ESG Solution Showcase

When it comes to security operations, large organizations face a troubling situation. Each year, they increase security operations budgets and purchase/deploy new types of technologies, but these investments deliver incremental benefits at best.

Executive Summary

JASK was formed to forge a brand new approach to enterprise Security Operations. Composed of seasoned cyber security leaders, JASK is revolutionizing the security landscape.

Security Operations Accelerated

Teams spend more time on routine threats and keeping there SIEM up and running instead of being able to focus on protecting their organizations from the real and dangerous targeted attacks.

DPI: Data for the SOC

Gaining end-to-end network visibility is a necessity for the SOC team, however Netflow data is insufficient and Full Packet Capture is data overload. DPI, however will provides the right amount.

Case Study: Global Investment Firm

Global Investment Firm Bolsters Small Security Team With Autonomous Security Operations

Case Study: Government Solutions Provider

Digital Government Solutions Security Team Gains Unparalleled Visibility with JASK

eBook: JASK Top 10 Machine Learning Use Cases

We present, in this set of use cases, a series of examples that help illustrate the beauty and power of open source security analytics. Each example shares the exact attack data and remediation.

JASK Webinar: A Cure for the Common SOC by Rocky DeStefano (ISSA Thought Leadership Series)

With cybersecurity concerns escalating, organizations of all sizes have scrambled to boost budgets, hire talent and improve security operations – all in the hopes of catching up with and defeating a sophisticated and nearly-invisible enemy.

JASK Webinar: Threat Hunting on Hadoop Using Zeppelin Notebooks

Join Daniel Smallwood as he walks through some of Hadoop’s key threat detection techniques, an intro to Zepplin Notebooks, and threat hunting using PySpark and SparkSQL.

JASK at RSA 2018

JASK stands out at RSA

JASK RSA 2018: Forgive Me Father For I Have SIEM

JASK Asks: Do you have SIEM? How do you use SIEM?

JASK Interview: Rod Soto at Black Hat 2017

At Black Hat 2017, JASK Director of Security Research Rod Soto caught up with Security Guy Radio to discuss how JASK leverages machine learning techniques to streamline security operations and why we built JASK on open source.

Why Partner with JASK

JASK Answers brings together cybersecurity solution provider and technology alliance partners to broaden the reach and capabilities of the JASK ASOC platform.

JASK RSA 2018

Stop by our booth and say hello!

JASK Customer Success: VEEVA

JASK customer, Veeva, is seeking to evolve its security operations capabilities to get analytics and more actionable alerts out of its data. Veeva Global Information Security Officer, David Tsao, explains how his vision for the SOC of the future is made possible with JASK.

Watch a 3 minute video about JASK’s Mission and Vision

SOC analysts manage too many alerts without enough context. Learn from our team how JASK is modernizing security operations and freeing analysts to do the job they signed up to do. In this video, get a view into how our Autonomous Security Operations Center (ASOC) platform works.

JASK Customer Success

At JASK we aim to discover and understand the problem set of our customers, so that we can align JASK’s value and ensure we’re delivering the highest level return on investment that CISOs are seeking. Learn more about our customer success philosophy and how we create programs that drive success and improve SOC efficiency.

All your passwords are belong to us

There are a number of password alternatives or complements that can improve security from using passwords as the only authentication/authorization method.

How botnets are built on mass CMS exploitation

It is calculated that the internet has about 2 billion websites, and there are plenty that are built using CMS (content management frameworks).

Weaponizing Oracle WebLogic Vulnerabilities

Recent Oracle WebLogic vulnerabilities CVE-2017-10271 and CVE-2018-2628 are just another chapter in this story, as bots have already been observed attempting weaponize these vulns.

Applied Machine Learning in Security Part 1: The Introduction for Skeptics

This the first post in a multi-part series about employing “real” machine learning in network security. The remainder of the series will follow with more details to come.

Trickbot ‘Son of Dyre’

Each day, security operation centers and researchers alike wage battle against incoming waves of scanning, brute force attempts, and malicious email.

Rig Exploit Kit delivering ransomware via Adobe Flash exploit (CVE-2018-4878)

Exploit kits are very efficient tools used in the cybercrime underground. These frameworks are packed with a number of exploits and mechanisms to detect vulnerabilities in systems/applications and…

What Data Types to Prioritize to Shine the Light on Blind Spots in Your SIEM

More log data equals more money and, as a result, enterprises have to make a difficult choice around what log sources and data are what they guess is the most important. 

Drupalgeddon2

A new vulnerability affecting the popular content management system (CMS) framework Drupal has been announced. This vulnerability is said to affect over 1 Million websites.

