true
Our Next Step Today is a huge step for TruSTAR. Almost seven years ago, we started on a journey to break down the silos around security intelligence to help cyber ... Read More
Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR “The fact that we can easily integrate with all of our data sources that we were pulling in externally by using TruSTAR, as well as any internal data ... Read More
The Data Dilemma in Cybersecurity Last week, the Wall Street Journal reported that the “scarcity of data needed to train models is slowing progress” toward the promise of fortifying ... Read More
TruSTAR Enclave: Not Your Grandpa’s “Trusted Circle” In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cyber security. Exclusively a group ... Read More
How to Build a Data-Centric SOC Managing intelligence in enterprise security is about managing data to drive automation.  Read More
The Modern Security Tech Stack Understanding your data is the first step in leveling up to automation and orchestration. To be a leader in the next decade, cyber intelligence and ... Read More
LogMeIn Accelerates Detection Use Case and Reduces Manual Analyst Workflow By Using TruSTAR   “TruSTAR allowed me to play out my use cases for free. Seeing the value that even the free version provided, and then seeing what the paid version ... Read More
The Data-Centric vs. App-Centric Approach to Security The influx of funding into the cybersecurity space in the last 20 years has led to an explosion of cybersecurity products and contributed to an ... Read More
COVID-19 Impact & Community Response The following blog post details the security impact COVID-19 has on enterprise security teams. To learn more about TruSTAR and IBM’s Community effort ... Read More
WannaCry Attribution - The Missing Link or Missing The Point?   Read More