs… And What To Do About It

    The experts at Stellar Cyber asked their co-founder and CEO Changming Liu 7 questions about the cutting edge Open XDR Security Platform, which has gained a lot of industry attention and users.
    Read More
    Building A Cybersecurity Company And Lessons Learned From Being A Mom
    Cybercrime Magazine

    Building A Cybersecurity Company And Lessons Learned From Being A Mom

    Aimei Wei is a woman who loves to solve problems. That’s one reason she’s passionate about her role in cybersecurity. “Solving cybersecurity problems is challenging, but it’s also a fascinating industry and career,” said Wei, founder and VP of Engineering at Stellar Cyber, a provider of security solutions, software and analysis tools. “It’s like you are a detective.”
    Read More
    CyFlare deploys the Stellar Cyber platform as the core of its SOC service
    Help Net Security

    CyFlare deploys the Stellar Cyber platform as the core of its SOC service

    Stellar Cyber announced that CyFlare has deployed the Stellar Cyber platform as the core of its Security Operations Center (SOC) service.While many MSSPs cobble together complete solutions from a dozen or more different products and then have trouble correlating detections to stop complex attacks, Stellar Cyber’s platform is a complete solution with more than 20 natively-supported applications that present detections in an intuitive dashboard.
    Read More
    MSSP CyFlare Partners with Stellar Cyber, Deploys SOCaaS
    MSSP Alert

    MSSP CyFlare Partners with Stellar Cyber, Deploys SOCaaS

    CyFlare, a Top 200 MSSP, has unveiled a security operations center-as-a-service (SOCaaS) offering powered by the Stellar Cyber Open-XDR cybersecurity platform, according to a prepared statement. The news comes after Stellar Cyber raised $7.1 million in an expanded Series A financing round earlier this year.
    Read More
    Defend your enterprise from cyber threat and mitigate risks: Stellar Cyber
    The Silicon Review

    Defend your enterprise from cyber threat and mitigate risks: Stellar Cyber

    “Application-based, intelligent and open platform, Starlight is the first automated detection and response Open-XDR security platform.”
    Read More
    5 Best Security Companies to watch 2020
    The Silicon Review

    5 Best Security Companies to watch 2020

    METCloud is an award winning IT Managed Service Provider. It has been built around the highest level of cyber security technologies available. It tailors its innovative services to specifically align with your organisation’s requirements, ensuring METCloud is the only cloud platform you need.
    Read More
    Stellar Cyber adds cloud detection and response to its XDR offering
    OMDIA

    Stellar Cyber adds cloud detection and response to its XDR offering

    Stellar Cyber, a provider of threat detection and response technology spanning multiple domains of enterprise infrastructure, has launched a capability for cloud environments to complement the endpoint and network dimensions already addressed by its Starlight platform. It calls it cloud detection and response (CDR), a term Omdia has championed for a while.XDR covers endpoint, network, and cloud The vendor refers to Starlight as an Open-XDR platform, adopting the parlance that Omdia coined in 2018, referring to a spectrum of detection and response technologies for endpoint (EDR), network (NDR), and other areas, eventually including cloud. NDR is sometimes referred to as network traffic analysis (NTA), but Omdia sees the latter as a subset of NDR, in that traffic analysis is necessary to detect threats, but NDR adds the critically important response capability that enables organizations to also mitigate threats. NTA was developed earlier for the purpose of network performance monitoring rather than as a security function. Indeed, a number of NTA vendors, such as Gigamon, Netscout, and ExtraHop, have expanded into NDR in recent years, to align with the direction of the security market and expand their target audience from network operations to security teams.
    Read More
    Meet Stellar Cyber and the Open-XDR Security Platform
    Cybercrime Magazine

    Meet Stellar Cyber and the Open-XDR Security Platform

    Cybercrime - Meet Stellar Cyber and the Open-XDR Security Platform - Listen the Audio
    Read More
    Stellar Cyber Debuts Cloud Detection & Response App
    MSP Insights

    Stellar Cyber Debuts Cloud Detection & Response App

    Security provider Stellar Cyber, with the first Open-XDR security platform, announced today that it has released its Cloud Detection & Response (CDR) App, the latest addition to the native-supported family of applications on its platform. The CDR App secures SaaS apps and protects public cloud infrastructure with automated attack detection, both manual and automated threat hunting, pre-built compliance reports, manual and automated response and many other features.
    Read More
    Moving From Passive To Aggressive In Stopping Network Attackers
    Forbes

    Moving From Passive To Aggressive In Stopping Network Attackers

    One of the unfortunate realities of network security is that it is largely reactive. To be fair, organizations are adept at testing and ensuring that the known holes or vulnerabilities are shored up and systems and devices are kept current and optimized to prevent against a successful attack.
    Read More
    10 Most Influential Companies of the Year 2020
    The CXO Fortune

