Security Operations TeamJun 30, 20181 min readVulnerability alerts in different formats? Doesn't matter!Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
Jigsaw Development TeamDec 27, 20173 min readDefensive Cyberspace Operations using TensorflowThis post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
Jigsaw Development TeamDec 17, 20173 min readJigsaw Analytic Platform - Document EngineJigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...