top of page

Search


Why a layered defense is not adequate for protecting networks
Every day we witness breaches and hacked devices at some of the largest corporations. We know from our experience that many of these...
Security Operations Team
Apr 27, 20182 min read


Report of IOT Activity of Interest
We are urging our users and partners to report any activity observed around the following incident. Our FirstWatch sensor is detecting...
Security Operations Team
Apr 26, 20181 min read


Malware Evades Machine Learning
One of the first things we noted when we started working with TensorFlow was that some samples were smart enough to evade detection....
Security Operations Team
Apr 24, 20183 min read


Jigsaw Security adds MISP Support to FirstWatch and more...
Jigsaw Security announced today that our commercial sensor now interfaces with MISP directly. Simply add your API key to our FirstWatch...
Security Operations Team
Apr 23, 20183 min read


Why Cyber is not enough...
In today's world just securing your Cyber infrastructure is not enough. In many cases companies and agencies spend huge amounts of their...
Security Operations Team
Apr 19, 20183 min read


HIDS Endpoint Protection
Jigsaw Security Enterprise today announced the re-release of our Host Intrusion Detection System monitor. The software provides companies...
Security Operations Team
Apr 19, 20181 min read


Jigsaw Security joins several incubators and integration organizations
Jigsaw Security wanted to update our customers, partners and the public and let everyone know that we are joining some technical and...
Jigsaw Security Press Office
Apr 17, 20181 min read


Phishing Activity Report
Today we are reporting on a phishing attempt and although we don't normally agree with Kaspersky, they got it right this time. A...
Security Operations Team
Apr 11, 20181 min read


Download Firstwatch Sensor for VirtualBox
Jigsaw Security has made available a virtualized community edition of our sensor that detects threats. This version will not stop attacks...
Jigsaw Security
Apr 10, 20181 min read


Most Active Attackers 3-9-2018 Memcached Vulnerability
Today we are observing a somewhat normal amount of activity on our sensors. We have started including our internal sensors in reporting...
Security Operations Team
Apr 9, 20182 min read


Continuous Diagnostics and Mitigation Adopted by Jigsaw Security
The Department of Homeland Security has been pushing for the Continuous Diagnostics and Mitigation program known as CDM model for awhile...
Security Operations Team
Apr 5, 20182 min read


Years later pagers still leaking PHI and other sensitive information
The Problem Back in the 80's and 90's it was sort of a fashion statement to have a pager on your hip. Now that cell phones are the...
Security Operations Team
Apr 5, 20182 min read


Jigsaw registers pastearchives.com, you can guess what's next
One of the most frustrating things is having information show up on the Internet but then when you go to look at it, the content is gone....
Security Operations Team
Apr 5, 20181 min read


Opinion: Looking back at the Internet of Things
I remember having conversations back in 1999 about the automation and control systems being insecure as we approached the year 2000...
Kevin Wetzel CEO Jigsaw Security
Apr 4, 20184 min read


Attacks and Monitoring Update
One of the most challenging things we do is to setup monitoring of DNS sinkhole activity at customer sites. When a company utilizes our...
Security Operations Team
Apr 4, 20184 min read


Document Processing in the Jigsaw Analytic Platform
Document Viewer in the Jigsaw Analytic Platform The new Jigsaw Analytic Platform document viewer parses out all of the document content...
Product Updates
Mar 29, 20181 min read


IRS Scam Alert
It's that time of year again, no I'm not talking about tax time but rather time to start mowing your lawns which is exactly what I was...
Kevin Wetzel CEO Jigsaw Security
Mar 29, 20185 min read


Jigsaw Sensor Deployment Updates
Late last year we made a decision to expand our public facing sensor infrastructure. These sensors look for activity that is occurring on...
Jigsaw Security
Mar 28, 20181 min read


Fancy Bear Leveraging OVH
Just curious as to why Fancy Bear is hosting files on OVH Hosting and nobody is taking it down! More than likely it is a compromised...
Jigsaw Security
Mar 27, 20182 min read


New Content on Jigsaw Roku Channel
Several new links to content have been updated on the Jigsaw Roku Channel. The new content includes: Shadow Companies - A look at private...
Jigsaw Security
Mar 23, 20181 min read
bottom of page