Request a Demo
This WannaCry Video Shows How the Ransomware Spread Across Sectors
By TruSTAR on May 22, 2017
Have 52 seconds? Here's a quick video using TruSTAR's Timeline feature that shows the WannaCry ransomware attack spreading across industry sectors ...
Dark Reading Op-Ed - Threat Intelligence is (Still) Broken: A Cautionary Tale from the Past
By TruSTAR on April 26, 2017
RSA Demo with CSO Online: TruSTAR anonymizes incident data to improve information exchange
By TruSTAR on February 23, 2017
Last week we had the pleasure of speaking with CSO Online’s Steve Ragan on the RSA Expo floor.
New Funding Round: Powering Our Growth
By Paul Kurtz, Co-Founder on February 09, 2017
Today I am thrilled to announce TruSTAR’s latest financing round that will power our next growth phase. Storm Ventures led the $5M Series A round ...
Kaspersky Labs recently released a report describing a coordinated attack focused on industrial…
By Patrick Coughlin, Co-Founder & CEO on January 16, 2017
Kaspersky Labs recently released a report describing a coordinated attack focused on industrial companies that targeted some 500 companies in 50 ...
TruSTAR Project Balerion — Embrace Your Inner Scientist
By Shimon Modi, Head of Product on January 14, 2017
For the past few years TruSTAR has been pioneering a new way for organizations and operators to exchange incidents anonymously and make faster and ...
Increase Your Chances of Catching a RAT
By Nicolas Kseib, Lead Data Scientist on September 29, 2016
In July Fidelis Cybersecurity released their Barncat Intelligence Data to security researchers and the research team at TruSTAR decided to take a ...
How Can a Cyber Incident Exchange Help You Avoid the Next Attack?
By Paul Kurtz, Co-Founder on March 16, 2016
In February, Hollywood Presbyterian Medical Center was hit by a serious ransomware attack placing many patient lives at risk. Locky, the ransomware ...
Using Graph Models to Make the Case for Greater Cyber Security Incident Collaboration
By Nicolas Kseib, Lead Data Scientist on March 14, 2016
When the renowned mathematician Euler first used graph theory in 1736 to solve the problem of the seven bridges of Königsberg he was trying to solve ...
Companies Can Share Cyber Threat Information AND Protect Privacy
By Patrick Coughlin, Co-Founder & CEO on October 23, 2015
The controversial Cyber Information Sharing Act (CISA) cleared a key hurdle in the Senate this week and is likely headed for a vote next week. This ...
OSINT Threat Reports
Subscribe to Updates
Service Level Agreements
Terms and Conditions
Service Level Agreements