eBOOKS

JASK Top 10 Machine Learning Use Cases

We present, in this set of use cases, a series of examples that help illustrate the beauty and power of open source security analytics. Each example shares the exact attack data and remediation.


Download PDF
INTERVIEWS

Live From BlackHat 2017:Rod Soto Interview

Watch JASK's Senior Security Researcher, Rod Soto, interview
with Security Guy TV live at BlackHat 2017.

Watch Video
WEBINAR

Threat Hunting on Hadoop Using Zeppelin Notebooks- Webinar

Join Daniel Smallwood as he walks through some of Hadoop’s key threat detection techniques, an intro to Zepplin Notebooks, and threat hunting using PySpark and SparkSQL.


View Webinar