Jigsaw SecurityMar 8, 20194 min readWhat analytics show when it comes to news coverage - An exampleA look at using sentiment against news and articles.
Security Operations TeamJun 30, 20181 min readVulnerability alerts in different formats? Doesn't matter!Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
Security Operations TeamApr 23, 20183 min readJigsaw Security adds MISP Support to FirstWatch and more...Jigsaw Security announced today that our commercial sensor now interfaces with MISP directly. Simply add your API key to our FirstWatch...
Jigsaw Development TeamDec 27, 20173 min readDefensive Cyberspace Operations using TensorflowThis post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
Jigsaw Development TeamDec 17, 20173 min readJigsaw Analytic Platform - Document EngineJigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...
TechnologyNov 30, 20172 min readTerm Identification for Cloud Enabled SystemsMoyock, NC - Jigsaw Security is working on a new technology to allow cloud operators to quickly and easily find content in PDF's, Word...