Stellar Cyber

Stellar Cyber adds a new “Data Streaming” Application to its Starlight platform
Security provider Stellar Cyber, with the first Open-XDR security application platform, announced that it has added a new “Data Streaming” Application to its Starlight …

Stellar Cyber unveils Starlight 3.3, a data- and AI-based security analytics solution
Security analytics provider Stellar Cyber announced the launch of Starlight 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based …

Stellar Cyber Starlight platform now integrates with Amazon’s VPC traffic mirroring
Stellar Cyber, a Silicon Valley-based security analytics provider, announced that its Starlight platform can immediately integrate with Amazon’s newly released VPC traffic …

Starlight 3.1 leverages AI and ML for automated threat hunting
Security professionals have long struggled with cyber defense activities like manual threat detection and extreme firewall noise – until now. Security analytics provider …

Stellar Cyber raises $13.2M, rebrands from Aella Data and expands board and executive team
Validating its pioneering position in the rapidly-evolving cybersecurity industry, security analytics provider Stellar Cyber announced that it has closed $13.2 million in …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility