Request a Demo
Making Sense of Unstructured Intelligence Data Using NLP
By Zainab Danish, Data Scientist on March 13, 2019
The push towards structuring threat intelligence data has gained new momentum with the proliferation of new intelligence sharing ontologies like ...
TruSTAR To Present Blockchain Research Tool At ShmooCon 2019
By TruSTAR on December 12, 2018
TruSTAR is headed to ShmooCon 2019! As a follow-on to our blockchain research debut at Black Hat and DEF CON 2018, TruSTAR will present a second ...
TruSTAR To Speak At BSides SF Ahead of RSA 2019
By TruSTAR on December 04, 2018
TruSTAR’s Data Science team is headed to Security BSides SF 2019! As we prepare our research presentation, here’s some more info about our abstract ...
CryptoLocker Deep-Dive: Why We Use Bitcoin Addresses as an IOC
By Nicolas Kseib, Lead Data Scientist on August 09, 2018
Follow the Money: Tracking Adversaries Through the Blockchain WhiteRabbit is an open source research tool we're debuting at Black Hat and DEF CON ...
Unveiling Our New Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018
By TruSTAR on August 06, 2018
Las Vegas, Aug. 06, 2018 (GLOBE NEWSWIRE) — The data science team behind TruSTAR will be presenting the only blockchain research tool selected for ...
Introducing TruSTAR’s New Source Scoring Model
By Nicolas Kseib, Lead Data Scientist on March 29, 2018
Having confidence in your intelligence sources is essential to running successful security operations. But measuring the effectiveness of how your ...
Our New Automated Whitelisting Capability
By Nicolas Kseib, Lead Data Scientist on February 20, 2018
False positives waste time. At TruSTAR, our mission is to empower analysts to make smarter decisions faster about where to focus precious ...
An Introduction to Machine Learning Through URL Whitelisting
By Nicolas Kseib, Lead Data Scientist on August 14, 2017
By Nicolas Ksieb and Ivan Aguilar
The Machine Learning Model Behind Project Splinter
By Nicolas Kseib, Lead Data Scientist on July 26, 2017
In this project summary, we walk you through how we built the machine learning algorithms behind our RAT prediction tool Project Splinter.
The 5 Most Common Pitfalls of Cyber Threat Indicator Scoring & How to Solve Them [PART 2]
By Shimon Modi, Head of Product on July 13, 2017
In this conclusion of a two-part series, Director of Product Shimon Modi explains how TruSTAR calculates scores that help analysts determine IoC ...
OSINT Threat Reports
Subscribe to Updates
Service Level Agreements
Terms and Conditions
Service Level Agreements