Auto-Discovery of Communities from Network Data

Prologue The Data Science team at JASK got its start well before I had even heard of JASK; Joseph Zadeh (Director of Data Science) and I met in San Francisco when we worked together on papers for a…


Let's free our analysts

There is no disputing it: The way we manage cyber security is broken.  Today most organizations see hundreds if not thousands of cyber attacks daily, sending each of these attacks to a human analyst…


Threat Hunting Part 3: Going Hunting with Machine Learning

Due to being busy with proof of concepts at the end of the quarter, I’ve been on the prowl for lazy hunting ideas. Every security person’s dream is to have interesting data come to them, but is this…


Threat Hunting with your hands tied - This is Big Data Part II

  Threat hunting isn’t only about finding compromised assets, it’s also performing the predictive function of finding the holes a malicious attacker might take advantage of. As I mentioned last…


Why are we using logs to do the networks job?!

  Why cook eggs on a glass stove instead of using the non-stick pans in the cupboard? Sure it’ll cook the eggs, but it is not the proper tool for the job. So, why is the SOC using endpoint logs…


Tribal Knowledge- Did your security expert leave with all your knowledge?

  Threat hunting isn’t only about finding compromised assets, it’s also performing the predictive function of finding the holes a malicious attacker might take advantage of. As I mentioned last…


The Rise of the Security Data Scientist

In the future of cybersecurity, there is a new role that will be critical to the security of an organization: the Security Data Scientist. The security data scientist will bring new skills to the…