Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/16/2015
09:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for Enterprises

Platform Addresses Urgent Need for Instantaneous Cyber Intelligence Sharing to Level the Playing Field for CISOs

 SAN FRANCISCO – April 16, 2015 – Today, TruSTAR Technology launched the first global anonymous cyber incident sharing platform for enterprises. The TruSTAR platform provides access to incidents from vetted global enterprises in seconds. With TruSTAR, enterprise security teams can anonymously share incidents and collaborate without worrying about attribution, legal issues or reputational backlash. TruSTAR has been operating in closed beta with more than 10 Fortune 500 companies and has secured agreements to provide the technology infrastructure for large industry cyber-sharing consortiums. 

“With TruSTAR, users will be part of a tribe of united, anonymous good guys,” said Dave Cullinane, co-founder of TruSTAR Technology. “It’s through this collaboration that enterprises will get smarter and faster about the threats that pose a risk to them without revealing their identity. It’s sharing at its best, without risk.” 

According to PwC, security incidents have increased by 66 percent year over year since 2009. These incidents often go undiscovered for weeks or months as enterprises sift through the stacks of data. TruSTAR accelerates response times by identifying the most critical incident signals, and sharing insights on how to address these threats. TruSTAR ensures that shared reports remain unattributable by using patent-pending asymmetric encryption and anonymous authentication protocols. 

“While the bad guys are collaborating in real-time to exploit systems, the good guys are forced to practically go it alone due to ad-hoc incident reporting and corporate reluctance to share information,” said Paul Kurtz, CEO and co-founder of TruSTAR Technology. “It is time to eliminate this disadvantage. TruSTAR’s anonymity gives companies the liberty to share incidents and begin collaborating on mitigation with other vetted members within seconds." 

The company was founded by renowned experts in cyber security, including ex-eBay CISO, Dave Cullinane, and Paul Kurtz, whose former roles include founder of the Cyber Security Industry Alliance and Special Assistant to the President and Senior Director for Critical Infrastructure Protection at the White House. 

In a space where security experts are overwhelmed by an array of solutions, TruSTAR is bridging the need for collaboration in the cyber security field with anonymity to give users the freedom to share the actionable information faster. Rather than searching threat streams or threat feeds, TruSTAR’s affordable platform offers a quick and clear ROI. Members have immediate access to a database of anonymized incident data that is correlated with other incident data, open source feeds, and secure, real-time discussion threads in the TruSTAR collaboration forum. This forum helps drive enterprises quickly toward relevant mitigation solutions for their networks. 

About TruSTAR Technology 

TruSTAR Technology is the first global anonymous cyber incident sharing platform for enterprises. TruSTAR correlates incident reports from members with open-source reporting as well as information from the darker corners of the web where cyber adversaries communicate. With TruSTAR, vetted members can share within their sector and across sectors to develop a real-time, global view of cyber incidents. TruSTAR has been operating in closed beta with more than 10 Fortune 500 companies and has secured agreements to provide the technology infrastructure for large industry cyber sharing consortiums. The TruSTAR executive team has decades of tactical and strategic experience in cyber security, information sharing, and developing tailored security software products for enterprises.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24100
PUBLISHED: 2021-02-25
Microsoft Edge for Android Information Disclosure Vulnerability
CVE-2021-24101
PUBLISHED: 2021-02-25
Microsoft Dataverse Information Disclosure Vulnerability
CVE-2021-24102
PUBLISHED: 2021-02-25
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24103.
CVE-2021-24103
PUBLISHED: 2021-02-25
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24102.
CVE-2021-24105
PUBLISHED: 2021-02-25
Package Managers Configurations Remote Code Execution Vulnerability