How TruSTAR Uses MTTD and MTTR as North Star Metrics The north star metrics for Data-Centric Security Automation are the minimization of MTTD (Mean Time to Detection) and MTTR (Mean Time to Resolution). ... Read More
TruSTAR’s Intelligence Sharing Summit 2020 Over the past six years, TruSTAR has built partnerships with multiple information-sharing organizations to enable the exchange of suspicious event ... Read More
Do You Need a Data Scientist in Your SOC? Data is the life-blood of any functional security team. Without data, you can’t make informed decisions, you can’t get to the root of the problem, ... Read More
IT-ISAC Renews Strategic Partnership with TruSTAR to Provide Intelligence Management and Sharing for Technology Companies TruSTAR and IT-ISAC have extended their partnership to help technology organizations build a collaborative intelligence sharing community to defend ... Read More
Covail and TruSTAR Announce Renewed Partnership Covail, formerly known as Columbus Collaboratory, has formally renewed its partnership with TruSTAR to expand cybersecurity and business optimization ... Read More
How to Get the Most out of Your Community Plus Toolkit TruSTAR is the Intelligence Management Platform that powers some of the largest ISAC/ISAO threat intelligence exchanges in North America.  Read More
How RH-ISAC Members Use TruSTAR to Automate and Action Shared Intelligence RH-ISAC recently held a webinar for their members outlining the benefits they receive from TruSTAR. TruSTAR is the Intelligence Management Platform ... Read More
IT-ISAC Member Training: Spotlight on Splunk ES TruSTAR recently held a training webinar for IT-ISAC members. TruSTAR is the Intelligence Management Platform that powers IT-ISAC’s threat ... Read More
Announcing TruSTAR Phishing Triage & New Intelligence Scoring Capabilities Today TruSTAR has launched Phishing Triage, a new suite of features designed to automatically ingest, extract, normalize, prioritize, and take action ... Read More
Intelligence Sharing in the Time of COVID-19 Over the past few months, the world of information sharing has started to come together with security integration and automation. First, the ... Read More