Blogs

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!
Blog

Tired Of Reactive Strategies? Proactively Stop Attackers Earlier In The Kill Chain!

MSSPs all deal with a crushing number of alerts daily – but how are the...
Read More >
Stellar Cyber’s Open XDR  – Step into Security
Blog

Stellar Cyber’s Open XDR – Step into Security

Security can be intimidating for MSP partners making the transition to MSSP.  The industry makes...
Read More >
Stellar Cyber: Log4j Vulnerability and Exploitation Detection
Blog

Stellar Cyber: Log4j Vulnerability and Exploitation Detection

1. Introduction In the past several days, a serious Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) has nearly...
Read More >
XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR
Blog

XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR

2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response -...
Read More >
When Doing Nothing is Too Expensive
Blog

When Doing Nothing is Too Expensive

Resource strapped companies trying to put together a comprehensive cybersecurity defense in today’s environment have...
Read More >
XDR/Open XDR Q&A
Blog

XDR/Open XDR Q&A

What are the most common misconceptions about XDR? One of the common misconceptions is that...
Read More >
Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room
Blog

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room

Network detection and response (NDR) has a long history, evolving out of network security and...
Read More >
Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?
Blog

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?

Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are...
Read More >
SIEM, XDR, and the Evolution of Cybersecurity Infrastructure
Blog

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing...
Read More >
NDR vs. Open XDR – What’s the difference?
Blog

NDR vs. Open XDR – What’s the difference?

Every security tool vendor talks about detection and response, so what makes NDR so special,...
Read More >
Q&A on Network Detection and Response (NDR)
Blog

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out...
Read More >
Everything about XDR is around Correlations, not Hype
Blog

Everything about XDR is around Correlations, not Hype

In the last several months the XDR acronym is being used by almost every security...
Read More >
Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?
Blog

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Today there is no shortage of compliance requirements. There are so many, in fact, that...
Read More >
Does XDR Need A New Kill Chain?
Blog

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries.  Now...
Read More >
Open XDR vs. SIEM
Blog

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks...
Read More >
1 2 3 5