TruSTAR Blog
Collaborating with confidence since 2015
Follow
Following
Latest
Concern Beyond the Courtroom: Law Firms Under Attack
Last week, cyber attacks against numerous high-profile law firms came to light. According to the Wall Street Journal, the firms include…
Paul Kurtz
Apr 4
Combating Simultaneous Cyber Attacks
Combating Simultaneous Cyber Attacks
In 2012 US financial institutions worked together to battle waves of denial of service attacks on their websites. Consumers were denied…
Paul Kurtz
Mar 21
How can a cyber incident exchange help you avoid the next attack?
In February, Hollywood Presbyterian Medical Center was hit by a serious ransomware attack placing many patient lives at risk. Locky, the…
Paul Kurtz
Mar 16
Using graph models to make the case for greater cyber security incident collaboration
Using graph models to make the case for greater cyber security incident collaboration
When the renowned mathematician Euler first used graph theory in 1736 to solve the problem of the seven bridges of Königsberg he was trying…
Nicolas Kseib
Mar 14
About
TruSTAR Blog
Collaborating with confidence since 2015
More information
Followers
6
Elsewhere
Latest
What Does Anonymity Mean in Context of a Collaboration Platform?
Anonymous: Without any name acknowledged, as that as author, contributor, or the like.
Chris Roblee
Mar 3
Escaping the Cybersecurity Vortex
Vortex: A place or situation regarded as drawing into its center all that surrounds it, and hence being inescapable or destructive
David Cullinane
Feb 22
We need a cyber incident exchange now
Hollywood Presbyterian Medical Center was hit by a serious ransomware attack last week according to the reporting by Steve Ragan in CSO…
Paul Kurtz
Feb 15
Implications of the Cybersecurity Act of 2015 for Executives
At TruSTAR we fundamentally believe that incident exchange and collaboration is a necessary tool we need to add to our arsenal of security…
Paul Kurtz
Feb 13
A New Paradigm for Cybersecurity: Connective Defense
We’ve used strategic alliances throughout history to defeat our enemies and solve our most pressing challenges.
Paul Kurtz
Nov 18, 2015
Companies Can Share Cyber Threat Information AND Protect Privacy
In Cyber Security, Companies can Collaborate AND Protect Privacy
¶
The controversial Cyber Information Sharing Act (CISA) cleared a key…
Patrick Coughlin
Oct 23, 2015
An Update from Engineering
New Beta Program for Web-Based TruSTAR Agent Announced
¶
TruSTAR has come a long way since our launch just a few months ago and I wanted…
Chris Roblee
Jul 22, 2015
A Dangerous Sharing Gap
As if the drama of the OPM hacks were not enough, America watched last week as both United Airlines and the New York Stock Exchange…
Paul Kurtz
Jul 17, 2015
Can Information Sharing Deliver Real Value?
Information sharing has often been regarded as a reactive, one-directional effort of laudable, but limited, value.
Chris Roblee
Jun 18, 2015
Share, Collaborate, Mitigate: TruSTAR Takes Incident Sharing Anonymous
Share, Collaborate, Mitigate: TruSTAR Takes Incident Sharing Anonymous
Now you can safely share cyber incident data early in the response process
¶
Information sharing initiatives have consistently been held…
Chris Roblee
May 4, 2015
About
TruSTAR Blog
Collaborating with confidence since 2015
More information
Followers
6
Elsewhere
More stories →
About TruSTAR Blog