Jazz Networks Takes First Place in Cybercom Insider Threat Detection Contest

Cybersecurity firm Jazz Networks has won a competition that focused on the detection of insider threat attacks within a simulated environment at a U.S. Cyber Command-backed cyber innovation and collaboration hub in Columbia, Md.

The Wolf in Sheep's Clothing contest took place at the DreamPort center and sought to validate user activity monitoring tools that utilized real-time data analysis, predictive monitoring and policy-based approaches to track potential cyber anomalies, Jazz said Monday.

Competing teams were tasked to detect unauthorized activity performed by human actors through Windows and Linux machines as well as analyze related information.

Jazz confirmed and probed uncommon system activity using the company's Power Search tool and machine learning sensors to verify the root of attacks on a simulated Cybercom battlefield.

The company ranked highest in the competition's seven categories, which included malicious/suspicious USBs added to network, best overall performance and highest number of detections.

Cybercom and the Maryland Innovation and Security Institute established DreamPort under a partnership intermediary agreement.

Check Also


StackRox to Help Secure Cloud-Based Financial Infrastructure Under DHS Contract

StackRox has received a contract from the Department of Homeland Security to help a large U.S. financial services provider  protect cloud-based applications through the implementation of a Kubernetes and container security platform.


Space Force Taps Net-Centric for Battlespace Awareness Center Support

Boulder, Colo.-based engineering company Net-centric Design Professionals has secured a two-year, $28.6M contract from the U.S. Air Force to support the Overhead Persistent Infrared Battlespace Awareness Center at Buckley Air Force Base.


DARPA Seeks Security Tech for Internet of Things Devices Under CHARIOT Program

The Defense Advanced Research Projects Agency has asked industry to submit research concepts for “revolutionary security technologies” that can help protect the increasing number of internet of things-based devices.