Nothing Special   »   [go: up one dir, main page]

AI-driven security

Recent Outages Reveal Crucial Vulnerability in Security Infrastructure – and the Need for More Comprehensive Solutions

Microsoft and CrowdStrike occupied headlines for weeks after complications following a software update and a DDoS attack that left customers vulnerable and unable to access their data. While the two events were unrelated, the rapid succession of one failure after another leaves a very wide base of customers wondering exactly how much is at stake, […]

Recent Outages Reveal Crucial Vulnerability in Security Infrastructure – and the Need for More Comprehensive Solutions Read More »

Hyperautomation for Security Teams

Six years ago, we founded DTonomy, a security automation company. As security software engineers and data scientists who had worked at the forefront of security operations — from building large-scale AI-based EDR systems to managing daily security operations — we were acutely aware of the challenges security teams face. Triaging security alerts during national holidays,

Hyperautomation for Security Teams Read More »

Drive efficiency with Stellar Cyber Open XDR platform on Oracle Government Cloud

Government security operations (SecOp) teams face unique challenges as they grapple with relentless attacks in an environment that can shift unexpectedly. The pressure intensifies in the government, and budgets are often constrained. This combination of factors creates a perfect storm of stress and uncertainty. SecOps leaders must find ways to ensure their teams can protect

Drive efficiency with Stellar Cyber Open XDR platform on Oracle Government Cloud Read More »

Fighting AI with AI: Tools for the Twenty-First Century

In a recent conversation with a major educational institution’s CIO, the following circumstance arises: a university administrator is hiring for a position; of over 300 resumes that he receives, 95% of them look so similar that they could have come from the same person. And in a way, they did. With the proliferation of AI-powered

Fighting AI with AI: Tools for the Twenty-First Century Read More »

The Car Dealership Hack: Securing the Supply Chain

supply chain Open XDR Platform Open XDR Ai-Driven Security Cybersecurity The news earlier this week about the CDK hack reveals the major flaw—and prevalent issue—in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to

The Car Dealership Hack: Securing the Supply Chain Read More »

2024 cybersecurity predictions: GenAI edition

Unless you have lived under a rock for the past year, you know that generative artificial intelligence applications, such as ChatGPT, have penetrated many aspects of our online lives. From generating marketing content, creating images for advertisements and blogs, or even writing malicious code, we are all interacting with the results of generative AI in

2024 cybersecurity predictions: GenAI edition Read More »

XDR

What Enterprise C-level Executive Customers Want From MSSPs

For an MSSP, the key to a CIOs heart is reducing risk for a cost that is less than what they’re spending now, Stellar Cyber asserts. A CIOs or CISOs job is never easy, but it’s more difficult now because cyberattacks are more frequent and more complex than ever before. Cybersecurity is a top priority

What Enterprise C-level Executive Customers Want From MSSPs Read More »

Open XDR – Central correlation of all cybersecurity events

Reduce business risk with early and accurate identification and remediation of all attack activity while reducing costs, maintaining investments in existing tools, and accelerating analyst productivity. Open XDR: Overall view and alerting of all potential attacks on the IT landscape In order to successfully protect a company from cyber attacks, a large number of different

Open XDR – Central correlation of all cybersecurity events Read More »

One of These Things is not Like the Others

By nature, humans are wired to avoid undue risks. While there are always exceptions to the rules, by and large when given the choice between the known and unknown, the typical person one will choose the known even though the choice might only deliver a marginally positive result. It is this natural bias towards the

One of These Things is not Like the Others Read More »

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete security tools to hunt for

What’s the Deal with Open XDR Read More »

Network traffic analysis

The New-Look Stellar Cyber

As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the

The New-Look Stellar Cyber Read More »

Next Gen SIEM

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations

Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical, and every decision you make impacts those operations. When you have separate service providers–one for managed IT and another for extended detection & response (XDR)–you run the risk of delayed response and service. Patti Hallock, our Director of XDR Operations

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations Read More »

SIEM security

What is a Lean Security Team, and how to know if you are part of one

Recently I wrote a blog about what makes a lean security team tick, however, after I posted, it occurred to me that I probably should have spent a few minutes talking about the different types of security teams we run into and how to determine if you fit into the lean security team category. You

What is a Lean Security Team, and how to know if you are part of one Read More »

SIEM replacement

Build a new Superpower for your MSSP business!

Providing endpoint security for all your customers is a major challenge. First, it is very rare that partners can deploy an entire endpoint security stack. In many cases, there are servers or other endpoints that do not get covered, or you have customers in the middle of contracts with one EDR provider or another and

Build a new Superpower for your MSSP business! Read More »

Network traffic analysis

When Doing Nothing is Too Expensive

Resource strapped companies trying to put together a comprehensive cybersecurity defense in today’s environment have three key challenges: there’s not enough time, there aren’t enough people, and there isn’t enough money. Most companies look at their monthly spend on security tools, training and headcount and the typical reaction (after the groaning) is to stand pat,

When Doing Nothing is Too Expensive Read More »

XDR

XDR/Open XDR Q&A

What are the most common misconceptions about XDR? One of the common misconceptions is that XDR is automatically the ideal security solution. Point security solution vendors position XDR as the Holy Grail if you are using their product suite. By default, this positioning has limitations, since customers can’t onboard data sources from other vendors and

XDR/Open XDR Q&A Read More »

SIEM security

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages,

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure Read More »

XDR

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention Systems to screen traffic coming into the network, but as IT and security technology have evolved, the

Q&A on Network Detection and Response (NDR) Read More »

Scroll to Top