JASK Top 10 Machine Learning Use Cases

We present, in this set of use cases, a series of examples that help illustrate the beauty and power of open source security analytics. Each example shares the exact attack data and remediation.

Download PDF

Live From BlackHat 2017:Rod Soto Interview

Watch JASK's Senior Security Researcher, Rod Soto, interview
with Security Guy TV live at BlackHat 2017.

Watch Video

Threat Hunting on Hadoop Using Zeppelin Notebooks- Webinar

Join Daniel Smallwood as he walks through some of Hadoop’s key threat detection techniques, an intro to Zepplin Notebooks, and threat hunting using PySpark and SparkSQL.

View Webinar