true
Why Automated Data Workflows are a Foundational Capability for Enterprise SOCs SOAR technologies and the adoption of orchestration have fundamentally changed the way we think about cybersecurity, and we’re all better for it. ... Read More
TruSTAR Announces New MITRE ATT&CK Framework Feature ABOUT MITRE ATT&CK on TruSTAR Read More
New Context Panel Helps Analysts Prioritize Reports Faster Using Trusted Intelligence Sources Introducing the New Context Panel Reducing friction in the analyst workflow is central to how we evolve our product. Today TruSTAR has released a new ... Read More
Ingest Intelligence Faster With the New TruSTAR Google Chrome Extension If you’re an intelligence analyst, you’re probably spending a lot of time searching and scraping the internet for threat intelligence to speed ... Read More
Enrich Your Data With Independent Threat Intelligence Research TruSTAR is a product built by analysts, for analysts. Back in our SOC days, we checked-in with influencers in our field whenever we had an indicator ... Read More
We've Made It Easier For You To Find High-Priority Indicators Today we’re announcing a major update to our IOC management feature to help security teams identify high-priority indicators while investigating ... Read More
Improve Efficiency of Intelligence Analysis Using IOC Management Feature Cyber observables and IOCs are the building blocks of intelligence analysis. They're critical to making accurate decisions throughout the ... Read More
Product Update: Search and Annotate Investigations on TruSTAR Today we are excited to announce the release of a brand new feature that will help you add information to reports and IOCs that you can refer to a ... Read More
TruSTAR’s Cyber Threat Indicator Rating Model Security analysts are continuously faced with the challenge of having to make decisions about prioritizing and investigating indicators in the face ... Read More
Threat Alert: #BadRabbit Correlations & Enrichment on TruSTAR We’re seeing relevant activity on our platform related to Bad Rabbit ransomware. If you’re interested in enrichment data look no further.  Read More