true
Intelligence Management and Gartner's SOAR: Thinking About Workflow First Gartner's Security Orchestration Automation and Response (SOAR) market category was announced in November 2017, and since then we've seen numerous ... Read More
New Research from Cloud Security Alliance: Building a Foundation for Successful Cyber Threat Intelligence Exchange This week at the 2018 RSA Conference, the Cloud Security Alliance released a new framework for Building a Foundation for Successful Cyber Threat ... Read More
New E-Book: 5 Steps to Optimizing Your Threat Intelligence If you want to know how TruSTAR really feels about the state of threat intelligence today, look no further. Read More
How TruSTAR Aligns With Dark Reading’s 6 Steps for Sharing Threat Intelligence Late last week, Steve Zurier of Dark Reading published an insightful article covering the 6 Steps for Sharing Threat Intelligence in collaboration ... Read More
Cyber Awareness Month: When is not knowing acceptable? October is Cybersecurity Awareness Month. This has been true for the last 14 years. As each year passes rather than becoming aware of how to better ... Read More
Overcoming the Legal Barriers to Information Sharing Today the Retail Cyber Incident Analysis Center (R-CISC) released some useful guidance on the utility of the Cybersecurity Act of 2015 and how it ... Read More
WannaCry: Seeing the Bigger Picture   Read More
Commodity Ransomware is Here Brian Krebs recently posted a blog on a slick ransomware-as-a-service interface called “Philadelphia,” enabling almost anyone to launch a ransomware ... Read More
Grizzly Steppe and Carbanak: The Dangers of Miscalculation in Cyberspace *Note: Insights from this blog were picked up by SC Magazine. Check out the article here. Read More
2017 Cybersecurity Reality Check - Groundhog Day all over again? The cyber security community descends on San Francisco next week for the RSA Security Conference to review the latest products to address our ... Read More