Cyber Case Study

News and opinion from the team behind the KeyLines network visualization toolkit

Visualizing Cyber Security Graphs: Data Breaches

29th April, 2016
Estimated reading time 5–8 minutes

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight from cyber security data.

Visualizing Cyber Security Data: Detecting Anomalies

6th April, 2016
Estimated reading time 4–6 minutes

There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts,…

| | |

EclecticIQ: Understanding Cyber Threat Intel as a Graph

13th January, 2016
Estimated reading time 4–6 minutes

Cyber security start-up, EclecticIQ, builds a pioneering threat intelligence platform with KeyLines toolkit. Application bootstraps cyber intelligence activity by empowering…

| | |

Graphs and Cyber Security Intelligence

13th January, 2016
Estimated reading time 5–8 minutes

Cyber intelligence data is big, complex and varied. Graph visualization is fast becoming a ‘must-have’ technology tools for organizations serious about cyber threats. We caught up with Raymon van der Velde, Co-Founder and VP Product at EclecticIQ – an award-winning pioneer of graph-based cyber security tools – to learn more about what they are doing.

| | | |

CyberFlow: Securing the Internet of Things

16th December, 2014
Estimated reading time 4–6 minutes

Highlights KeyLines integrated into award-winning cyber security solution Designed to visualize thousands of entities in real-time Cloud and on-premise deployments…

| | |

Subscribe to our newsletter

Get occasional data visualization updates, stories and best practice tips by email