Happening now: Team TSX is participating in the 2nd Annual #SLD45Hackathon. The team is collaborating with new and old colleagues to solve some very interesting problem sets for the SLD45 community!
TrustStack
Information Technology & Services
Washington, D.C. 103 followers
Secure Warfighter Collaboration
About us
TrustStack (TSX) is a secure application platform. Designed from the ground-up following DoD #ZeroTrust guidance, TSX is the easiest way for DoD teams to spin up and use the software they need to support mission objectives. We offer access to secure collaboration tools such as Jira, MatterMost, GitLab and more. Small teams love the all-in-one subscription model of our COLLAB instance, while larger organizations typically prefer our bespoke deployments. Either way, we provide the easiest and most cost efficient path to collaboration for government teams. Request information here: https://lnkd.in/gpSmmGgs.
- Website
-
https://www.contegix.com/truststack
External link for TrustStack
- Industry
- Information Technology & Services
- Company size
- 11-50 employees
- Headquarters
- Washington, D.C.
- Type
- Privately Held
- Founded
- 2021
Locations
-
Primary
Washington, D.C. 20166, US
Employees at TrustStack
-
Jessica Webster
Support Engineer
-
Brian Malone
Transforming the DoD, providing secure DevSecOps and Collaborative solutions
-
Shaun Jones
Founder of the TSX DevSecOps platform & Head of Public Sector for Contegix. Shaun is a tech leader, security specialist, and full-stack developer…
-
Geoffrey Welch
Programming something since 2011
Updates
-
Open source is the best source... we'll challenge anyone who disagrees to pugil sticks at the mud pit. Awesome work from Mattermost and it's community! 🔗 Learn more about their open source efforts here: https://lnkd.in/gys8z3Bs #opensource #mattermost #cybersecurity
Mattermost v9.6 is now available! 🎉🎉 Huge THANK YOU to our wonderful community for all of your great work. 👏 Learn more about what's new in Mattermost v9.6: 📌 https://lnkd.in/gKgzre-Z #opensource #security #collaboration #missioncritical
-
-
It's encouraging to see the rapid and willing adoption of Zero Trust across the DoD. We still see a lot of disparate efforts, and teams are struggling to identify when to collaborate and when to stay in their silo. Even within our own organization we see the inherent conflict between the secure nature of our work and the collaborative benefits of sharing #cyber and #zerotrust strategies. Shery Thomas, the cyber technology officer and technical director for the Marine Corps Cyberspace Command, gave this encouraging comment in an interview recently: "The assistant commandant has a directive that says to unify the network, and the unification of the network helps in terms of the agility, the response to decision making and the advantage that we bring to our warfighters. I treat the network as an adaptive organism that continues to change.” We love to see engagement from leadership on these initiatives, they seem to be making material improvements to both the security and operations of their networks. BZ to the USMC and Shery S Thomas! 🔗 Read the article here: https://lnkd.in/gEXiJa6J #zerotrustsecurity #truststack
-
The interconnectedness of these threats highlights the need for a collaborative approach to cybersecurity, emphasizing the importance of sharing information and best practices among allies and within sectors. The TrustStack team works to stay at the cutting edge of cybersecurity technologies and threat intelligence, ensuring that our strategies not only counteract current threats but are also forward-looking to anticipate future vulnerabilities. 🤝 Our commitment to innovation is matched by our dedication to collaboration, as we believe that sharing knowledge and tools across industries and organization is key to strengthening national cyber defenses. By fostering a culture of transparency and cooperation, we aim to build a more secure and resilient digital ecosystem for all stakeholders. #truststack #collaboration #cyberdefense #cyberresilience #patchyoursystems
Founder of the TSX DevSecOps platform & Head of Public Sector for Contegix. Shaun is a tech leader, security specialist, and full-stack developer. Leveraging data, agile, and security for effective outcomes.
