Blog > Use Cases > Cybersecurity

Cyber hijacking: Detecting BGP spoofs with KeyLines

Cyber hijacking: Detecting BGP spoofs with KeyLines

Intern - Software Development
6th October, 2015 | 4 min read

Maintaining the integrity of cyberinfrastructure and understanding network vulnerabilities is a critical task for...

CyberFlow: Securing the Internet of Things

CyberFlow: Securing the Internet of Things

Marketing Director
16th December, 2014 | 4 min read

Highlights KeyLines integrated into award-winning cyber security analytics solution Designed to visualize...