Blogs

What makes a lean security team tick
Blog

What makes a lean security team tick

When budgets and resources are high, security teams have the luxury of building complex security...
Read More >
August Product Update
Blog

August Product Update

August Product Update Stellar Cyber continually works to ensure the products we deliver not only...
Read More >
Our new normal challenges the economic viability of traditional cybersecurity thinking.
Blog

Our new normal challenges the economic viability of traditional cybersecurity thinking.

Stellar Cyber’s new sensors eliminate blind spots in your, or your customers’, distributed environments without...
Read More >
Should you build your own or purchase MDR services — Is Open XDR the answer?
Blog

Should you build your own or purchase MDR services — Is Open XDR the answer?

For the last several years, MSP partners have been making a tough decision – should...
Read More >
One Year Later: Lessons from the Colonial Pipeline Ransomware Attack
Blog

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack

A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to...
Read More >
What Rippling Will Do To HR, XDR Will Do To Security
Blog

What Rippling Will Do To HR, XDR Will Do To Security

In this tumultuous software equity market, where corporate valuations are coming back to levels based...
Read More >
Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business
Blog

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business

As an MSSP, being proactive in your approach to cybersecurity is a best practice.  Ensuring...
Read More >
Open XDR In the Real World – Q&A With Jon Mayled
Blog

Open XDR In the Real World – Q&A With Jon Mayled

In this interview, we capture real-world experience and recommendations from an enterprise that implemented Stellar...
Read More >
Keys to a Successful XDR Implementation
Blog

Keys to a Successful XDR Implementation

Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data...
Read More >
Cybersecurity Infrastructure Needs a New Model
Blog

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with...
Read More >
Going SOCless
Blog

Going SOCless

According to the FBI, the number of cyberattacks reported to their Cyber Division is up...
Read More >
Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks
Blog

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting...
Read More >
Technical Approach To Universal EDR
Blog

Technical Approach To Universal EDR

For security vendors and those in the XDR market specifically, there is an architectural axis...
Read More >
Mastering EDR – Industry’s First Universal EDR
Blog

Mastering EDR – Industry’s First Universal EDR

In detection and response, bidirectional integrations between security products, let alone unidirectional integrations, are not...
Read More >
Build a new Superpower for your MSSP business!
Blog

Build a new Superpower for your MSSP business!

Providing endpoint security for all your customers is a major challenge. First, it is very...
Read More >
1 2 3 6