Forensic timeline analysis of network traffic
Dan Williams Chief Product Officer
27th July, 2021 | 9 min read
Find out how to use network visualization and forensic timeline analysis to make sense of complex, high-velocity...
Dan Williams Chief Product Officer
27th July, 2021 | 9 min read
Find out how to use network visualization and forensic timeline analysis to make sense of complex, high-velocity...
Dan Williams Chief Product Officer
20th November, 2020 | 5 min read
How to build engaging and useful data visualization tools for cyber security analysts, from cyber threat...
Dan Williams Chief Product Officer
11th August, 2020 | 8 min read
With examples from the cyber security world, this blog focuses on six clever customization options in KeyLines and...
Andrew Disney Marketing Director
20th April, 2020 | 6 min read
Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight...
Andrew Disney Marketing Director
12th May, 2017 | 5 min read
This post explores how KeyLines graph visualization simplifies complex Malware networks, making post-attack...
Andrew Disney Marketing Director
21st February, 2017 | 4 min read
We’ll explore how Devo empowers analysts to harness the connections in their big data, with the help of the...
Andrew Disney Marketing Director
6th April, 2016 | 4 min read
There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts, line...
Andrew Disney Marketing Director
13th January, 2016 | 4 min read
Learn how EclecticIQ launched a pioneering cyber threat intelligence platform that includes graph visualization...
Valerio Cestarelli Intern - Software Development
6th October, 2015 | 4 min read
Maintaining the integrity of cyberinfrastructure and understanding network vulnerabilities is a critical task for...