The Data-Centric Revolution: Restoring Sanity to Enterprise Security Operations TruSTAR CEO and Co-Founder, Patrick Coughlin, recently sat down with Dave McComb, President of Semantic Arts, to talk through what it means to be ... Read More
Paul Kurtz Joins Cal CISO to Discuss Cloud-Based Security Read More
Available Now: TruSTAR Intelligence Management for ServiceNow Security Incident Response ServiceNow users can now benefit from TruSTAR’s data-centric security intelligence management ecosystem to better inform incidents and improve ... Read More
Only the Paranoid Survive, Recast for Cybersecurity Andrew Grove's seminal business management book Only the Paranoid Survive offers a fitting title for the current state of cybersecurity and a roadmap ... Read More
TruSTAR Joins the Open Cybersecurity Alliance In our continued efforts to Defend Better Together, we’ve joined the Open Cybersecurity Alliance (OCA), an open source initiative with the goal to ... Read More
Stories of Cyber Defense Collaboration: Trustworthy Accountability Group (TAG) Nicole Perloth’s new book, This is How They Tell Me the World Ends, details our past and troubling trajectory in cyberspace. It is a terrific and ... Read More
Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR “The fact that we can easily integrate with all of our data sources that we were pulling in externally by using TruSTAR, as well as any internal data ... Read More
The Data Dilemma in Cybersecurity Last week, the Wall Street Journal reported that the “scarcity of data needed to train models is slowing progress” toward the promise of fortifying ... Read More
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall Cybersecurity operators scramble daily with uncertainty, seeking to determine if their feet are on the ground or standing on a false floor that gives ... Read More
TruSTAR Enclave: Not Your Grandpa’s “Trusted Circle” In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cyber security. Exclusively a group ... Read More