Posts

Showing posts from October, 2022

Feature in-Focus: Stellar Cyber Central

Image
Concerned by the scalability of your   SOC / NG-SIEM   in your multinational organization or multiple data centers on different continents?  Worried about sensitive data like financial records or PII  leaving your organization when outsourcing your  SOC  to an  MSSP / MDR ? Do data sovereignty requirements keep you up at night? If you answered yes to at least one of these questions, you might think you have no choice but to undergo a costly, complicated implementation approach that will impact your margins or overall costs.  Enter Stellar Cyber Central. To get a full breakdown of this handy capability, free for all our customers to use,  please reach out to set up a custom demonstration . In the meantime, let me walk you through some of the key capabilities and benefits of using  Stellar Cyber  Central. When this Feature Makes Sense There are several use cases where an enterprise or  MSSP  could make use of Stellar Cyber C...

MSSP Alert Live Recap

Image
  I’m sure, like most people reading this blog, the past two-plus years for me were mainly spent in front of my computer, talking with my colleagues, customers, and prospects over Zoom (or your video conferencing provider of choice). So when the opportunity to attend the  MSSP Alert Live event  in Washington, DC came my way, I hopped on it. While I did attend our  Open XDR Summit  earlier this year, this was the first time I would have the opportunity to “man the booth” and talk with a new audience. Hosted at the historic Watergate Hotel just off the Potomac, MSSP Alert Live brought together thought leaders, practitioners, and industry leaders to discuss the latest topics and trends impacting the delivery of security services. First off, hats off to the team from  MSSP Alert , the event was well thought out, and from my discussions with attendees, the presentations were informative, engaging, and just about the right length. After three days of lively discu...

Economics Of Shift Left Security

Image
  I’ve worked with dozens of  SecOps  and  Detection and Response  teams over the past few years and it has become crystal clear to me how important it is to fix as many security issues as possible  upstream . Or as it is more commonly known,  “Shift Left Security” . Broadly, I see three camps on  “Shift Left Security”  — 1) don’t understand it, 2) get it, not executing it, 3) get it, executing it. You might be in that third camp and think shifting left is obvious and common knowledge. Let me humbly remind you it is a big world out there, and the average organization is woefully immature on security. Put another way, camps one and two combined vastly outnumber camp three. Why is that? Well  “Shift Left Security”  is new-ish, but more importantly it is hard. It is like consistently eating vegetables in the face of other sugary temptations. Security vendors all say shifting left enables faster delivery and lower costs, but in my opini...

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

Image
  In today’s ultra-competitive  MSSP market , business owners are looking for ways to make their offerings more attractive to customers and their  SOCs  more effective. To that end  MSSPs   add new technology to their security offering stack with the hopes that prospective customers will see this addition as an opportunity to outsource some, or all, of their security monitoring. There is some validity to that strategy; Unfortunately the new technology often fails to deliver their stated benefits leading to higher customer churn. So while keeping your technology and security team abreast of the latest and greatest security technology is essential, sometimes you must look at what is already in your security stack. The one technology I am referring to specifically is your  SIEM . Depending on who you talk to, we are currently in the third or fourth generation of  SIEM technology ; however, when I talk to practitioners, their frustration level with th...