Blogs

Does XDR Need A New Kill Chain?
Blog

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries.  Now...
Read More >
Open XDR vs. SIEM
Blog

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks...
Read More >
Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?
Blog

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be...
Read More >
XDR explained in 300 words
Blog

XDR explained in 300 words

XDR is the rising star of new acronyms, but you might have to read a...
Read More >
The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?
Blog

The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?

Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log...
Read More >
The Case for Open XDR – X Means Everything
Blog

The Case for Open XDR – X Means Everything

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot...
Read More >
Alerts, Events, Incidents: Where Should Your Security Team Focus?
Blog

Alerts, Events, Incidents: Where Should Your Security Team Focus?

As the cybersecurity threat landscape is evolving so is the way we need to look...
Read More >
Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response
Blog

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet...
Read More >
XDR Delivers Significant Performance Improvement over SIEM
Blog

XDR Delivers Significant Performance Improvement over SIEM

In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean...
Read More >
An Integrated TIP for Simplified and Efficient Security Operations
Blog

An Integrated TIP for Simplified and Efficient Security Operations

Cybersecurity platforms are only as intelligent as the data provided to them, and every security...
Read More >
How to leverage Open XDR as a strategic advantage for MSP and MSSP partners
Blog

How to leverage Open XDR as a strategic advantage for MSP and MSSP partners

Stellar Cyber built the original Open XDR platform. It provides tool consolidation, improved SOC performance, and...
Read More >
With Stellar Cyber’s Open XDR, No EDR is an Island
Blog

With Stellar Cyber’s Open XDR, No EDR is an Island

Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and...
Read More >
How Stellar Cyber Addresses Data Storage Pain
Blog

How Stellar Cyber Addresses Data Storage Pain

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one...
Read More >
Cyberthreats Go Sideways
Blog

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie...
Read More >
Was SUNBURST really a Zero-day attack?
Blog

Was SUNBURST really a Zero-day attack?

Most companies affected by the SolarWinds attack learned about it from the Department of Homeland...
Read More >
1 2 3 4