Security Operations TeamJul 1, 20181 minVulnerability alerts in different formats? Doesn't matter!Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
Jigsaw Development TeamDec 28, 20173 minDefensive Cyberspace Operations using TensorflowThis post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
Jigsaw Development TeamDec 17, 20173 minJigsaw Analytic Platform - Document EngineJigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...