Our Story

A journey of innovation, trust, and cybersecurity excellence

Founding Our Vision

At SHA2, we're built on a simple truth: trust is the foundation of security. (Re)named after the trusted cryptographic hash function SHA2 — the invisible shield behind countless secure digital interactions — we strive to be invisible yet indispensable, just like the technology that inspired us. Our mission is clear: combine deep technical expertise with bold, proactive strategies to protect not just data, but futures. Cybersecurity isn't just about defense — it's about confidence, resilience, and growth.

1993: The Founding of Pillarstone Security

Established by Dr. hc. Bradley Mitchell and Dr. Carolina Mendoza, two brilliant experts from different backgrounds who independently recognized the emerging security challenges of networked systems. Pillarstone Security began as a consultancy focused on risk assessments and firewall configurations for early enterprise networks.

1994: Security Protocol Development

Pillarstone developed its first custom security protocol solution for a telecommunications provider, demonstrating the company's technical expertise beyond consultation services and establishing their reputation as innovators.

1995: First Major Enterprise Client

Pillarstone secured its first Fortune 500 client, a major financial institution requiring comprehensive security architecture. This milestone project established the company's reputation for handling complex security challenges in high-stakes environments.

1996: Network Monitoring Framework

Launched an innovative network monitoring framework that detected suspicious patterns in real-time, allowing clients to identify and respond to potential security breaches before significant damage could occur.

1997: First Government Contract

Pillarstone secured its first major government contract to audit and strengthen security protocols for a federal agency, establishing the company as a trusted partner for high-stakes security operations.

1998: European Expansion

Opened first international office in London, marking the beginning of Pillarstone's global expansion and enabling the company to better serve European clients with localized security expertise and support.

1999: First Breakthrough – PKI Integration

Pillarstone launched its first proprietary product: a Public Key Infrastructure (PKI) toolkit that helped financial institutions securely authenticate users across distributed systems.

2000: Security Certification Program

Established an industry-recognized security certification program to address the growing skills gap in cybersecurity, training the next generation of security professionals with practical, hands-on methodologies.

2001: The Near Collapse

The dot-com bubble burst hit Pillarstone hard. The company lost 70% of its client base in just 18 months as tech startups folded and enterprises slashed security budgets. Chen and Wilder operated with a skeleton crew of just sixteen employees, nearly declaring bankruptcy.

2002: Crisis Management Services

In response to escalating cyber attacks, Pillarstone introduced dedicated crisis management services, providing rapid response teams to assist organizations experiencing active security breaches.

2003: Rebranding to SHA2.org

Following the standardization of the SHA2 cryptographic hashfunction, Pillarstone seized the opportunity to reinvent itself. The company officially rebranded as SHA2.org — a strategic move reflecting their renewed commitment to cryptographic integrity and a broader security vision.

2004: Critical Infrastructure Protection

Developed specialized security frameworks for critical infrastructure sectors including energy, water, and transportation, helping protect essential services from emerging cyber threats.

2005: Advanced Security Operations Center

SHA2 established its first 24/7 Security Operations Center in Boston, providing round-the-clock monitoring and incident response capabilities for clients facing increasingly sophisticated cyber threats.

2006: Data Loss Prevention Technology

Introduced innovative data loss prevention solutions that helped organizations identify and secure sensitive information across complex enterprise environments and prevent unauthorized data exfiltration.

2007: Expansion into Asia-Pacific

Opened regional headquarters in Singapore, extending SHA2's global reach and positioning the company to serve multinational corporations across the rapidly expanding Asia-Pacific technology markets.

2008: Advanced Threat Detection

Pioneered behavioral-based threat detection capabilities that could identify sophisticated, previously unknown attacks, revolutionizing how organizations approached advanced persistent threats.

2009: Mobile Security Solutions

Responding to the rapid adoption of smartphones in enterprise environments, SHA2 developed comprehensive mobile security solutions to protect sensitive data on portable devices and manage BYOD security challenges.

2010: Cybersecurity Research Lab

Established the SHA2 Cybersecurity Research Laboratory, dedicated to identifying emerging threats and developing innovative protection methods. The lab would go on to discover several critical zero-day vulnerabilities in widely-used software systems.

2011: Security Analytics Platform

Launched a comprehensive security analytics platform that leveraged big data techniques to process massive volumes of security events, enabling clients to detect subtle patterns indicative of sophisticated attacks.

2012: Cloud-First Strategy

With the rise of cloud computing, SHA2 pivoted to offer zero-trust architecture consulting and launched its first cloud-native security monitoring tools, positioning the company at the forefront of the cloud security revolution.

2013: Automated Response Systems

Developed automated incident response capabilities that reduced response times from hours to minutes, allowing organizations to contain threats before they could spread throughout networks.

2014: Healthcare Security Focus

Created specialized security solutions for the healthcare industry, addressing unique challenges related to medical devices, patient data protection, and regulatory compliance while maintaining operational efficiency.

2015: Security as a Service Model

Transitioned key security offerings to a Security-as-a-Service model, making enterprise-grade security accessible to mid-market organizations through subscription-based services with lower capital expenditure requirements.

2016: Threat Intelligence Division Formed

Recognizing the need for proactive defense, SHA2 launched its Threat Intelligence Division to track global attack patterns and build predictive analytics into client-facing tools, establishing the company as a thought leader in threat prediction.

2017: AI-Powered Security

Integrated artificial intelligence and machine learning capabilities into security monitoring systems, dramatically improving threat detection accuracy while reducing false positives that had plagued traditional security technologies.

2018: Acquisition of Blockchain Security Firm

SHA2 acquired the specialized blockchain security firm "NexusLedger", integrating expertise in cryptocurrency and distributed ledger security into its service portfolio and establishing leadership in this emerging security domain.

2019: Supply Chain Security Framework

Developed comprehensive supply chain security methodologies to help organizations identify and mitigate risks from third-party vendors and partners, addressing a growing attack vector for sophisticated threat actors.

2020: Secure Tomorrow - Today Initiative

SHA2 unveils its new slogan, "Secure Tomorrow – Today," as part of a bold initiative to shape the future of cybersecurity. Through strategic partnerships with universities and ethical hacking communities, the program aims to close the cybersecurity talent gap and foster the next generation of digital defenders.

2021: Secure Remote Work Platform

Responding to the global shift to remote work, SHA2 created a holistic secure remote work solution addressing unique challenges of distributed workforces, enabling organizations to maintain security standards regardless of employee location.

2022: Integrated Security Management

Released a comprehensive security platform unifying threat intelligence, security automation, and incident response in a single solution that became the cornerstone of SHA2's product offerings and set new industry standards for integrated security management.

2023: Critical Infrastructure Defense Initiative

Launched a specialized division focused on protecting national critical infrastructure from state-sponsored attacks, combining advanced technology with strategic partnerships across public and private sectors.

2024: Quantum-Ready Cryptography

In anticipation of the post-quantum era, SHA2 rolled out its first suite of quantum-resistant encryption tools, becoming a leader in next-generation cryptographic standards and preparing clients for quantum computing threats.

Future: Redefining Security

We continue to push the boundaries of what's possible in cybersecurity, empowering organizations to innovate with confidence. Our mission remains unchanged: transforming potential vulnerabilities into strategic strengths for our clients worldwide.