Blog > Use Cases > Cybersecurity

Cyber hijacking: Detecting BGP spoofs with KeyLines

Cyber hijacking: Detecting BGP spoofs with KeyLines

Intern - Software Development
6th October, 2015 | 4 min read

Maintaining the integrity of cyberinfrastructure and understanding network vulnerabilities is a critical task for...

CyberFlow: Securing the Internet of Things

CyberFlow: Securing the Internet of Things

Marketing Director
16th December, 2014 | 4 min read

Highlights KeyLines integrated into award-winning cyber security analytics solution Designed to visualize...

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2024.
Read our Privacy Policy.