true
Blog TruSTAR & R-CISC Working Together to Perfect Retail’s "Cyber Secret Weapon"

TruSTAR & R-CISC Working Together to Perfect Retail’s "Cyber Secret Weapon"

Blog_retail-leader-logo (1)

TruSTAR is proud to be recognized as the “Cyber Secret Weapon” behind R-CISC's new threat intelligence sharing platform, as reported in Retail Leader.

Last week at the annual Retail Cyber Intelligence Summit in Chicago, R-CISC announced a new technology platform for their Information Sharing and Analysis Center (ISAC). With the help of TruSTAR, R-CISC now supports a more automated method of ingesting data shared by members to more quickly share threat insights with members.

“We are working on the various barriers to information sharing,” said Suzie Squier, Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC) in the article. “Adding TruSTAR as a threat intelligence partner brings the R-CISC one step further in our strategic initiative to expand the capabilities of the Retail ISAC’s technology infrastructure. “The R-CISC is breaking down barriers to information sharing and increasing the usability of actionable intelligence available for our users, allowing them to more easily ingest, act and mitigate cyber threats.”

Read the full write-up on Retail Leader here.

Customer Spotlight Webinar: PVH Corp. TruSTAR has a new webinar series, Customer Spotlight, where we invite security leaders and operators from across the TruSTAR community to share ... Read More
IBM & City of Los Angeles Select TruSTAR to Build Security Tool for Local Businesses On Tuesday, at the 2019 LA Cyber Lab Summit, The City of Los Angeles announced their business partnership with IBM Security and TruSTAR to help local ... Read More
Making Sense of Unstructured Intelligence Data Using NLP The push towards structuring threat intelligence data has gained new momentum with the proliferation of new intelligence sharing ontologies like ... Read More
TruSTAR’s Paul Kurtz Talks To Executive Director of IT-ISAC About the Benefits of Intelligence Fusion   In the past twenty years, companies have deployed more technology, processes, and people to defend its applications and systems than ever before… ... Read More