Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Correlation Rules: Enhancing Your Threat DetectionLogs represent the real-time activities of every single corner of your enterprise. Each audit log contains the information of a user’s activity, parameters, resources, and timing, making them a veritable goldmine of data. Read Full ArticleSIEM
Stellar Cyberstellarcyber.hashnode.dev·Dec 19, 2024SIEM Use Cases: Automating Security for Comprehensive ProtectionKnowing how to apply the analytical power of your security tool is key to achieving full visibility and efficiency. The flexibility of mission-critical tools like a Security Information and Event Management (SIEM) allows for unparalleled log manageme...Stellar cyber
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024AI-Driven Threat DetectionThreat detection and response is enterprise cybersecurity in a nutshell – it’s the all-encompassing term for the processes and technologies that go into identifying potential security threats. Read Full ArticleThreatDetection
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024Enhancing Security Operations with 1Password IntegrationAt Stellar Cyber, we’re committed to empowering security teams with the tools they need to protect increasingly complex digital environments. That’s why we’re excited to introduce our latest integration with 1Password, a leader in identity security t...Security
Stellar Cyberstellarcyber.hashnode.dev·Sep 10, 2024Hyperautomation for Security TeamsSix years ago, we founded DTonomy, a security automation company. As security software engineers and data scientists who had worked at the forefront of security operations — from building large-scale AI-based EDR systems to managing daily security op...#cybersecurity
FIKARA BILALblog.fikara.io·Aug 29, 2024Déploiement des agents WazuhPré-requis Installation de Wazuh Il existe plusieurs moyens de déployer l'agent Wazuh sur les terminaux. Après avoir installé correctement le wazuh-dashboard, le wazuh-manager et le wazuh-indexer, les agents peuvent maintenant être installés depuis...155 readsSecurity
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...520 readsSecurity
Stellar Cyberstellarcyber.hashnode.dev·Jul 15, 2024AI-Native CybersecurityAI’s ability to handle large-scale data analysis and implement real-world recommendations makes it a potentially crucial tool for cybersecurity particularly in the context of over-stretched security teams. Read Full ArticleSIEM
Stellar Cyberstellarcyber.hashnode.dev·Jul 15, 2024Integrate Large Language Models into SIEM ToolsSecurity information and event management (SIEM) tools offer a tried and tested way of achieving insight across even the most sprawling and complex environments. Read Full ArticleOpen XDR
Stellar Cyberstellarcyber.hashnode.dev·Jul 15, 2024What is AI-Powered PhishingIn the millions of campaigns conducted by attackers in the last 12 months, phishing emails and messages have provided a way in for the vast majority. Human behavior is unpatchable, and training takes time. Read Full ArticleOpen XDR