Future SOC: The Universal Analyst

Backed by government funding and Silicon Valley VCs, technologists are working furiously to innovate technologies like machine learning and AI and leverage them to force-multiply SOC analyst…

New Samba Vulnerabilities

A new set of vulnerabilities found in the SAMBA service protocol highlight the need for approaches that go beyond the simple use of static signature defense technologies. These two vulnerabilities…

Four “Red Flag” SOC Phrases

Security is a hot-button issue in businesses today to a degree we haven’t seen before. For the C-suite and other business leaders that begin paying more attention to what’s going on in the SOC, it…

Domain Hijacking Impersonation Campaigns

A number of domain “forgeries” or tricky, translated look-alikes have been observed recently. These attack campaigns cleverly abuse International Domain Names (IDN) which, once translated into ASCII…

Cryptocoin Mining Attack Vectors Reshaping the Threatscape

The rise in value of cryptocurrencies is driving malicious actors to implement payloads that allow the use of CPU/GPU of compromised hosts in order to mine cryptocurrency.  The process of mining is…

Building Lightweight Streaming Time Series Models

With modern technology today, almost all personal devices participate in a highly connected interweb and leave a footprint of our digital behaviors. The power of analytic modeling can help us…

Connecting the Dots

As a technology marketer, I have spent 20 years working with technical teams to identify ways to articulate how and why solutions work the way they do. While I have worked in many complex industries,…

Love The Vendor That Loves You Back

The sales machine is a complex beast and many may misinterpret who a good sales team is ultimately meant to serve. When salespeople want you as a customer, it’s their goal to bring you into the fold…

Introducing CHIRON: A Case for Home Network Monitoring and Defense

Nowadays, all our homes have become microenvironments for complex networking, composed of almost every single home appliance with added processing and networking capabilities. Examples of these home…

Keeping the “Science” in “Data Science”: Calibrating Algorithms for Threat Detection

As attack payloads and methods have become more easily adaptable and customizable to individual campaigns and targets (e.g. polymorphic malware, customized payloads, credential theft, etc.), threat…

JASK Unveils Special Ops

JASK Unveils ‘Special Ops’ Professional Service to Support Customers with an Elite Cyber Threat Hunting Team

Cryto-Me0wing, Not a Cute Kitty of the Internet

The Kitty malware is predominately being deployed for crypto-mining purposes, but Rod Soto, director of security research at JASK, said it’s important to note that vulnerabilities that affect CMS…

Cat Burglar: Kitty cryptominer targets web application servers, then spreads to app users

“...It's important to note that vulnerabilities that affect CMS frameworks - like Drupalgeddon 2.0 - are particularly concerning because the systems make up a significant portion of the internet and…

JASK Hires Former Cylance Executive As CMO for Autonomous SOC Push

Jask, an autonomous security operations center (ASOC) platform provider, has hired Cylanceveteran Greg Fitzgerald as its CMO. Fitzgerald is responsible for the global strategy and execution of Jask’s…

This Bay Area cybersecurity startup has big hiring plans in Austin

With a new office at The Domain, JASK has named Austin as its second headquarters. That office is already home to the company’s VP of product Rocky DeStefano, CTO J.J. Guy, VP of engineering Rob Fry,…

Managed Security Services Provider (MSSP) News

JASK, which develops an Autonomous Security Operations Center (ASOC) platform, has hired Greg “Fitz” Fitzgerald as chief marketing officer (CMO). He previously was CMO of Cylance. Earlier, he held…

JASK Appoints Recognized Cyber Market Maker Greg Fitzgerald as CMO and Unveils HQ2 in Austin

Founding Cylance CMO Leads ASOC Platform Company's Global Go-To-Market Strategy From New Office in the Domain Northside

CB Insights Cyber Defenders 2018: Autonomous Watchdog

An ideal security operations center (SOC) fuses data-streams to give analysts an overview of a company’s systems. Autonomous systems help analysts prioritize which alerts to address.

URL file attacks spread Quant Locker

Rod Soto, director of security research at JASK, told SC Media the attack matches current observations of other malicious campaigns where scripting languages are being used to execute exploitation…

JASK ASOC Platform Integrates With Demisto Enterprise to Optimize Security Operations

J.J. Guy, chief technology officer at the cybersecurity firm JASK, said that the spread of ransomware attacks on public safety agencies and other key government operations shows...

Hackers have taken down dozens of 911 centers. Why is it so hard to stop them?

When news broke last week of a hacking attack on Baltimore’s 911 system, Chad Howard felt a rush of nightmarish memories.

JASK and the Future of Autonomous Cybersecurity

Read Danny Crichton's article exploring the truth about today's Security Operations Center and what the future just might bring us.

