top of page

Search

Jigsaw Security
Mar 8, 20194 min read
What analytics show when it comes to news coverage - An example
A look at using sentiment against news and articles.
13 views
0 comments

Security Operations Team
Jun 30, 20181 min read
Vulnerability alerts in different formats? Doesn't matter!
Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
8 views
0 comments

Security Operations Team
Apr 23, 20183 min read
Jigsaw Security adds MISP Support to FirstWatch and more...
Jigsaw Security announced today that our commercial sensor now interfaces with MISP directly. Simply add your API key to our FirstWatch...
32 views
0 comments


Jigsaw Development Team
Dec 27, 20173 min read
Defensive Cyberspace Operations using Tensorflow
This post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
84 views
0 comments

Jigsaw Development Team
Dec 17, 20173 min read
Jigsaw Analytic Platform - Document Engine
Jigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...
20 views
0 comments

Technology
Nov 30, 20172 min read
Term Identification for Cloud Enabled Systems
Moyock, NC - Jigsaw Security is working on a new technology to allow cloud operators to quickly and easily find content in PDF's, Word...
10 views
0 comments
bottom of page