Blog > Use Cases > Cybersecurity

Forensic timeline analysis of network traffic

Forensic timeline analysis of network traffic

Chief Product Officer
27th July, 2021 | 9 min read

Find out how to use network visualization and forensic timeline analysis to make sense of complex, high-velocity...

Malware investigation tools for cyber analysts

Malware investigation tools for cyber analysts

Chief Product Officer
20th November, 2020 | 5 min read

How to build engaging and useful data visualization tools for cyber security analysts, from cyber threat...

Six essential cyber security analysis tools

Six essential cyber security analysis tools

Chief Product Officer
11th August, 2020 | 8 min read

With examples from the cyber security world, this blog focuses on six clever customization options in KeyLines and...

Data breach visualization: exploring cyber security graphs

Data breach visualization: exploring cyber security graphs

Marketing Director
20th April, 2020 | 6 min read

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight...

Make sense of cyber threats with graph technologies

Make sense of cyber threats with graph technologies

Marketing Director
12th May, 2017 | 5 min read

This post explores how KeyLines graph visualization simplifies complex Malware networks, making post-attack...

Devo: Democratizing real time big data

Devo: Democratizing real time big data

Marketing Director
21st February, 2017 | 4 min read

We’ll explore how Devo empowers analysts to harness the connections in their big data, with the help of the...

Anomaly detection in cyber security visualizations

Anomaly detection in cyber security visualizations

Marketing Director
6th April, 2016 | 4 min read

There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts, line...

EclecticIQ: Understanding Cyber Threat Intelligence with Graph Visualization

EclecticIQ: Understanding Cyber Threat Intelligence with Graph Visualization

Marketing Director
13th January, 2016 | 4 min read

Learn how EclecticIQ launched a pioneering cyber threat intelligence platform that includes graph visualization...

Cyber hijacking: Detecting BGP spoofs with KeyLines

Cyber hijacking: Detecting BGP spoofs with KeyLines

Intern - Software Development
6th October, 2015 | 4 min read

Maintaining the integrity of cyberinfrastructure and understanding network vulnerabilities is a critical task for...

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2024.
Read our Privacy Policy.