top of page

Search

Vulnerability alerts in different formats? Doesn't matter!
Image: A US-CERT bulletin links to external content. One of the biggest issues that we see when trying to keep track of all of the...
Security Operations Team
Jun 30, 20181 min read
8 views
0 comments


Defensive Cyberspace Operations using Tensorflow
This post describes how Jigsaw Security utilizes tensorflow to detect breaches, attackers and to use machine learning to answer hard questio
Jigsaw Development Team
Dec 28, 20173 min read
85 views
0 comments

Jigsaw Analytic Platform - Document Engine
Jigsaw Security new document engine can extract and process millions of documents per day. This capability is being used to perform...
Jigsaw Development Team
Dec 17, 20173 min read
21 views
0 comments
bottom of page