Request a Demo
How To Make Your Threat Intelligence Data More Actionable
By Kevin Menezes on June 19, 2018
Threat intelligence data is extremely valuable, but how do you effectively make use of it within your company? TruSTAR recently sat down with two ...
We've Made It Easier For You To Find High-Priority Indicators
By Shimon Modi, Head of Product on June 08, 2018
Today we’re announcing a major update to our IOC management feature to help security teams identify high-priority indicators while investigating ...
New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange
By Paul Kurtz, Co-Founder & CEO on April 18, 2018
This week at the 2018 RSA Conference, the Cloud Security Alliance released a new framework for Building a Foundation for Successful Cyber Threat ...
Improve Efficiency of Intelligence Analysis Using IOC Management Feature
By Shimon Modi, Head of Product on April 16, 2018
Cyber observables and IOCs are the building blocks of intelligence analysis. They're critical to making accurate decisions throughout the ...
Introducing TruSTAR’s New Source Scoring Model
By Nicolas Kseib, Lead Data Scientist on March 29, 2018
Having confidence in your intelligence sources is essential to running successful security operations. But measuring the effectiveness of how your ...
New E-Book: 5 Steps to Optimizing Your Threat Intelligence
By Paul Kurtz, Co-Founder & CEO on March 16, 2018
If you want to know how TruSTAR really feels about the state of threat intelligence today, look no further.
Optimize Sharing Group Intelligence Into Your Security Operations
By TruSTAR on March 09, 2018
Improved Enclave Filter View
By Nicolas Kseib, Lead Data Scientist on February 21, 2018
Since launching Marketplace in January we have been collecting feedback to improve user experience.
Our New Automated Whitelisting Capability
By Nicolas Kseib, Lead Data Scientist on February 20, 2018
False positives waste time. At TruSTAR, our mission is to empower analysts to make smarter decisions faster about where to focus precious ...
Dark Reading Threat Dashboard Series | Tracking Bitcoin Wallets as IOCs for Ransomware
By Curtis Jordan, Lead Security Engineer on February 12, 2018
Tracking Bitcoin Wallets as IOCs for Ransomware is the third post of a threat intelligence dashboard series developed by TruSTAR and Dark Reading. ...
Subscribe to Updates
Terms and Conditions