Jigsaw SecurityMar 8, 20194 minWhat analytics show when it comes to news coverage - An exampleA look at using sentiment against news and articles.
Security Operations TeamJun 30, 20181 minVulnerability alerts in different formats? Doesn't matter!Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
Security Operations TeamApr 23, 20183 minJigsaw Security adds MISP Support to FirstWatch and more...Jigsaw Security announced today that our commercial sensor now interfaces with MISP directly. Simply add your API key to our FirstWatch...
Jigsaw Development TeamDec 28, 20173 minDefensive Cyberspace Operations using TensorflowThis post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
Jigsaw Development TeamDec 17, 20173 minJigsaw Analytic Platform - Document EngineJigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...
TechnologyNov 30, 20172 minTerm Identification for Cloud Enabled SystemsMoyock, NC - Jigsaw Security is working on a new technology to allow cloud operators to quickly and easily find content in PDF's, Word...