Cyber Security

News and opinion from the team behind the KeyLines network visualization toolkit

Graph visualization use cases: cyber security

25th September, 2017
Estimated reading time 4–7 minutes

Our last blog post was the first of three exploring real world applications for graph visualization. Use cases for graph…

| |

Making sense of Cyber threats with graph technologies

12th May, 2017
Estimated reading time 5–8 minutes

Graph visualization is a vital component of any cyber security strategy. Without it, analysts struggle to uncover insight from complex…

| |

Visualizing Cyber Security Graphs: Data Breaches

29th April, 2016
Estimated reading time 5–8 minutes

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight from cyber security data.

Visualizing Cyber Security Data: Detecting Anomalies

6th April, 2016
Estimated reading time 4–6 minutes

There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts,…

| | |

KeyLines 3.0: Supercharge your charts with WebGL

29th March, 2016
Estimated reading time 2–3 minutes

Introducing KeyLines 3.0: The new release of the network visualization toolkit incorporates huge performance enhancements to meet the scale and…

| |

EclecticIQ: Understanding Cyber Threat Intel as a Graph

13th January, 2016
Estimated reading time 4–6 minutes

Cyber security start-up, EclecticIQ, builds a pioneering threat intelligence platform with KeyLines toolkit. Application bootstraps cyber intelligence activity by empowering…

| | |

Graphs and Cyber Security Intelligence

13th January, 2016
Estimated reading time 5–8 minutes

Cyber intelligence data is big, complex and varied. Graph visualization is fast becoming a ‘must-have’ technology tools for organizations serious about cyber threats. We caught up with Raymon van der Velde, Co-Founder and VP Product at EclecticIQ – an award-winning pioneer of graph-based cyber security tools – to learn more about what they are doing.

| | | |

Cyber hijacking: Detecting BGP spoofs with KeyLines

6th October, 2015
Estimated reading time 4–6 minutes

Maintaining the integrity of cyber infrastructure and understanding network vulnerabilities is a critical task for organizations and governments. What about…

| | |

Data Visualization and Cyber Security

17th June, 2015
Estimated reading time 3–5 minutes

Last week, we were lucky enough to take part in the Cyber Innovation Zone at Infosec 2015. Our Product Manager,…

| |

Cyber security and KeyLines

16th March, 2015
< 1 minute

Thanks to everyone who attended our recent webinar. It was awesome to bring together so many cyber security and data visualisation…

| | |

Subscribe to our newsletter

Get occasional data visualization updates, stories and best practice tips by email