Former CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for EnterprisesFormer CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for Enterprises
Platform Addresses Urgent Need for Instantaneous Cyber Intelligence Sharing to Level the Playing Field for CISOs
April 16, 2015
SAN FRANCISCO – April 16, 2015 – Today, TruSTAR Technology launched the first global anonymous cyber incident sharing platform for enterprises. The TruSTAR platform provides access to incidents from vetted global enterprises in seconds. With TruSTAR, enterprise security teams can anonymously share incidents and collaborate without worrying about attribution, legal issues or reputational backlash. TruSTAR has been operating in closed beta with more than 10 Fortune 500 companies and has secured agreements to provide the technology infrastructure for large industry cyber-sharing consortiums.
“With TruSTAR, users will be part of a tribe of united, anonymous good guys,” said Dave Cullinane, co-founder of TruSTAR Technology. “It’s through this collaboration that enterprises will get smarter and faster about the threats that pose a risk to them without revealing their identity. It’s sharing at its best, without risk.”
According to PwC, security incidents have increased by 66 percent year over year since 2009. These incidents often go undiscovered for weeks or months as enterprises sift through the stacks of data. TruSTAR accelerates response times by identifying the most critical incident signals, and sharing insights on how to address these threats. TruSTAR ensures that shared reports remain unattributable by using patent-pending asymmetric encryption and anonymous authentication protocols.
“While the bad guys are collaborating in real-time to exploit systems, the good guys are forced to practically go it alone due to ad-hoc incident reporting and corporate reluctance to share information,” said Paul Kurtz, CEO and co-founder of TruSTAR Technology. “It is time to eliminate this disadvantage. TruSTAR’s anonymity gives companies the liberty to share incidents and begin collaborating on mitigation with other vetted members within seconds."
The company was founded by renowned experts in cyber security, including ex-eBay CISO, Dave Cullinane, and Paul Kurtz, whose former roles include founder of the Cyber Security Industry Alliance and Special Assistant to the President and Senior Director for Critical Infrastructure Protection at the White House.
In a space where security experts are overwhelmed by an array of solutions, TruSTAR is bridging the need for collaboration in the cyber security field with anonymity to give users the freedom to share the actionable information faster. Rather than searching threat streams or threat feeds, TruSTAR’s affordable platform offers a quick and clear ROI. Members have immediate access to a database of anonymized incident data that is correlated with other incident data, open source feeds, and secure, real-time discussion threads in the TruSTAR collaboration forum. This forum helps drive enterprises quickly toward relevant mitigation solutions for their networks.
About TruSTAR Technology
TruSTAR Technology is the first global anonymous cyber incident sharing platform for enterprises. TruSTAR correlates incident reports from members with open-source reporting as well as information from the darker corners of the web where cyber adversaries communicate. With TruSTAR, vetted members can share within their sector and across sectors to develop a real-time, global view of cyber incidents. TruSTAR has been operating in closed beta with more than 10 Fortune 500 companies and has secured agreements to provide the technology infrastructure for large industry cyber sharing consortiums. The TruSTAR executive team has decades of tactical and strategic experience in cyber security, information sharing, and developing tailored security software products for enterprises.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023