TruSTAR Newsroom

Stay up to date with the latest news from TruSTAR.

 

DarkReadingLogo-300x300  

The No Good, Very Bad Week for Iran's Nation-State Hacking Ops

A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions.

Read More

 
Icon_PressRelease  

TruSTAR and Covail Announce Renewed Partnership

TruSTAR and Covail deliver security intelligence management solutions that enable customers to align risk posture with business objectives and results.

Read More

 
Icon_adWeek  

404bot Underscores the Ever-Evolving Threat of Ad Fraud

TAG & TruSTAR team up to defeat an elaborate scheme designed to circumvent Ads.txt safeguards.

Read More

 
Icon_theHill  

Three ways hackers can help protect our national cyber infrastructure

TruSTAR partner IT-ISAC is working to secure future elections by building bonds with ethical hackers.

Read More

 
Icon_cio-dive-logo  

How data science tools can lighten the load for cybersecurity teams

TruSTAR lead Data Scientist Nicolas Kseib shares how his work helps SOCs identify attack patterns and detect threats.

Read More

 
Icon_IBM-security  

LACL TISP Threat Sharing

Built by IBM Security & TruSTAR, the LACL TISP allows LA Cyber Lab members to collaborate by sharing and enriching threat intelligence.

Read More

 
Icon_PressRelease  

Defending Digital Campaigns Increases Available Security Resources to 2020 Campaigns

Defending Digital Campaigns (DDC) announces TruSTAR as one of their ten new partner companies that will help campaigns be better equipped and secure during the 2020 election cycle.

Read More

 
DarkReadingLogo-300x300  

Leveraging the Cloud for Cyber Intelligence

TruSTAR Co-founder & Executive Chairman Paul Kurtz shares how to leverage datasets and cloud technology to create a real-time understanding of suspicious activity across an enterprise.

Read More

 
security-boulevard-resource-page-tile  

Ask the Experts: What are the biggest cyber security threats for 2020?

Security Boulevard asks TruSTAR Co-founder Paul Kurtz and other cybersecurity experts their thoughts about the biggest threats for 2020.

Read More

 
heavybit-resource-page-tile  

Rethinking Enterprise Security for the Era of Ecosystems

TruSTAR Co-founder & CEO Patrick Coughlin challenges enterprise teams to break down silos to create an integrated security ecosystem.

Read More

 
Icon_BlueVoyant  

Ransomware Continues the Upward Swing

BlueVoyant shares their thoughts about the evolving attack vectors and patterns shown in ransomware attacks.

Read More

 
Icon_NextGov  

A Plan to Engage Hackers in Election Security

TruSTAR partner IT-ISAC wants to create a coordinated vulnerability disclosure program that could alert vendors about security flaws in their voting systems.

Read More

 
Icon_PressRelease  

Retail Hospitality ISAC and TruSTAR Announce Strategic Partnership To Advance Threat Intelligence Management Capabilities Among Members

TruSTAR and the Retail and Hospitality ISAC formalized their strategic partnership to provide RH-ISAC members with next-generation cyber intelligence sharing capabilities.

Read More

 
Icon_InfoSecurity  

City of Los Angeles Teams Up with IBM to Fight Cybercrime

The City of Los Angeles, IBM, and TruSTAR are joining forces with the LA Cyber Lab to help local businesses combat cybercrime.

Read More

 
Icon_ArsTechnica_logo-18  

Los Angeles partnership launches platform to help people catch phishes

City of Los Angeles announces joint initiative with IBM and TruSTAR, which will provide members of LA Cyber Lab with new, free security intelligence management tools.

Read More

 
Icon_government-technology  

LA, IBM, TruSTAR Launch Threat Intelligence Platform for Businesses

The first publicly available platform of its kind in the U.S., it's aimed at offering small and mid-sized businesses cyberthreat tracking capabilities and trend analysis that otherwise wouldn't be accessible.

Read More

 
Icon_PressRelease  

IBM Works With City of Los Angeles to Combat Cybercrime

The centerpiece of IBM and TruSTAR's collaboration with the City of Los Angeles and the LA Cyber Lab is the new threat sharing platform called the LA Cyber Lab Cyber Threat Intelligence Sharing Platform (TISP)

Read More

 
Icon_SiliconAngle  

In cybersecurity, it’s AI vs. AI: Will the good guys or the bad guys win?

