Cyber Security

News and opinion from the team behind the KeyLines network visualization toolkit

Spot alerts in network topologies with graph visualization

12th March, 2018
Estimated reading time 4–7 minutes

In this blog post, we’ll show you how graph visualization can make alert detection and investigation more effective, and help you gain a clearer understanding of your infrastructure.

Graph Visualization & Python: Integrating KeyLines with Jupyter

8th January, 2018
Estimated reading time 5–8 minutes

Enriching Jupyter Notebooks with Graph Visualization Sharing intelligence is a key part of every graph analysis workflow. Once your connected…

|

Graph visualization use cases: cyber security

25th September, 2017
Estimated reading time 4–7 minutes

Our last blog post was the first of three exploring real world applications for graph visualization. Use cases for graph…

| |

Making sense of Cyber threats with graph technologies

12th May, 2017
Estimated reading time 5–8 minutes

Graph visualization is a vital component of any cyber security strategy. Without it, analysts struggle to uncover insight from complex…

| |

Visualizing Cyber Security Graphs: Data Breaches

29th April, 2016
Estimated reading time 5–8 minutes

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight from cyber security data.

Visualizing Cyber Security Data: Detecting Anomalies

6th April, 2016
Estimated reading time 4–6 minutes

There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts,…

| | |

KeyLines 3.0: Supercharge your charts with WebGL

29th March, 2016
Estimated reading time 2–3 minutes

Introducing KeyLines 3.0: The new release of the network visualization toolkit incorporates huge performance enhancements to meet the scale and…

| |

EclecticIQ: Understanding Cyber Threat Intel as a Graph

13th January, 2016
Estimated reading time 4–6 minutes

Cyber security start-up, EclecticIQ, builds a pioneering threat intelligence platform with KeyLines toolkit. Application bootstraps cyber intelligence activity by empowering…

| | |

Graphs and Cyber Security Intelligence

13th January, 2016
Estimated reading time 5–8 minutes

Cyber intelligence data is big, complex and varied. Graph visualization is fast becoming a ‘must-have’ technology tools for organizations serious about cyber threats. We caught up with Raymon van der Velde, Co-Founder and VP Product at EclecticIQ – an award-winning pioneer of graph-based cyber security tools – to learn more about what they are doing.

| | | |

Cyber hijacking: Detecting BGP spoofs with KeyLines

6th October, 2015
Estimated reading time 4–6 minutes

Maintaining the integrity of cyber infrastructure and understanding network vulnerabilities is a critical task for organizations and governments. What about…

| | |

Subscribe to our newsletter

Get occasional data visualization updates, stories and best practice tips by email