Blogs

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform
Blog

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform

Extending managed detection and response across your customers entire attack surface with one comprehensive platform...
Read More >
IUWorld Cybersecurity Governance, Risk & Compliance
Blog

IUWorld Cybersecurity Governance, Risk & Compliance

Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the...
Read More >
IUWorld Cybersecurity Governance, Risk & Compliance
Blog

IUWorld Cybersecurity Governance, Risk & Compliance

Part I: Demystifying Cyber Health and Cyber Threat Hunting  JEFF: Welcome to Cloud Expo,...
Read More >
Leverage the tools and telemetry you trust
Blog

Leverage the tools and telemetry you trust

The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing...
Read More >
What is Network Security?
Blog

What is Network Security?

The historical definition of network security is to use a firewall to screen users coming...
Read More >
Red Team – Blue Team Testing – The Big Picture
Blog

Red Team – Blue Team Testing – The Big Picture

Ever since offensive security testing began, we have expected that the test or simulation will...
Read More >
When is Enough, Enough?
Blog

When is Enough, Enough?

Are SIEMs the foundation to build on or are they empty promises? With more complex...
Read More >
What Is Cybersecurity?
Blog

What Is Cybersecurity?

Cybersecurity is in the news a lot, and typically in a bad way. We learn...
Read More >
Cybersecurity Challenges and Solutions
Blog

Cybersecurity Challenges and Solutions

Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data,...
Read More >
A Conversation about the New Wave of Cybersecurity
Blog

A Conversation about the New Wave of Cybersecurity

Its time, again, to change the conversation in cybersecurity. It’s neither data-driven nor AI-driven cybersecurity,...
Read More >
Why are leading market research firms so excited about XDR?
Blog

Why are leading market research firms so excited about XDR?

Q&A with CEO and Co-Founder Changming Liu   Q. Why do you think people including...
Read More >
Big companies are not immune to Ransomware!
Blog

Big companies are not immune to Ransomware!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than...
Read More >
Why XDR? <br/>(Extended Detection and Response)
Blog

Why XDR?
(Extended Detection and Response)

Why XDR (Extended Detection and Response) ? Timing is everything   As the security industry...
Read More >
What is XDR ? <br/>(Extended Detection and Response)
Blog

What is XDR ?
(Extended Detection and Response)

There’s a new acronym out there in the security space: it’s XDR (Extended Detection and...
Read More >
A Single PAIN of Glass
Blog

A Single PAIN of Glass

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than...
Read More >
1 2 3 4 5