JASK Expands World-Class Technology Team with Appointment of Rob Fry as VP of Engineering

Industry Veteran and Former Netflix Security Leader to Drive Development of the JASK ASOC Platform; Will Join Company in Austin, Texas Office

Startup Attacks Splunk In $6B Cyberthreat Data Market

Why would a company buy software from a startup when a large publicly-traded supplier is happy to sell it to you? The answer is easy to say and hard to do

JASK Brings AI-powered Security Platform to Europe in Partnership with Ignition Technology

JASK Answers for Channel Partners, a Programme Designed to Expand the Availability of the Autonomous Security Operations Platform, Launches in the UK Today

Record-breaking GitHub DDoS Attack: Here’s What Enterprises Need to Know

“While the DDoS attack GitHub experienced was the largest ever recorded, organizations should be prepared for campaigns of this magnitude going forward, as they’ll likely become commonplace,” Rod…

Cellebrite Reportedly Can Unlock Every iPhone Model

Rod Soto, director of security research at JASK told SC Media history has taught us that keeping zero days in the name of security or for law enforcement is dangerous.

20 Cyber Security Startups to Watch in 2018

The JASK Autonomous Security Operations Center (ASOC) platform leverages AI and machine learning to automate basic and repetitive security operations tasks, freeing SOC...

Israeli Security Firm Cellebrite Claims to be Able to Hack iOS 11

Industry Veteran and Former Netflix Security Leader to Drive Development of the JASK ASOC Platform; Will Join Company in Austin, Texas Office

JASK channel partner program looks for regional allies

"The JASK channel partner program is looking for regional partners as it rolls out a go-to-market strategy for its Autonomous Security Operations Center platform."

Stalled Equifax Breach Investigation Could Provide Valuable Insight

"Cybersecurity experts agree that it’s important to investigate the root cause and subsequent actions that led to the Equifax breach. “The investigation into Equifax should continue...

JASK Announces Technology Alliance with Carbon Black

Carbon Black, the Latest to Join the JASK Answers for Technology Alliances Program, Helps SOC Analysts Speed Response Times

AI’s biggest risk factor: Data gone wrong

"Ninety percent of AI is data logistics," says JJ Guy, CTO at Jask, an AI-based cybersecurity startup. "All the major AI advances have been fueled by advances in data sets," he says.

The role retailers should play in driving IoT security certification standards

“One of the biggest risks to IoT is that there are currently no security standards for the hundreds of new IoT devices that flood the market each year. For e-commerce, we rely on SSL to consistently…

Live from BlackHat: Rod Soto Interview

Rod Soto is interview by Security Guy TV live from BlackHat USA 2017

Greg Martin: Security operations is broken, and AI can fix it

To uncover how to improve security, we must first consider that the way we perform security operations is broken. Security operations teams — often part of a centralized security operations center —…

Trident Product Release: Press Coverage Round-up

A round-up of coverage accompanying the recent launch of TRIDENT

JASK emerges from stealth with $12 million… Press Round-up

Machine learning and AI are going to reach colossal levels by 2021 as the market swells to $96 billion.

Buckle up for the AI security revolution – spending to hit $96b by 2021

Machine learning and AI are going to reach colossal levels by 2021 as the market swells to $96 billion.

Gigamon brings deep packet inspection to Amazon cloud

Gigamon Inc. is bringing on-premise-like network visibility to the Amazon Web Services cloud with a data-in-motion visibility platform...

Can Hackers Be Stopped? The State of Defense in the Private Sector

One week before the recent massive hack attack shut off access to Twitter, PayPal, Airbnb and dozens of other major websites, I was at an off-the-record conference with leaders of some of the…

Meet The Technology That Could Be A Surprising Savior In Securing The ‘Internet Of Things’

Is that smart light bulb spying on you? Connecting household objects to the Web – the “Internet of Things”, or IoT for short – holds amazing promise and is spawning new applications all the……

Cisco launches $10 million scholarship to tackle cybersecurity talent shortage

Networking technology behemoth Cisco has announced a new multi-million dollar fund to tackle the growing shortage in the global cybersecurity talent pool.

How deep is your learning?

When the virtual assistant Siri showed up on iPhones four years ago, the technology felt like the first glimpse of those scary-smart, talking robots you’ve been reading about in science fiction for…

Fast Data Will Revolutionize Cybersecurity in 2016

How could ordering a pizza take down a bank? ...

EXPERIENCE THE JASK PLATFORM
Learn about JASK’s AI powered security operations platform in our video library.
WATCH VIDEOS
Take self-guided tour and see key platform features and product UI in action.
TAKE TOUR
Join a live, interactive Product Webinar with your peers. 30 minutes. Every Wednesday at 11PST.
REGISTER
Schedule your One-on-One Product Demo with our expert Sales Engineer and see the JASK platform in action.
REQUEST DEMO