I finally found the time to read through ODNI's 2024 Worldwide Threat Assessment and was not surprised to see Cyber and AI spread throughout the findings. The list of bad actors is nothing surprising but it definitely seems like they are getting more aggressive. I've excerpted the highlights below. I bet you don't get past page 11 before your check to make sure your systems are patched... 📚 Source: https://lnkd.in/gm3fp25U 🇨🇳 China remains the most active and persistent cyber threat to U.S. Government, private-sector, and critical infrastructure networks. Beijing’s cyber espionage pursuits and its industry’s export of surveillance, information, and communications technologies increase the threats of aggressive cyber operations against the United States and the suppression of the free flow of information in cyberspace. 🇷🇺 Russia will pose an enduring global cyber threat even as it prioritizes cyber operations for the Ukrainian war. Moscow views cyber disruptions as a foreign policy lever to shape other countries’ decisions and continuously refines and employs its espionage, influence, and attack capabilities against a variety of targets. 🇮🇷 Iran’s growing expertise and willingness to conduct aggressive cyber operations make it a major threat to the security of U.S. and allied and partner networks and data. Tehran’s opportunistic approach to cyber attacks puts U.S. infrastructure at risk for being targeted, particularly as its previous attacks against Israeli targets show that Iran is willing to target countries with stronger cyber capabilities than itself. Iran will continue to conduct malign influence operations in the Middle East and in other regions, including trying to undermine U.S. political processes and amplify discord. 🇰🇵 North Korea’s cyber program will pose a sophisticated and agile espionage, cybercrime, and attack threat. Pyongyang’s cyber forces have matured and are fully capable of achieving a variety of strategic objectives against diverse targets, including a wider target set in the United States and South Korea. 👨💻 Transnational organized criminals involved in ransomware operations are improving their attacks, extorting funds, disrupting critical services, and exposing sensitive data. Important U.S. services and critical infrastructure such as health care, schools, and manufacturing continue to experience ransomware attacks; however, weak cyber defenses, coupled with efforts to digitize economies, have made low-income countries’ networks also attractive targets. #patchyoursystems #truststack #cyber
ATA-2024-Unclassified-Report.pdf
dni.gov
-
Absolutely agree with the sentiment here. Declaring the traditional perimeter security model as obsolete doesn't capture the transformation it's undergoing. The concept isn't dying; it's evolving into something more nuanced and multifaceted. As organizations navigate the complexities of modern cybersecurity, the shift towards a model that integrates zero trust principles is inevitable. The NSA's latest publication on Zero Trust Network Environment underscores the importance of this shift and provides a roadmap for advancing through the various maturity levels of zero trust implementation. At TrustStack we’re embracing the need for a more dynamic, context-aware approach to security, leveraging technology and policy to being user-friendly cyber to platforms. Also, go and follow Chris H.. We don’t know him personally but he has great content for cyber. #TrustStack #cyberawareness #contegix #platformengineering #cyberdefense #cyberresilience
President @ Aquia | Cyber Innovation Fellow @ CISA | Chief Security Advisor @ Endor Labs | 2x Author | Veteran
"The legacy perimeter security model is dead" How many times have you heard something like this said? In many ways, it is true, the effectiveness of a singular approach of one overarching perimeter or boundary is indeed flawed. That said, I think it would be more appropriate to say the perimeter security model has, or should evolve. It does so through our approach to manage data flows, macro/micro segmentation, software defined networking and contextual access control. In fact, that is the same case the National Security Agency makes in their latest "Cybersecurity Information Sheet - Zero Trust Network Environment Pillar" publication. Much like broader zero trust, all of the above mentioned activities exist on a maturity spectrum, from basic to advanced, as do the other pillars of zero trust. Organizations of all shapes and sizes deal with unique constraints from technical, resourcing, timelines and more. If you're looking to bolster your zero trust maturity in the networking and environment domain, you'll want to dig into this latest publication to ensure you're headed in the right direction. #cybersecurity #zerotrust #ciso
-
Happening now at Atlassian Team Tour Government ‘24- Shaun Jones and James Hunt talking about making your collaborative home base easy and secure. If you’re here swing by the Contegix booth and learn how to reduce the burden and bring collaboration to your organization!
-
-
TrustStack leadership is at Team Tour Government today speaking about how they designed and launched a secure and user-friendly software factory. I hope some of you are here with us today - please come say hello at our booth! Shaun Jones James Hunt #TrustStack #Atlassian #DevSecOps #TeamTour
📞 Calling all government teams! Join us at Team Tour: Government on March 6 in Washington, D.C. What’s in it for you? ⭐ Earn 4.8 CPE credits for attending in person. 🤝 Connect with your government peers and technologists to network and share best practices. 🌎 Learn how to plan, organize, and accomplish any objective on any device, in any location. Get your FREE ticket 🎟 before time runs out! We hope to see you live in D.C. or digitally. Register now: https://lnkd.in/gsy2MtT9
-
Congrats to Mattermost for the award! We love helping teams get access to this transformational capability. Both Mattermost and TAK are big parts of our platform, and this kind of integration will bring the awesomeness of both tools to the warfighter faster, better, and probably cheaper. #mattermost #tak #truststack #sbir
Mattermost enables federal civilian agencies and organizations across the Department of Defense to exchange mission-critical information through its highly customizable environment. #Mattermost #MissionCritical #SecureCollaborationHub
Mattermost and goTenna Win Landmark Air Force SBIR Phase II Award
gotenna.com
-
We love showing our platform to innovators and thought leaders like Richard Torres. Someone get this guy some TrustStack swag! #TrustStack #TSX #cyberdefense #aiandml #Atlassian #MatterMost
Contegix TrustStack > P1. Sat down and got the breakdown of TrustStack and I was so impressed how most P1 issues are a cake walk for TS. Hopefully we see more DoD entities move over.
-
The TrustStack team will be at West 2024 in San Diego. Join us for a networking reception at Rustic Root! REGISTER HERE >>> https://lnkd.in/gxstdWKK 🌎 The event will be on the main floor of the Rustic Root 📅 Tuesday, February 13 from 5:30pm-9:00pm 🥂 Refreshments and hors d’oeuvres will be provided #WEST #WEST2024 #TrustStack #Carahsoft #Atlassian #Networking
-