Founding Our Vision
At SHA2, we're built on a simple truth: trust is the foundation of security. (Re)named after the trusted cryptographic hash function SHA2 — the invisible shield behind countless secure digital interactions — we strive to be invisible yet indispensable, just like the technology that inspired us. Our mission is clear: combine deep technical expertise with bold, proactive strategies to protect not just data, but futures. Cybersecurity isn't just about defense — it's about confidence, resilience, and growth.
1993: The Founding of Pillarstone Security
Established by Dr. hc. Bradley Mitchell and Dr. Carolina Mendoza, two brilliant experts from different backgrounds who independently recognized the emerging security challenges of networked systems. Pillarstone Security began as a consultancy focused on risk assessments and firewall configurations for early enterprise networks.
1994: Security Protocol Development
Pillarstone developed its first custom security protocol solution for a telecommunications provider, demonstrating the company's technical expertise beyond consultation services and establishing their reputation as innovators.
1995: First Major Enterprise Client
Pillarstone secured its first Fortune 500 client, a major financial institution requiring comprehensive security architecture. This milestone project established the company's reputation for handling complex security challenges in high-stakes environments.
1996: Network Monitoring Framework
Launched an innovative network monitoring framework that detected suspicious patterns in real-time, allowing clients to identify and respond to potential security breaches before significant damage could occur.
1997: First Government Contract
Pillarstone secured its first major government contract to audit and strengthen security protocols for a federal agency, establishing the company as a trusted partner for high-stakes security operations.
1998: European Expansion
Opened first international office in London, marking the beginning of Pillarstone's global expansion and enabling the company to better serve European clients with localized security expertise and support.
1999: First Breakthrough – PKI Integration
Pillarstone launched its first proprietary product: a Public Key Infrastructure (PKI) toolkit that helped financial institutions securely authenticate users across distributed systems.
2000: Security Certification Program
Established an industry-recognized security certification program to address the growing skills gap in cybersecurity, training the next generation of security professionals with practical, hands-on methodologies.
2001: The Near Collapse
The dot-com bubble burst hit Pillarstone hard. The company lost 70% of its client base in just 18 months as tech startups folded and enterprises slashed security budgets. Chen and Wilder operated with a skeleton crew of just sixteen employees, nearly declaring bankruptcy.
2002: Crisis Management Services
In response to escalating cyber attacks, Pillarstone introduced dedicated crisis management services, providing rapid response teams to assist organizations experiencing active security breaches.
2003: Rebranding to SHA2.org
Following the standardization of the SHA2 cryptographic hashfunction, Pillarstone seized the opportunity to reinvent itself. The company officially rebranded as SHA2.org — a strategic move reflecting their renewed commitment to cryptographic integrity and a broader security vision.
2004: Critical Infrastructure Protection
Developed specialized security frameworks for critical infrastructure sectors including energy, water, and transportation, helping protect essential services from emerging cyber threats.
2005: Advanced Security Operations Center
SHA2 established its first 24/7 Security Operations Center in Boston, providing round-the-clock monitoring and incident response capabilities for clients facing increasingly sophisticated cyber threats.
2006: Data Loss Prevention Technology
Introduced innovative data loss prevention solutions that helped organizations identify and secure sensitive information across complex enterprise environments and prevent unauthorized data exfiltration.
2007: Expansion into Asia-Pacific
Opened regional headquarters in Singapore, extending SHA2's global reach and positioning the company to serve multinational corporations across the rapidly expanding Asia-Pacific technology markets.
2008: Advanced Threat Detection
Pioneered behavioral-based threat detection capabilities that could identify sophisticated, previously unknown attacks, revolutionizing how organizations approached advanced persistent threats.
2009: Mobile Security Solutions
Responding to the rapid adoption of smartphones in enterprise environments, SHA2 developed comprehensive mobile security solutions to protect sensitive data on portable devices and manage BYOD security challenges.
2010: Cybersecurity Research Lab
Established the SHA2 Cybersecurity Research Laboratory, dedicated to identifying emerging threats and developing innovative protection methods. The lab would go on to discover several critical zero-day vulnerabilities in widely-used software systems.
2011: Security Analytics Platform
Launched a comprehensive security analytics platform that leveraged big data techniques to process massive volumes of security events, enabling clients to detect subtle patterns indicative of sophisticated attacks.
2012: Cloud-First Strategy
With the rise of cloud computing, SHA2 pivoted to offer zero-trust architecture consulting and launched its first cloud-native security monitoring tools, positioning the company at the forefront of the cloud security revolution.
2013: Automated Response Systems
Developed automated incident response capabilities that reduced response times from hours to minutes, allowing organizations to contain threats before they could spread throughout networks.
2014: Healthcare Security Focus
Created specialized security solutions for the healthcare industry, addressing unique challenges related to medical devices, patient data protection, and regulatory compliance while maintaining operational efficiency.
2015: Security as a Service Model
Transitioned key security offerings to a Security-as-a-Service model, making enterprise-grade security accessible to mid-market organizations through subscription-based services with lower capital expenditure requirements.
2016: Threat Intelligence Division Formed
Recognizing the need for proactive defense, SHA2 launched its Threat Intelligence Division to track global attack patterns and build predictive analytics into client-facing tools, establishing the company as a thought leader in threat prediction.
2017: AI-Powered Security
Integrated artificial intelligence and machine learning capabilities into security monitoring systems, dramatically improving threat detection accuracy while reducing false positives that had plagued traditional security technologies.
2018: Acquisition of Blockchain Security Firm
SHA2 acquired the specialized blockchain security firm "NexusLedger", integrating expertise in cryptocurrency and distributed ledger security into its service portfolio and establishing leadership in this emerging security domain.
2019: Supply Chain Security Framework
Developed comprehensive supply chain security methodologies to help organizations identify and mitigate risks from third-party vendors and partners, addressing a growing attack vector for sophisticated threat actors.
2020: Secure Tomorrow - Today Initiative
SHA2 unveils its new slogan, "Secure Tomorrow – Today," as part of a bold initiative to shape the future of cybersecurity. Through strategic partnerships with universities and ethical hacking communities, the program aims to close the cybersecurity talent gap and foster the next generation of digital defenders.
2021: Secure Remote Work Platform
Responding to the global shift to remote work, SHA2 created a holistic secure remote work solution addressing unique challenges of distributed workforces, enabling organizations to maintain security standards regardless of employee location.
2022: Integrated Security Management
Released a comprehensive security platform unifying threat intelligence, security automation, and incident response in a single solution that became the cornerstone of SHA2's product offerings and set new industry standards for integrated security management.
2023: Critical Infrastructure Defense Initiative
Launched a specialized division focused on protecting national critical infrastructure from state-sponsored attacks, combining advanced technology with strategic partnerships across public and private sectors.
2024: Quantum-Ready Cryptography
In anticipation of the post-quantum era, SHA2 rolled out its first suite of quantum-resistant encryption tools, becoming a leader in next-generation cryptographic standards and preparing clients for quantum computing threats.
Future: Redefining Security
We continue to push the boundaries of what's possible in cybersecurity, empowering organizations to innovate with confidence. Our mission remains unchanged: transforming potential vulnerabilities into strategic strengths for our clients worldwide.