Every security tool vendor talks about detection and response, so what makes NDR so special, and how does it relate to XDR / Open XDR?

NDR is special because it focuses on the nerve center of an organization’s IT infrastructure: the network. Wireless or wired device, endpoint or server, application…

What is NDR?
Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). …

In the last several months the XDR acronym is being used by almost every security product manufacturer. It is one thing to say that you have it, but the hard work that goes into building the detections takes years. It is not enough to say that you have a big…

Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools and audits. These regulations have the right goal in mind: protect companies, their intellectual property and their customers. Unfortunately, by the time these laws make…

In 2017, Equifax, one of the world’s largest credit reporting agencies suffered a cyber breach of unprecedented impact and scale. More than 145 million records of personal identifiable information were stolen by cyber criminals. …

Domain Generation Algorithms (DGAs) are a class of algorithms that periodically and dynamically generate large numbers of domain names. Typically, the domains are used by malware and botnets as rendezvous points to facilitate callback to the malicious actor’s Command & Control servers. DGAs allow malware to generate tens of thousands…

Artificial Intelligence and Machine Learning are the technologies that are at the forefront of what is being called the world’s 4th industrial revolution. Since the beginning of the human race, man has strived to improve how efficiently we live and work. At first humans relied on simple manual labor and…

Distributed Security Intelligence

Artificial Intelligence is radically transforming the cybersecurity industry. To successfully use A.I for security, the quality of the data is paramount. Security-related data must be collected from many different sources — network data from packets, server data from commands and processes, application data such as logs, and…

DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims.

According to Techcrunch the hackers first compromised the intended target via spearphishing. They then used known exploits to target servers and routers and move laterally within the…

https://omny.fm/shows/the-silicon-valley-insider-show/stellar-cyber-podcast

On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber (stellarcyber.ai) an innovative cyber security company using artificial intelligence (AI) and machine learning (ML) to empower SMBs (small and medium sized businesses) to gain access to the same types of advanced security tools that Fortune 500 companies do.

John discusses how the founders of Stellar Cyber (formerly named Aella Della) got their start and how their security platform provides a unique approach via their customers’ MSSPs (managed security service providers) and their SOCs (security operation centers). John discusses the struggle of any company to managed all of the cyber security tools they use due to resource and budget constraints.

Stellar Cyber

Stellar Cyber’s Open XDR platform delivers Everything Detection and Response by unifying all currently disjointed security tools and data sources.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store