
Interview With Changming Liu by Safety Detectives
Changming Liu, CEO and Co-Founder of Stellar Cyber, did us the honor of sitting down for an interview with Aviva Zacks of Safety Detectives. He

AI-driven security, Case Studies, Cloud Security, Cyberattacks, Cybersecurity, Data Collection, security technology
SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis
On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform
Extending managed detection and response across your customers entire attack surface with one comprehensive platform MSPs and MSSPs represent a

IUWorld Cybersecurity Governance, Risk & Compliance
Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the 2nd Episode of IUWorld Thought Leadership

AI-driven security, Artificial Intelligence, Cloud Security, Cybersecurity, IT technology, Network Security, Open XDR, XDR
IUWorld Cybersecurity Governance, Risk & Compliance
Part I: Demystifying Cyber Health and Cyber Threat Hunting JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting

AI-driven security, Artificial Intelligence, Cloud Security, Cybercriminals, Cybersecurity, IT technology, Network Security, Network Traffic Analysis, Open XDR, XDR
Leverage the tools and telemetry you trust
The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications

Application Security, Cloud Security, Cyberattacks, Cybercriminals, Cybersecurity, IT technology, Network Security, Network Traffic Analysis, security technology
What is Network Security?
The historical definition of network security is to use a firewall to screen users coming into the network, but as IT technology and security

Red Team – Blue Team Testing – The Big Picture
Ever since offensive security testing began, we have expected that the test or simulation will find something. Even if a pen tester doesn’t

AI-driven security, Artificial Intelligence, Breach Detection, Cyberattacks, Cybersecurity, Data Collection, Podcast, Uncategorized, XDR
When is Enough, Enough?
Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional

AI-driven security, Artificial Intelligence, Cyberattacks, Cybercriminals, Cybersecurity, Data Collection, XDR
What Is Cybersecurity?
Cybersecurity is in the news a lot, and typically in a bad way. We learn about Cybersecurity through well-publicized cyberattacks on major

AI-driven security, Artificial Intelligence, Cyberattacks, Cybercriminals, Cybersecurity, Data Collection, XDR
Cybersecurity Challenges and Solutions
Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data, damage to hardware or

A Conversation about the New Wave of Cybersecurity
Its time, again, to change the conversation in cybersecurity. It’s neither data-driven nor AI-driven cybersecurity, which you might have heard

Why are leading market research firms so excited about XDR?
Q&A with CEO and Co-Founder Changming Liu Q. Why do you think people including CISOs and analysts are so excited by XDR? Ans: SIEMs

Big companies are not immune to Ransomware!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership

Why XDR?
(Extended Detection and Response)
Why XDR (Extended Detection and Response) ? Timing is everything As the security industry wrestles with current security infrastructure,

What is XDR ?
(Extended Detection and Response)
There’s a new acronym out there in the security space: it’s XDR (Extended Detection and Response). But why do we need yet another acronym and

A Single PAIN of Glass
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership

Myth Buster: Data Fatigue is not real!
CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership