Global Investment Firm Bolsters Small Security Team With Autonomous Security Operations
When it comes to security operations, large organizations face a troubling situation. Each year, they increase security operations budgets and purchase/deploy new types of technologies.
JASK was formed to forge a brand new approach to enterprise Security Operations. Composed of seasoned cyber security leaders, JASK is revolutionizing the security landscape.
Teams spend more time on routine threats and keeping there SIEM up and running instead of being able to focus on protecting their organizations from the real and dangerous targeted attacks.
The SOC is drowning in systems which are giving them information, but lacking enough context to make good decisions. As a result, most SOC teams are spending too much time on validation and not enough time on problem-solving.
Watch what JASK has planned for BlackHat, DefCon, and BSides all in Las Vegas, Nevada the first week in August. See you there!
We had a great HQ2 grand opening on April 26, 2018! Stay tuned for more exciting events as we grow our team in Austin.
JASK's automated approach that reduces the noise down to the true signals so the analysts can act quickly and respond quickly.
Watch how JASK was able to stand out at the largest cyber security conference, RSA, hosted across the street from the JASK office.
JASK set out to interview security professionals attending RSA Conference 2018, in search of answers to how modern companies utilize SIEM.
Security analysts are frustrated by technology that doesn’t support their needs, they are forced to manage multiple systems and manually correlate and analyze data.
Rod Soto presents Part 2 of JASK Expert Analysis series. In the series, Current Crimeware and Nation State Activity, Soto will discuss the latest need-to-know analysis of the current threat landscape.
In the JASK Expert Analysis series kick-off, Kevin will present on Current Crimeware and Nation State Activity. He will discuss the latest need-to-know analysis of the current threat landscape.
Enterprise Strategy Group (ESG) and JASK pair up to offer an on-demand webinar about the top 5 security and operation challenges faced by organizations on a daily basis.
With cybersecurity concerns escalating, organizations are scrambling to boost budgets, hire talent and improve security operations – in the hopes of defeating a sophisticated enemy.
The cybercrime threatscape is constantly changing as hackers adapt and repurpose the use of many different types of tools and attack vectors.
This particular vulnerability can be exploited remotely, requires no authentication or elevated user privileges.
JASK reviews what's new and exciting and share some of the thinking and motivation behind the new features.
In our newest threat advisory, we explore the process of detection and mitigation of SamSam.
“Golf is a science, the study of a lifetime, in which you can exhaust yourself but never your subject.”
I would argue that today’s security operations center (SOC) teams are stuck in the 21st century digital equivalent of hand painting cars. To put it simply, enterprise SOC teams are burnt out from alert overload.
With major data leaks and malicious digital threats in the news on a near-daily basis, the need for cutting-edge cybersecurity is more apparent than ever.
Rod Soto, director of security research at JASK, told SiliconANGLE that “this is an interesting attack vector as the Kodi media player is usually present across many platforms – from computers to other IoT devices.”
Shifting from a technical position to a management position can be a radical change. Here's how to determine if it's the right move for you.
Rod Soto, director of security research at JASK, described the campaign as a great example of cybercriminals’ creativity.