true
The Data Dilemma in Cybersecurity Last week, the Wall Street Journal reported that the “scarcity of data needed to train models is slowing progress” toward the promise of fortifying ... Read More
TruSTAR Enclave: Not Your Grandpa’s “Trusted Circle” In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cyber security. Exclusively a group ... Read More
COVID-19 Impact & Community Response The following blog post details the security impact COVID-19 has on enterprise security teams. To learn more about TruSTAR and IBM’s Community effort ... Read More
WannaCry Attribution - The Missing Link or Missing The Point?   Read More
WannaCry Wolf? By now, we all know the story: The WannaCry (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) attack has impacted over 200,000 computers across 150 ... Read More
WannaCry Ransomware Is Using Shared IP Infrastructure To Spread By now, we all know the story: The WannaCry (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) attack has impacted over 200,000 computers across 150 ... Read More
Kaspersky Labs recently released a report describing a coordinated attack focused on industrial… Kaspersky Labs recently released a report describing a coordinated attack focused on industrial companies that targeted some 500 companies in 50 ... Read More
Companies Can Share Cyber Threat Information AND Protect Privacy The controversial Cyber Information Sharing Act (CISA) cleared a key hurdle in the Senate this week and is likely headed for a vote next week. This ... Read More