Rod Soto, director of security research at JASK Inc., noted that incidents like this where a known vulnerable product is exploited raises the question of whether software developers should be mandated to introduce automatic patching of their code.
The latest round of security analytics/operations vendors, such as DEVO, Empow Cybersecurity, and JASK, have embraced a cloud-based backend designed for data pipelining, processor-intensive machine learning algorithms, and massive scale.
The internet is a bustling place, with hackers constantly firing exploits against whoever they can. Cybersecurity firm GreyNoise is trying to filter out some of that noise.
“Apple’s decision to significantly expand its commitment to Austin clearly illustrates to the incredible talent pool in place here, which has accelerated JASK’s growth since opening our headquarters earlier this year,” Jask CEO Greg Martin said.
Cybersecurity startup JASK has signed a distributor deal with Exclusive Group, a global, security-only distributor, to accelerate market penetration of its technology globally.
Distributor Exclusive Group has been appointed by JASK to accelerate the market penetration of its technologies around the world.
Dean Teffer, principal scientist for machine learning at JASK, expects the mature learning field in particular to mature and, as a result, play a more pivotal role in how companies work with their data.
“Compared to even just a few years ago, the tools available for data scientists and machine learning engineers today are of remarkable variety and ease of use.”
JASK CEO Greg Martin along with 20 other Austin tech leaders share what they are grateful for this year.
“We shouldn’t be relying on frameworks to explain everything,” says Rod Soto, director of security research at JASK. “Adversarial drift is dynamic by nature.”
An unsecured MongoDB server has exposed personal data on 689,272 American Express India customers. JASK Director of Security Research Rod Soto comments on security precautions.
Given the fragile nature of the geopolitical landscape, along with the increasingly sophisticated capabilities of nation states to launch cyber attacks on critical infrastructure and businesses alike, the question of cyberwar has never been more relevant.