true
Our New Automated Whitelisting Capability False positives waste time. At TruSTAR, our mission is to empower analysts to make smarter decisions faster about where to focus precious ... Read More
An Introduction to Machine Learning Through URL Whitelisting By Nicolas Ksieb and Ivan Aguilar Read More
The Machine Learning Model Behind Project Splinter In this project summary, we walk you through how we built the machine learning algorithms behind our RAT prediction tool Project Splinter.  Read More
The 5 Most Common Pitfalls of Cyber Threat Indicator Scoring & How to Solve Them [PART 2] In this conclusion of a two-part series, Director of Product Shimon Modi explains how TruSTAR calculates scores that help analysts determine IoC ... Read More
The 5 Most Common Pitfalls of Cyber Threat Indicator Scoring & How to Solve Them [PART 1] In the first of this two-part series, Director of Product Shimon Modi outlines identifies the common IoC scoring mistakes. Check out PART 2 to learn ... Read More
Increase Your Chances of Catching a RAT In July Fidelis Cybersecurity released their Barncat Intelligence Data to security researchers and the research team at TruSTAR decided to take a ... Read More
Introducing Private Enclaves: Targeted Incident Exchange Collaboration within TruSTAR Introducing Private Enclaves: Targeted Incident Exchange Collaboration within TruSTAR Read More
Using Graph Models to Make the Case for Greater Cyber Security Incident Collaboration When the renowned mathematician Euler first used graph theory in 1736 to solve the problem of the seven bridges of Königsberg he was trying to solve ... Read More