SolarWinds - How Cyber Security Teams Should Respond TruSTAR Co-Founder, Paul Kurtz, was published in the Cloud Security Alliance blog regarding the recent SolarWinds hack. Read More
How to Build a Data-Centric SOC Managing intelligence in enterprise security is about managing data to drive automation.  Read More
TruSTAR and CSA Partner on White Paper TruSTAR Executive Chairman and Co-Founder, Paul Kurtz, has been working closely with Jim Reavis, CEO, and John Yeoh, Global Vice President of ... Read More
The Modern Security Tech Stack Understanding your data is the first step in leveling up to automation and orchestration. To be a leader in the next decade, cyber intelligence and ... Read More
LogMeIn Accelerates Detection Use Case and Reduces Manual Analyst Workflow By Using TruSTAR   “TruSTAR allowed me to play out my use cases for free. Seeing the value that even the free version provided, and then seeing what the paid version ... Read More
The Evolution of Intelligence in Security Operations In the last decade, threat intelligence catapulted to the forefront of security operations as companies like Mandiant and iSight Partners started to ... Read More
Looking at Both Sides of the Data Lake Argument While data lakes are often compared to data warehouses, the only thing they have in common is that both are used to store, and later analyze, massive ... Read More
The Data-Centric vs. App-Centric Approach to Security The influx of funding into the cybersecurity space in the last 20 years has led to an explosion of cybersecurity products and contributed to an ... Read More
Toward MTTD & MTTR as North Star Metrics Data-centric security leaders from across industries have embraced Mean-time-to-Detection (MTTD) and Mean-time-to-Resolution (MTTR) as key metrics ... Read More
How TruSTAR Uses MTTD and MTTR as North Star Metrics The north star metrics for Data-Centric Security Automation are the minimization of MTTD (Mean Time to Detection) and MTTR (Mean Time to Resolution). ... Read More