TruSTAR Lead Data Scientist Nicolas Kseib: "AI could be used to create emails that mimic a specific individual’s writing style."

Read More

 
Icon_OSINT-podcast  

OSINT Podcast - The Future of Cyber Threat Intelligence

TruSTAR Product Manager discusses the future of Cyber Threat Intelligence, Phishing, Fraud.

Read More

 
Resource_SecurityWeek  

The United States and China - A Different Kind of Cyberwar

China is conducting a low and slow cyberwar, attempting to stay under the radar and maneuver the global economy. 

Read More

 
Resource_SDTimes  

Companies to Watch 2019

SD Times acknowledges TruSTAR's unique approach to security, mentioning it as one of their Companies to Watch.

Read More

 
brighttalk-horizontal-lock  

Intelligence Fusion - Enterprise Security Ops Built for Speed

Join Richard Clarke, the White House’s first Cyber Czar and former Assistant Secretary of State for Politico-Military Affairs, Sherri Ramsay, former Director of NSA's Threat Operations Center, and Chris Day, Chief Cybersecurity Officer at Cyxtera for an exciting panel that will explore the evolution and power of intelligence fusion.

Read More

 
Resource_TheHill  

Officials prepare for potential false claims of election interference

Alongside other security leaders, TruSTAR Co-founder and former senior White House security advisor Paul Kurtz shares their thoughts about election interference.

Read More

 
rackspace_logo_2  

Finally, a Truly Secure Approach to Threat Intelligence Exchange

Rackspace mentions TruSTAR as an integral piece when it comes down to securely exchanging threat intelligence.

Read More

 
recorded-future-logo  

Recorded Future Podcast: Intelligence Sharing to Protect Ourselves and Each Other

Recorded Future invites TruSTAR Co-founder Paul Kurtz to discuss his thoughts about information sharing and why security professionals can't rely on the government to protect them in the cyberworld.

Read More

 
Resource_FCW  

The challenge of providing a common defense in cyberspace

In this guest article, TruSTAR Co-founder Paul Kurtz discusses the need for private and public sector to work together when it comes to stopping cyberattacks.

Read More

 
cyber  

Cyber Defense Magazine Names TruSTAR the Next-Gen Threat Intelligence Leader of 2018

TruSTAR wins Cyber Defense Global Awards for 2018 from Cyber Defense Magazine which recognizes new and unique technologies in information security.

Read More

 
wp-resource-logo  

The U.S. needs to think about the unthinkable on cybersecurity

Washington Post contribution by TruSTAR advisor, Stewart Baker.

Read More

 
DarkReadingLogo-300x300  

The State of Information Sharing 20 Years after the First White House Mandate

Actionable guidance for ISACs and enterprises on what intelligence management features will help you ingest, normalize, and share data the fastest.

Read More

 
Icon_PressRelease  

TruSTAR to Unveil Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018

TruSTAR's data science team presents the only blockchain research tool selected for both research villages at Black Hat and DEF CON 2018, two of the largest, most highly-regarded cybersecurity conferences in the U.S.

Read More

 
Resource_bitcoin  

Black Hat Demo to Reveal 'White Rabbit' Crypto-Transaction Surveillance Tool

New data science research from TruSTAR tethers illicit ransomware crimes to bitcoin transactions.

Read More

 
DarkReadingLogo-300x300  

Stop the Cyber Madness: Why the Private Sector Must Lead the Fight

As long as adversaries can spend $1 on a campaign and force us to spend $10 to protect ourselves, enterprises will lose the war on cybercrime.

Read More

 
DarkReadingLogo-300x300  

The Case for Integrating Physical Security & Cybersecurity

Byline from our CEO. Aggregating threat intel feeds from commercial vendors is no longer enough. You must look inside your own four walls to correlate and enrich SIEM and Case Management data with external intelligence.

Read More

 
Icon_SiliconAngle  

The State of Cybersecurity

TruSTAR was interviewed by SiliconANGLE on the state of cybersecurity along with leaders like Brian Krebs, Malwarebytes, G2 Crowd and more. The private sector can turn the tide through collaboration.

