Posts

Showing posts from July, 2024

AI-Native Cybersecurity

AI’s ability to handle large-scale data analysis and implement real-world recommendations makes it a potentially crucial tool for cybersecurity particularly in the context of over-stretched security teams. Read Full Article

Integrate Large Language Models into SIEM Tools

Security information and event management (SIEM) tools offer a tried and tested way of achieving insight across even the most sprawling and complex environments.  Read Full Article

What is AI-Powered Phishing

In the millions of campaigns conducted by attackers in the last 12 months, phishing emails and messages have provided a way in for the vast majority. Human behavior is unpatchable, and training takes time. Read Full Article

Five Reasons LevelBlue (formerly AT&T Cybersecurity, formerly AlienVault) customers are moving to Stellar Cyber

One thing is for sure about 2024: There has been no shortage of drama in the vendor landscape for cybersecurity teams. With four significant transactions and dozens of other smaller ones, the vendor landscape will no doubt look a lot different this time next year. Read Full Article

Five Reasons IBM QRadar SIEM On-Premises Users Evaluate and Choose Stellar Cyber Open XDR

By now, everyone knows the SIEM market is experiencing a never-before-seen consolidation, causing many security teams to re-evaluate their current SIEM products. That said, no user base is taking the brunt of this chaos more than current IBM QRadar On-premises SIEM users.  Read Full Article

Bring Your Own Data Lake: Do It The Right Way

Having spent a significant amount of time in the SIEM industry, I’ve seen patterns and evolutions that define the landscape. One of the most notable changes has been the shift from traditional, monolithic SIEM deployments to more flexible, scalable solutions that allow organizations to adapt and grow without significant overhauls. Read Full Article

Feature Focus: Stellar Cyber Open XDR Bring Your Own Data Lake

One of the challenges security teams face is managing the vast quantity of data required to identify threats effectively. While each new security control deployed brings new capabilities intended to improve security posture, it also brings with it another set of data to manage. Read Full Article

The Car Dealership Hack: Securing the Supply Chain

The news earlier this week about the CDK hack reveals the major flaw and prevalent issue in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to operate their businesses. Read Full Article

We Need to Talk: Breaking up with Your SIEM Vendor

Think of it like a seesaw. Like in a seesaw, every relationship, be it with your partner, a family member, or a friend, requires effort from both sides to keep it balanced and healthy. But what happens when one person pushes while the other is just along for the ride?  Read Full Article

In a Cloudy World, On-Premises Still Might be The Way To Go

In 2012, I worked for one of the first vendors to deliver security-as-a-service. In those days, securing your environment from the cloud was cutting-edge, and many security teams were leery of introducing what they perceived as another point of failure into their security framework. Read Full Article

Data Management Approaches: Schema-on-Read vs. Schema-on-Write

Since attackers can deploy their payloads in seconds, ensuring your security team isn’t waiting minutes or hours for their security operations platform to notice an attack is underway can mean the difference between an isolated threat and a widespread compromise.  Read Full Article

Stellar Cyber Partners with Minor League Baseball Teams to Launch an Initiative to Educate Young Adults about Cybercrime

“Don’t Click It, Pitch It” is a way to spread brand awareness while creating a broader movement to educate the most vulnerable members of the online community. During an initiative with the Ogden Raptors, Steve noticed that the tagline was very popular and gained a lot of positive traction. Read Full Article

SIEM-Apocalypse: How to Protect Your Security Team During a Time of Turmoil

As I wrote a couple of weeks ago, it is evident that the long-anticipated consolidation of security products and vendors is well underway. With significant market players Exabeam and LogRyhthm merging, Splunk now officially under the umbrella of Cisco, and Palo Alto Networks scooping up IBM QRadar SIEM Cloud business, the market momentum for consolidation is no longer a ripple but a Tsunami. Read Full Article