    10 Most Influential Companies of the Year 2020

    Stellar Cyber - Changming Liu, CEO. Stellar Cyber is the key definitive cyber security guide to help deal with the never-ending, always-looming cyber threats in the digitized world. The Starlight platform from the company rounds up all the different datasets and brings all the cyber security analysis into one mighty management console.
    Read More
    Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks
    The CEO Views

    Stellar Cyber: Implementing Pervasive Security from Complex Cyberattacks

    Online threats are diverse, and while searching for a target, they don’t discriminate between organizations and individuals. Cyber threats range from network infiltrations and data breaches through spear-phishing and brute force. Cybersecurity is the implementation of technology, processes, and controls to protect the systems, networks, services, devices, and data from cyberattacks. It aims at reducing the risk of cyberattacks and protecting against the unauthorized systems, networks, and technology exploitation.
    Read More
    The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside
    The Silicon Review

    The Only Comprehensive Security Platform: Stellar Cyber Provides Maximum Protection of Applications and Data Wherever They Reside

    In recent times, the organizations are digital by default, and it is becoming difficult for them to map their digital surrounding. The technology infrastructure of every organization is custom-made, and it is complicated. There is no reward without risk. Digital businesses make use of connected devices, new technologies, and operating platforms. They also embrace new ways of working, building large data storage, and so on.
    Read More
    Large Organizations Are Not Immune To Ransomware Attacks
    Cybercrime Magazine

    Large Organizations Are Not Immune To Ransomware Attacks

    In the past, this malware gained entry using different techniques: exploit kits via drive-by downloads, remote desktop connections (RDP) with weak passwords, email impersonation, and email spam. In the majority of cases where the phishing email is being delivered, the user is clicking on the link, then they give the macro authorization to run, and ultimately get the malicious file installed. Once installed, the Maze ransomware begins to encrypt critical data on the infected machine. While the encryption process is running, the ransomware also ex-filtrates the data to a server on the internet. When both of those processes are complete, the user is presented with a ransom demand and a method to recover their encrypted data.
    Read More
    Why Threat Hunting with XDR Matters
    DarkReading

    Why Threat Hunting with XDR Matters

    Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
    Read More
    Stella Cyber locks in Series A
    Venture Capital Journal

    Stella Cyber locks in Series A

    Silicon Valley-based Stellar Cyber, a security provider, has raised $7.1 million in additional funding, bringing its total Series A tally to $21.8 million.
    Read More
    Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels
    Help Net Security

    Stellar Cyber’s new Entity Behavior Analytics app delivers unified view of all assets and their risk levels

    Security provider Stellar Cyber, with the first Open-XDR security platform, announced the latest addition to its Starlight platform’s built-in App Store, a new Entity Behavior Analytics app.
    Read More
    Why Security Platforms Took Center Stage at RSA 2020
    eWeek

    Why Security Platforms Took Center Stage at RSA 2020

    The world’s largest security conference, RSA, came and went earlier this month at its normal home in the Moscone Center in San Francisco. There was some speculation the show might be canceled due to Verizon, AT&T and IBM pulling out, but the show went on with more than 40,000 people, myself included, coming to learn what’s new in the world of cyber security.
    Read More
    Ransomware’s Dark Future
    Forbes

    Ransomware’s Dark Future

    With each new year comes the inevitable flood of articles touting predictions. In the case of ransomware, predictions started to show up by mid-2019. The consensus? Ransomware is going to get worse. Most see ransomware attacks becoming more prevalent and damaging. More entities will be hit more frequently. There are many points to support such theories.
    Read More
    Podcast: Solutions to Security Burnout and Overload
    Telecom Reseller Podcast

    Podcast: Solutions to Security Burnout and Overload

    Security staff burnout and overload is a continuing dangerous situation. Security staff cannot look at all the alerts discovering 50% false positives. Security staff sometimes turns off alerts to alleviate alert fatigue. More data does not mean better security, only more work. The mean time to identify and mean time to resolution of security issues is getting longer.
    Read More
    ITExpo Panel on AI & Cybersecurity
    Mobilocity

    ITExpo Panel on AI & Cybersecurity

    I was fortunate to have been asked by the folks at TMC to moderate this interesting panel at the ITExpo Conference in Ft. Lauderdale last week. The session includes comments on the state of AI and ML in Security as well as what should be done to make threat protection and employee policies more rigorous. Security is a continual process not an event you check off and say you’ve done.
    Read More
    As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity
    MSP Today

    As Digital Transformation Continues in the Enterprise Cybersecurity World, One Company Reaches for the Cloud to Supercharge Analyst Productivity

    It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures. By Arti LoftusFebruary 21, 2020 It’s no secret that managing security within enterprises, organizations, and small and medium businesses have become exponentially more complex as more applications and services enter “the mix” in the brave new world of IT-based primarily on cloud and XaaS architectures.
    Read More
    Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies
    Help Net Security

    Stellar Cyber’s new app applies machine learning to firewall data to spot anomalies

    Security provider Stellar Cyber, with the first Open-XDR platform, announced its new Firewall Traffic Analysis (FTA) Application, which supercharges firewalls by analyzing their data to spot undetected anomalies.
    Read More