• Threat Intel

    • Enterprise Site License
  • Portfolio

    • Training Portfolio
    • Product Portfolio
  • Training

  • Blog

  • Support Files

  • Plans & Pricing

  • About

    • Careers
    • Why Jigsaw?
    • Privacy Policy
    • Partners and Programs
    • VAR Program
    • Disaster Plan
    • Data Disclosure
    • Industry Expertise
    • Compliance
    • Terms of Service
  • More...

    • All Posts
    • Your Community
    • Getting Started
    • Government
    • Security
    • Defense
    Search
    Intelligence no longer has to be hard to implement
    Jigsaw Security
    • Jan 28, 2020
    • 2 min

    Intelligence no longer has to be hard to implement

    One of the recurring themes we hear at Jigsaw Security is that our customers are tired of consuming IOC feeds and that many customers want to ensure that they are gaining a better understanding of the threat actors attacking their networks. Many security vendors are providing IOC's and automation, and there's nothing wrong with that, but what happens when you want to track an individual, an asset or find relevant intelligence information buried in a report? The solution to th
    9 views0 comments
    New Business Intelligence push puts Jigsaw Security on the tip of the spear
    Jigsaw Development Team
    • Dec 23, 2019
    • 1 min

    New Business Intelligence push puts Jigsaw Security on the tip of the spear

    Jigsaw Security has created a new data utility to allow tracking of intelligence items, cyber security information and virtually any type of data. This new system allows us to have insight into documents and informational stores like never before. In the first day of operation we have ingested 2.5 petabytes of information from our legacy and cyber protection platforms into this new system. One of the key methods of making intelligence information useful is the extraction of e
    4 views0 comments
    Intel has put us all at risk
    Security Operations Team
    • Jan 11, 2018
    • 3 min

    Intel has put us all at risk

    If you have been following the news you surely have been reading about Spectr and Meltdown a huge vulnerability in the Intel chipset. Not only are Intel chips vulnerable but also chips used in Apple and AMD products as well. As you can see nearly every processor is vulnerable to this attack vector In short this processor flaw has existed for nearly 20 years. Surely Intel and AMD were aware of the issue but have chosen to keep quiet about it. To date all of the fixes rolled ou
    8 views0 comments
    {"items":["5e4ca5517592c700175df517","5e4ca55175380f0017ded4a2","5e4ca556122bab00173eb939"],"styles":{"galleryType":"Columns","groupSize":1,"showArrows":true,"cubeImages":true,"cubeType":"fill","cubeRatio":1.3333333333333333,"isVertical":true,"gallerySize":30,"collageAmount":0,"collageDensity":0,"groupTypes":"1","oneRow":false,"imageMargin":32,"galleryMargin":0,"scatter":0,"rotatingScatter":"","chooseBestGroup":true,"smartCrop":false,"hasThumbnails":false,"enableScroll":true,"isGrid":true,"isSlider":false,"isColumns":false,"isSlideshow":false,"cropOnlyFill":false,"fixedColumns":1,"enableInfiniteScroll":true,"isRTL":false,"minItemSize":50,"rotatingGroupTypes":"","rotatingCropRatios":"","columnWidths":"","gallerySliderImageRatio":1.7777777777777777,"numberOfImagesPerRow":1,"numberOfImagesPerCol":1,"groupsPerStrip":0,"borderRadius":0,"boxShadow":0,"gridStyle":1,"mobilePanorama":false,"placeGroupsLtr":true,"viewMode":"preview","thumbnailSpacings":4,"galleryThumbnailsAlignment":"bottom","isMasonry":false,"isAutoSlideshow":false,"slideshowLoop":false,"autoSlideshowInterval":4,"bottomInfoHeight":0,"titlePlacement":"SHOW_ON_THE_RIGHT","galleryTextAlign":"center","scrollSnap":false,"itemClick":"nothing","fullscreen":true,"videoPlay":"hover","scrollAnimation":"NO_EFFECT","slideAnimation":"SCROLL","scrollDirection":0,"scrollDuration":400,"overlayAnimation":"FADE_IN","arrowsPosition":0,"arrowsSize":23,"watermarkOpacity":40,"watermarkSize":40,"useWatermark":true,"watermarkDock":{"top":"auto","left":"auto","right":0,"bottom":0,"transform":"translate3d(0,0,0)"},"loadMoreAmount":"all","defaultShowInfoExpand":1,"allowLinkExpand":true,"expandInfoPosition":0,"allowFullscreenExpand":true,"fullscreenLoop":false,"galleryAlignExpand":"left","addToCartBorderWidth":1,"addToCartButtonText":"","slideshowInfoSize":200,"playButtonForAutoSlideShow":false,"allowSlideshowCounter":false,"hoveringBehaviour":"NEVER_SHOW","thumbnailSize":120,"magicLayoutSeed":1,"imageHoverAnimation":"NO_EFFECT","imagePlacementAnimation":"NO_EFFECT","calculateTextBoxWidthMode":"PERCENT","textBoxHeight":0,"textBoxWidth":200,"textBoxWidthPercent":50,"textImageSpace":10,"textBoxBorderRadius":0,"textBoxBorderWidth":0,"loadMoreButtonText":"","loadMoreButtonBorderWidth":1,"loadMoreButtonBorderRadius":0,"imageInfoType":"ATTACHED_BACKGROUND","itemBorderWidth":1,"itemBorderRadius":0,"itemEnableShadow":false,"itemShadowBlur":20,"itemShadowDirection":135,"itemShadowSize":10,"imageLoadingMode":"BLUR","expandAnimation":"NO_EFFECT","imageQuality":90,"usmToggle":false,"usm_a":0,"usm_r":0,"usm_t":0,"videoSound":false,"videoSpeed":"1","videoLoop":true,"jsonStyleParams":"","gallerySizeType":"px","gallerySizePx":940,"allowTitle":true,"allowContextMenu":true,"textsHorizontalPadding":-30,"itemBorderColor":{"themeName":"color_12","value":"rgba(204,204,204,0.75)"},"showVideoPlayButton":true,"galleryLayout":2,"targetItemSize":940,"selectedLayout":"2|bottom|1|fill|true|0|true","layoutsVersion":2,"selectedLayoutV2":2,"isSlideshowFont":false,"externalInfoHeight":0,"externalInfoWidth":0.5},"container":{"width":940,"galleryWidth":972,"galleryHeight":0,"scrollBase":0,"height":null}}

    Contact: (800)447-2150 Ext. 1        To contact Jigsaw simply send a message in our chat window!

    • Facebook - Black Circle
    • Twitter - Black Circle

    © 2017-2020 Jigsaw Security Enterprise Inc.

    Jigsaw Security Enterprise Inc is a SDVOSB - Service Connected Disabled Veteran Owned Small Business