Stellar Cyberstellarcyber.hashnode.dev·Jan 11, 2025SecOps Automation: Use Cases, ChallengesLearn what SecOps automation is, the various use cases for SecOps automation, and how Stellar Cyber can help organizations overcome key SecOps automation challenges. Read Full ArticleSIEM
Stellar Cyberstellarcyber.hashnode.dev·Jan 11, 2025The Power of Partnership: How Armis and Stellar Cyber Combine Forces to Redefine Security OperationsWhen it comes to cybersecurity, Armis and Stellar Cyber bring something unique to the table. Armis, a recognized leader in asset visibility and management, empowers organizations with real-time, comprehensive visibility across all devices—whether in ...SIEM
Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Correlation Rules: Enhancing Your Threat DetectionLogs represent the real-time activities of every single corner of your enterprise. Each audit log contains the information of a user’s activity, parameters, resources, and timing, making them a veritable goldmine of data. Read Full ArticleSIEM
Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Use Cases: Automating Security for Comprehensive ProtectionKnowing how to apply the analytical power of your security tool is key to achieving full visibility and efficiency. The flexibility of mission-critical tools like a Security Information and Event Management (SIEM) allows for unparalleled log manageme...Stellar cyber
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024AI-Driven Threat DetectionThreat detection and response is enterprise cybersecurity in a nutshell – it’s the all-encompassing term for the processes and technologies that go into identifying potential security threats. Read Full ArticleThreatDetection
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024Enhancing Security Operations with 1Password IntegrationAt Stellar Cyber, we’re committed to empowering security teams with the tools they need to protect increasingly complex digital environments. That’s why we’re excited to introduce our latest integration with 1Password, a leader in identity security t...Security
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024Hyperautomation for Security TeamsSix years ago, we founded DTonomy, a security automation company. As security software engineers and data scientists who had worked at the forefront of security operations — from building large-scale AI-based EDR systems to managing daily security op...#cybersecurity
FIKARA BILALblog.fikara.io·Aug 29, 2024Déploiement des agents WazuhPré-requis Installation de Wazuh Il existe plusieurs moyens de déployer l'agent Wazuh sur les terminaux. Après avoir installé correctement le wazuh-dashboard, le wazuh-manager et le wazuh-indexer, les agents peuvent maintenant être installés depuis...206 readsSecurity
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...690 readsSecurity
Stellar Cyberstellarcyber.hashnode.dev·Jul 15, 2024AI-Native CybersecurityAI’s ability to handle large-scale data analysis and implement real-world recommendations makes it a potentially crucial tool for cybersecurity particularly in the context of over-stretched security teams. Read Full ArticleSIEM