Blog > Use Cases > Cybersecurity

OUT NOW: Cloud security visualization white paper

OUT NOW: Cloud security visualization white paper

Head of Product Management
25th May, 2023 | 3 min read

As companies move their digital infrastructure to the cloud, and as Infrastructure as a Service (IaaS) becomes the...

Why cyber threats are a business problem, not just a tech problem

Why cyber threats are a business problem, not just a tech problem

Sales Manager (US)
9th May, 2023 | 11 min read

How do senior management teams tackle cyber threats as a business problem? We look at key trends from the latest...

WannaCry analysis: visualizing their ransomware attack

WannaCry analysis: visualizing their ransomware attack

Product Manager
4th May, 2022 | 8 min read

Remember the WannaCry ransomware attack? Launched in May 2017, it was one of the most devastating and extensive...

Root cause analysis with timeline & graph visualization

Root cause analysis with timeline & graph visualization


25th January, 2022 | 12 min read

Our updated guide to building a custom root cause analysis timeline and graph visualization app in React, with...

Visualize a cyber attack with the MITRE ATT&CK framework

Visualize a cyber attack with the MITRE ATT&CK framework

Head of Product Management
24th August, 2021 | 7 min read

I’ll demonstrate how adding the MITRE ATT&CK framework to your data visualizations can power your...

Forensic timeline analysis of network traffic

Forensic timeline analysis of network traffic

Head of Product Management
27th July, 2021 | 10 min read

Find out how to use network visualization and forensic timeline analysis to make sense of complex, high-velocity...

Malware investigation tools for cyber analysts

Malware investigation tools for cyber analysts

Head of Product Management
20th November, 2020 | 5 min read

How to build engaging and useful data visualization tools for cyber security analysts, from cyber threat...

Six essential cyber security analysis tools

Six essential cyber security analysis tools

Head of Product Management
11th August, 2020 | 8 min read

With examples from the cyber security world, this blog focuses on six clever customization options in KeyLines and...

Data breach visualization: exploring cyber security graphs

Data breach visualization: exploring cyber security graphs

Marketing Director
20th April, 2020 | 6 min read

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight...

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2022.
Read our Privacy Policy.