true
PRODUCT
Platform
Use Cases
Phishing Triage
Pricing
INTEGRATE
Applications
ISAC/ISAO
OSINT
Premium Intelligence
LEARN
Whitepapers
Case Studies
More
PARTNERS
Channel Solutions
IBM
ISAC/ISAO
ABOUT
Company
Press
Careers
Blog
Support
Sign In
Request a Demo
Blog
Our New Automated Whitelisting Capability
By Nicolas Kseib, Director of Data & Analytics on February 20, 2018
False positives waste time. At TruSTAR, our mission is to empower analysts to make smarter decisions faster about where to focus precious ...
Read More
An Introduction to Machine Learning Through URL Whitelisting
By Nicolas Kseib, Director of Data & Analytics on August 14, 2017
By Nicolas Ksieb and Ivan Aguilar
Read More
The Machine Learning Model Behind Project Splinter
By Nicolas Kseib, Director of Data & Analytics on July 26, 2017
In this project summary, we walk you through how we built the machine learning algorithms behind our RAT prediction tool Project Splinter.
Read More
The 5 Most Common Pitfalls of Cyber Threat Indicator Scoring & How to Solve Them [PART 2]
By Shimon Modi, Head of Product on July 13, 2017
In this conclusion of a two-part series, Director of Product Shimon Modi explains how TruSTAR calculates scores that help analysts determine IoC ...
Read More
The 5 Most Common Pitfalls of Cyber Threat Indicator Scoring & How to Solve Them [PART 1]
By Shimon Modi, Head of Product on July 13, 2017
In the first of this two-part series, Director of Product Shimon Modi outlines identifies the common IoC scoring mistakes. Check out PART 2 to learn ...
Read More
Increase Your Chances of Catching a RAT
By Nicolas Kseib, Director of Data & Analytics on September 29, 2016
In July Fidelis Cybersecurity released their Barncat Intelligence Data to security researchers and the research team at TruSTAR decided to take a ...
Read More
Introducing Private Enclaves: Targeted Incident Exchange Collaboration within TruSTAR
By Shimon Modi, Head of Product on April 27, 2016
Introducing Private Enclaves: Targeted Incident Exchange Collaboration within TruSTAR
Read More
Using Graph Models to Make the Case for Greater Cyber Security Incident Collaboration
By Nicolas Kseib, Director of Data & Analytics on March 14, 2016
When the renowned mathematician Euler first used graph theory in 1736 to solve the problem of the seven bridges of Königsberg he was trying to solve ...
Read More
Browse Topics
Industry POV
(67)
Product Updates
(45)
Success Stories
(33)
OSINT Threat Reports
(22)
Data Science
(18)
COVID
(5)
Engineering
(2)
Subscribe to Updates
Recent Posts