Request a Demo
TruSTAR Enclave: Not Your Grandpa’s “Trusted Circle”
By Patrick Coughlin, Co-Founder & CEO on January 27, 2021
In the early 2010s, ‘Trusted Circles’ were the primary way to share intelligence with other people and parties in cyber security. Exclusively a group ...
The National Credit Union ISAO and TruSTAR Announce Renewed Partnership
By Ray Bardus on January 26, 2021
TruSTAR and the National Credit Union ISAO have renewed their partnership to enable and sustain Credit Union critical infrastructure cyber resilience ...
The Good, Bad, and Ugly of Threat Intelligence with Patrick Coughlin
By Ray Bardus on January 20, 2021
Recently Co-Founder and CEO of TruSTAR, Patrick Coughlin, sat down with Ron Eddings and Chris Chocran from Hacker Valley Podcast to discuss how ...
SolarWinds - How Cyber Security Teams Should Respond
By Ray Bardus on December 17, 2020
TruSTAR Co-Founder, Paul Kurtz, was published in the Cloud Security Alliance blog regarding the recent SolarWinds hack.
How to Build a Data-Centric SOC
By Patrick Coughlin, Co-Founder & CEO on December 17, 2020
Managing intelligence in enterprise security is about managing data to drive automation.
TruSTAR and CSA Partner on White Paper
By Ray Bardus on December 15, 2020
TruSTAR Executive Chairman and Co-Founder, Paul Kurtz, has been working closely with Jim Reavis, CEO, and John Yeoh, Global Vice President of ...
The Modern Security Tech Stack
By Patrick Coughlin, Co-Founder & CEO on December 10, 2020
Understanding your data is the first step in leveling up to automation and orchestration. To be a leader in the next decade, cyber intelligence and ...
LogMeIn Accelerates Detection Use Case and Reduces Manual Analyst Workflow By Using TruSTAR
By Ray Bardus on December 08, 2020
“TruSTAR allowed me to play out my use cases for free. Seeing the value that even the free version provided, and then seeing what the paid version ...
The Evolution of Intelligence in Security Operations
By Ray Bardus on November 19, 2020
In the last decade, threat intelligence catapulted to the forefront of security operations as companies like Mandiant and iSight Partners started to ...
Looking at Both Sides of the Data Lake Argument
By Ray Bardus on November 18, 2020
While data lakes are often compared to data warehouses, the only thing they have in common is that both are used to store, and later analyze, massive ...
OSINT Threat Reports
Subscribe to Updates
Service Level Agreements
Terms and Conditions
Service Level Agreements