Cloud Tunedcloudtuned.hashnode.dev·Apr 4, 2024Understanding SIEM: Security Information and Event ManagementUnderstanding SIEM: Security Information and Event Management In today's digital landscape, cybersecurity threats are a constant concern for organizations of all sizes. Security Information and Event Management (SIEM) systems play a crucial role in h...DiscussSIEM
Stellar Cyberstellarcyber.hashnode.dev·Feb 19, 2024SIEM vs SOAR: Key DifferencesSecurity Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) serve distinct yet overlapping roles in a cybersecurity framework. On one hand, SIEM platforms provide deep insights into potential cyber thr...DiscussSIEM
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024Open XDR vs. SIEMIntroduction: The next generation of security intelligence is here, and it’s called extended detection and response (XDR). XDR is a technology that enables organizations to detect and respond to advanced threats faster, easier and with greater accura...DiscussOpen XDR
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024What makes a lean security team tickWhen budgets and resources are high, security teams have the luxury of building complex security infrastructures made up of only best-of-breed security products. See a new widget that claims to solve a narrow security challenge. Sure, add it to the s...DiscussOpen XDR
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, X...Discussxdr
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024What Are DGAs and How to Detect them?Domain Generation Algorithms (DGAs) are a class of algorithms that periodically and dynamically generate large numbers of domain names. Typically, the domains are used by malware and botnets as rendezvous points to facilitate callback to the maliciou...DiscussSIEM
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims. According to Techcrunch the hackers first compromised the intended target via spearphishing. They then us...DiscussSIEM
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024XDR Without LimitsThe industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response) for endpoints, NDR (network detection and response) for network traffic and so on. Palo Alto Networks (@Pal...Discussxdr
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024Open XDR vs. SIEMMatching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cyberse...DiscussOpen XDR
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024The Case for Open XDR – X Means EverythingThe current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each securit...DiscussOpen XDR