• Threat Intel

    • Enterprise Site License
  • Portfolio

    • Training Portfolio
    • Product Portfolio
  • Training

  • Blog

  • Support Files

  • Plans & Pricing

  • About

    • Careers
    • Why Jigsaw?
    • Privacy Policy
    • Partners and Programs
    • VAR Program
    • Disaster Plan
    • Data Disclosure
    • Industry Expertise
    • Compliance
    • Terms of Service
  • More...

    • All Posts
    • Your Community
    • Getting Started
    • Government
    • Security
    • Defense
    Search
    IOC Usefulness and Lifespan continues to be reduced, API automation
    Jigsaw Development Team
    • Apr 10, 2019
    • 3 min

    IOC Usefulness and Lifespan continues to be reduced, API automation

    As we continue providing information to managed security providers, companies and agencies, one thing is certain. The industry is behind the curve when it comes to protecting itself from attack. Most if not all of the vendors are still utilizing models the include the distribution of IOC data. One of the things we have been pushing for very hard is for the industry to stop relying on IOC's. As soon as vendors publish the IOC data it is a flag for threat actors to change tacti
    32 views0 comments
    IT still struggling to figure out security
    Jigsaw Security
    • Mar 5, 2019
    • 2 min

    IT still struggling to figure out security

    IT managers have been working to implement a procedure known as "Defense in Depth", however those companies using this model almost always seem to forget certain aspects of the attack vectors in their organizations. Below we share some of our recent findings and explain why defense in depth should not be how you protect your crown jewels. In short, even with a fully implemented design, there will still be trusted system with exploitable vulnerabilities. What is Defense in Dep
    27 views0 comments
    Jigsaw Moves into Managed Deception Technology Space
    Security Operations Team
    • Oct 3, 2018
    • 1 min

    Jigsaw Moves into Managed Deception Technology Space

    Starting today, Jigsaw Security customers can opt into our managed security as well as our new managed deception network offering. How the offering works is simple. Instead of allowing attackers into your real network, we redirect them to an emulated network which we monitor and control. This uncovers that threat actors techniques, tools and methods as well as tells us what data the attacker is most interested in based on their activity. This new capability will allow Jigsaw
    15 views0 comments
    {"items":["5e4ca55273d69f0017fafd6a","5e4ca552a130be00170154c9","5e4ca5539e14e70017925082"],"styles":{"galleryType":"Columns","groupSize":1,"showArrows":true,"cubeImages":true,"cubeType":"fill","cubeRatio":1.3333333333333333,"isVertical":true,"gallerySize":30,"collageAmount":0,"collageDensity":0,"groupTypes":"1","oneRow":false,"imageMargin":32,"galleryMargin":0,"scatter":0,"rotatingScatter":"","chooseBestGroup":true,"smartCrop":false,"hasThumbnails":false,"enableScroll":true,"isGrid":true,"isSlider":false,"isColumns":false,"isSlideshow":false,"cropOnlyFill":false,"fixedColumns":1,"enableInfiniteScroll":true,"isRTL":false,"minItemSize":50,"rotatingGroupTypes":"","rotatingCropRatios":"","columnWidths":"","gallerySliderImageRatio":1.7777777777777777,"numberOfImagesPerRow":1,"numberOfImagesPerCol":1,"groupsPerStrip":0,"borderRadius":0,"boxShadow":0,"gridStyle":1,"mobilePanorama":false,"placeGroupsLtr":true,"viewMode":"preview","thumbnailSpacings":4,"galleryThumbnailsAlignment":"bottom","isMasonry":false,"isAutoSlideshow":false,"slideshowLoop":false,"autoSlideshowInterval":4,"bottomInfoHeight":0,"titlePlacement":"SHOW_ON_THE_RIGHT","galleryTextAlign":"center","scrollSnap":false,"itemClick":"nothing","fullscreen":true,"videoPlay":"hover","scrollAnimation":"NO_EFFECT","slideAnimation":"SCROLL","scrollDirection":0,"scrollDuration":400,"overlayAnimation":"FADE_IN","arrowsPosition":0,"arrowsSize":23,"watermarkOpacity":40,"watermarkSize":40,"useWatermark":true,"watermarkDock":{"top":"auto","left":"auto","right":0,"bottom":0,"transform":"translate3d(0,0,0)"},"loadMoreAmount":"all","defaultShowInfoExpand":1,"allowLinkExpand":true,"expandInfoPosition":0,"allowFullscreenExpand":true,"fullscreenLoop":false,"galleryAlignExpand":"left","addToCartBorderWidth":1,"addToCartButtonText":"","slideshowInfoSize":200,"playButtonForAutoSlideShow":false,"allowSlideshowCounter":false,"hoveringBehaviour":"NEVER_SHOW","thumbnailSize":120,"magicLayoutSeed":1,"imageHoverAnimation":"NO_EFFECT","imagePlacementAnimation":"NO_EFFECT","calculateTextBoxWidthMode":"PERCENT","textBoxHeight":0,"textBoxWidth":200,"textBoxWidthPercent":50,"textImageSpace":10,"textBoxBorderRadius":0,"textBoxBorderWidth":0,"loadMoreButtonText":"","loadMoreButtonBorderWidth":1,"loadMoreButtonBorderRadius":0,"imageInfoType":"ATTACHED_BACKGROUND","itemBorderWidth":1,"itemBorderRadius":0,"itemEnableShadow":false,"itemShadowBlur":20,"itemShadowDirection":135,"itemShadowSize":10,"imageLoadingMode":"BLUR","expandAnimation":"NO_EFFECT","imageQuality":90,"usmToggle":false,"usm_a":0,"usm_r":0,"usm_t":0,"videoSound":false,"videoSpeed":"1","videoLoop":true,"jsonStyleParams":"","gallerySizeType":"px","gallerySizePx":940,"allowTitle":true,"allowContextMenu":true,"textsHorizontalPadding":-30,"itemBorderColor":{"themeName":"color_12","value":"rgba(204,204,204,0.75)"},"showVideoPlayButton":true,"galleryLayout":2,"targetItemSize":940,"selectedLayout":"2|bottom|1|fill|true|0|true","layoutsVersion":2,"selectedLayoutV2":2,"isSlideshowFont":false,"externalInfoHeight":0,"externalInfoWidth":0.5},"container":{"width":940,"galleryWidth":972,"galleryHeight":0,"scrollBase":0,"height":null}}

    Contact: (800)447-2150 Ext. 1        To contact Jigsaw simply send a message in our chat window!

    • Facebook - Black Circle
    • Twitter - Black Circle

    © 2017-2020 Jigsaw Security Enterprise Inc.

    Jigsaw Security Enterprise Inc is a SDVOSB - Service Connected Disabled Veteran Owned Small Business