Data on 123M US households exposed in latest misconfigured AWS cloud storage case

“Discussing the possibility that the data may have been accessed, JASK’s Director of Security Research, Rod Soto told SiliconANGLE that “there’s a good chance data is the wrong hands” as “malicious…


Cueing Threat Hunters with Change Detection

  Artificial Intelligence (AI) and various component tools such as machine learning (ML) are not intended to fully-automate threat mitigation and response, at least not in the current generation…


What is a botnet? And why they aren’t going away anytime soon

“In addition to creating a common, worldwide cybercrime enforcement system, there also needs to be standard regulations for manufacturers, requiring a certain level of minimal security in IoT…


Flaw in macOS High Sierra allows easy access

“The MacOS High Sierra vulnerability is alarming because it makes it seamless for someone to log into a system as root. While there are other methods that can provide bad actors with access and…


Single Sign On: Feature or Threat?

A conflicting issue between usability and security is at the core of single sign on capabilities. The use of single sign on (SSO) is from the perspective of usability, a must have. SSO is required to…


Death of the Tier 1 SOC Analyst

"Greg Martin, founder of startup JASK, which offers an artificial intelligence-based SOC platform, says Tier 1 analysts are basically the data entry-level job of cybersecurity. "We created it out of…


Cool Companies in Cognitive Computing

"JASK, an enterprise artificial intelligence (AI) cybersecurity company, that recently launched with the announcement of $12 million in Series A funding, offers a cloud platform that uses machine…


What is Bad Rabbit? Petya-Style Ransomware Attack Hits Russia, Ukraine

"Security researchers reported Tuesday a new wave of potentially destructive ransomware known as Bad Rabbit. The malicious attack spread quickly across computer systems in Eastern Europe, including…


Time Series Anomaly Detection in Network Traffic: A Use Case for Deep Neural Networks

Introduction As the waves of the big data revolution cascade across industries, more and more forms of sensor data become valuable inputs to predictive analytics.  This sensor data has an intrinsic…


Executive Summary