Blog > Use Cases > Cybersecurity

Cryptocurrency analysis: visualizing the WannaCry attack

Cryptocurrency analysis: visualizing the WannaCry attack

Product Manager
4th May, 2022 | 8 min read

Remember the WannaCry ransomware attack? Launched in May 2017, it was one of the most devastating and extensive...

Root cause analysis with timeline & graph visualization

Root cause analysis with timeline & graph visualization


25th January, 2022 | 12 min read

Our updated guide to building a custom root cause analysis timeline and graph visualization app in React, with...

Visualize a cyber attack with the MITRE ATT&CK framework

Visualize a cyber attack with the MITRE ATT&CK framework

Head of Product Management
24th August, 2021 | 7 min read

I’ll demonstrate how adding the MITRE ATT&CK framework to your data visualizations can power your...

Forensic timeline analysis of network traffic

Forensic timeline analysis of network traffic

Head of Product Management
27th July, 2021 | 8 min read

Find out how to use network visualization and forensic timeline analysis to make sense of complex, high-velocity...

Malware investigation tools for cyber analysts

Malware investigation tools for cyber analysts

Head of Product Management
20th November, 2020 | 5 min read

How to build engaging and useful data visualization tools for cyber security analysts, from cyber threat...

Six essential cyber security analysis tools

Six essential cyber security analysis tools

Head of Product Management
11th August, 2020 | 8 min read

With examples from the cyber security world, this blog focuses on six clever customization options in KeyLines and...

Visualizing data breaches with cyber security graphs

Visualizing data breaches with cyber security graphs

Marketing Director
20th April, 2020 | 6 min read

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight...

Graph visualization use cases: cyber security

Graph visualization use cases: cyber security

Marketing Director
25th September, 2017 | 4 min read

Let’s explore the role of graph visualization in helping cyber security analysts overcome the scale and...

Make sense of cyber threats with graph technologies

Make sense of cyber threats with graph technologies

Marketing Director
12th May, 2017 | 5 min read

This post explores how KeyLines graph visualization simplifies complex Malware networks, making post-attack...

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2022.
Read our Privacy Policy.