Blogs

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room
Blog

Why Network Detection and Response (NDR) ? See the Entire Elephant in the Room

Network detection and response (NDR) has a long history, evolving out of network security and...
Read More >
Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?
Blog

Ransomware is the Tip of the Iceberg—Can Open XDR / XDR avoid you becoming the Titanic?

Ransomware attacks are occurring at an increasingly staggering pace. The tactics for deploying it are...
Read More >
SIEM, XDR, and the Evolution of Cybersecurity Infrastructure
Blog

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing...
Read More >
NDR vs. Open XDR – What’s the difference?
Blog

NDR vs. Open XDR – What’s the difference?

Every security tool vendor talks about detection and response, so what makes NDR so special,...
Read More >
Q&A on Network Detection and Response (NDR)
Blog

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out...
Read More >
Everything about XDR is around Correlations, not Hype
Blog

Everything about XDR is around Correlations, not Hype

In the last several months the XDR acronym is being used by almost every security...
Read More >
Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?
Blog

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Today there is no shortage of compliance requirements. There are so many, in fact, that...
Read More >
Does XDR Need A New Kill Chain?
Blog

Does XDR Need A New Kill Chain?

The time has come for cyber security technology to keep up with the adversaries.  Now...
Read More >
Open XDR vs. SIEM
Blog

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks...
Read More >
Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?
Blog

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be...
Read More >
XDR explained in 300 words
Blog

XDR explained in 300 words

XDR is the rising star of new acronyms, but you might have to read a...
Read More >
The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?
Blog

The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?

Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log...
Read More >
The Case for Open XDR – X Means Everything
Blog

The Case for Open XDR – X Means Everything

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot...
Read More >
Alerts, Events, Incidents: Where Should Your Security Team Focus?
Blog

Alerts, Events, Incidents: Where Should Your Security Team Focus?

As the cybersecurity threat landscape is evolving so is the way we need to look...
Read More >
Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response
Blog

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet...
Read More >
1 2 3 4