Read More

 
DarkReadingLogo-300x300  

Tracking Bitcoin Wallets as IOCs for Ransomware

By understanding how cybercriminals use bitcoin, threat analysts can connect the dots between cyber extortion, shared infrastructure, TTPs, and attribution.

Read More

 
Resource_POLITICO  

Taking measure of how much hacking data is being shared with DHS

TruSTAR makes sense of new statistics from US-CERT on DHS Automated Indicator Sharing (AIS) progress.

Read More

 
DarkReadingLogo-300x300  

Block Threats Faster: Pattern Recognition in Exploit Kits

Identifying attack patterns can help you mitigate threats faster.

Read More

 
WSJ-Logo-square  

The C-Suite is a Prime Target for Cyberattacks

TruSTAR COO Patrick Coughlin talks about the ways top executives can fight back to protect their companies’ information.

Read More

 
DarkReadingLogo-300x300  

6 Steps for Sharing Threat Intelligence - Dark Reading

Practical tips on how to share threat intelligence data from CEO Paul Kurtz.

Read More

 
Resource_RetailLeader  

Meet the Retail-CISC's Cyber Secret Weapon

TruSTAR & R-CISC are working together to perfect retail’s “Cyber Secret Weapon."

Read More

 
Resource_SecurityWeek  

The Role of America's New Unified Cyber Command

D.C. is buzzing about the elevated status of U.S. Cyber Command. "This decision affirms cyberspace as a new war domain," says TruSTAR CEO Paul Kurtz.

Read More

 
brighttalk-horizontal-lock  

The Value of Threat Intelligence Sharing

TruSTAR CEO Paul Kurtz talks to former AT&T CISO Ed Amoroso about threat intelligence sharing at the Gartner Security Summit.

Read More

 
Icon_SiliconAngle  

An innovative cybersecurity collaboration experiment takes root in Columbus

A feature story on our partnership with Columbus Collaboratory. "TruSTAR is a sharing mechanism that effectively supports the trusted relationships we've created.”

Read More

 
DarkReadingLogo-300x300  

RIG Exploit Kit Takedown Sheds Light on Domain Shadowing

Commodity ransomware continues to rise. TruSTAR's Director of Product Shimon Modi sheds light on the major RIG Exploit Kit takedown by GoDaddy and RSA Security.

Read More

 
Resource_SecurityWeek  

Ohio Companies Unite to Share Threat Intelligence

Feature article in SecurityWeek detailing TruSTAR's new partnership with Columbus Collaboratory.

Read More

 
DarkReadingLogo-300x300  

Inside the Motivations Behind Modern Cyberattackers

Coverage from Interop Las Vegas. Attackers are sharing infrastructure to target businesses... and we need to fight fire with fire.

Read More

 
Resource_CNNMoney  

Why the massive WannaCry cyberattack won't make hackers rich

What were the motivations behind WannaCry? TruSTAR co-founder Patrick Coughlin weighs in on why the attack won't make hackers rich.

Read More

 
resources-la-times  

WannaCry Wolf? - The Los Angeles Times

Our analysis on how WannaCry is using shared IP infrastructure to spread ransomware.

Read More

 
Icon_SiliconAngle  

WannaCry ransomware infections are likely to get worse this week

"A sector-specific approach to cybersecurity is no longer sufficient." TruSTAR WannaCry commentary featured in SiliconANGLE.

Read More

 
DarkReadingLogo-300x300  

Threat Intelligence Is (Still) Broken: A Cautionary Tale from the Past

There are striking parallels between counter-terrorism threat analysis before 9-11 and how we handle cyber threat intelligence today.

Read More

 
Resource_CIO  

How Secure Is Your Supply Chain?

Collaboration with industry peers could make a critical difference in supply chain security.

Read More

 
DarkReadingLogo-300x300  

Commodity Ransomware Is Here

Launching a ransomware campaign shouldn't be easy as ordering pizza. Why commodity ransomware is here & what we can do about it.

Read More

 
resources-washington-post  

Booz Allen Gets Carmakers to Work Together Against Hackers

Threat intelligence exchange case study in WaPo's Capital Business section, featuring commentary from TruSTAR CEO Paul Kurtz.

Read More

 
Icon_SC-MEDIACYBERSOURCEnotag  

Commodity Ransomware Is Here

TruSTAR threat researchers chart TTP correlations between Grizzly Steppe and Carbanak.

Read More