This week at JASK, we introduced templated rules to our customers. Templated rules make it easy for customers to create a single rule for a data source that has multiple event types.
JASK is traveling the country in 2019 on our SIEM Insanity Tour to let people get a first-hand experience of a modern SIEM.
In this post, we will cover how to use the JASK API to identify gaps in rule coverage.
How to expand the funnel by customizing workflow inside the JASK platform and pulling the additional metrics via API.
Increasingly, more organizations are starting to rely on open source software to build their products. JASK is no exception to this trend.
Almost anyone who has spent time around SIEM and security operations have seen a security event management funnel.
Today’s innovating companies are increasingly moving to public cloud environments to manage their mission-critical applications.
It’s prime time SIEM platforms move to the cloud—and the move needs to be built on a cloud-native platform that was designed for the cloud from the start.
Cloud computing has become so readily adopted that some business applications are now consumed almost exclusively as cloud services.
The cybersecurity industry needs to ingest and make decisions on this information every day, but as more data is generated it gets harder and harder to find meaningful answers from it.
Humans are now producing more data on a day-by-day basis than ever before. Every minute, users on the internet generate 2.5 quintillion bytes of data on average.