The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response)
How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI
Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response
MDR-as-a-Service – Is it the Holy Grail as Some Say? David Barton, Stellar Cyber CISO Every few months it seems there is another wave of new
For years, I have heard the benefits of log forwarding and collection. Send all your data to a SIEM and your security program will be better and
You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more
Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be
Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has
Data breaches are major security threats for enterprises and end users. Previously, we discussed the Equifax data breach that leaked the social
According to Bleeping Computer, a new ransomware called LooCipher has been found in the wild.
On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber
DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.
DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims.
Distributed Security Intelligence Artificial Intelligence is radically transforming the cybersecurity industry. To successfully use A.I for
Artificial Intelligence and Machine Learning are the technologies that are at the forefront of what is being called the world’s 4th industrial
Domain Generation Algorithms (DGAs) are a class of algorithms that periodically and dynamically generate large numbers of domain names.
In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach of unprecedented impact and scale. More than 145