This Week in Neo4j – 29 July 2017


Welcome to this week in Neo4j where we round up what’s been happening in the world of graph databases in the last 7 days.


This week’s featured community member is Dave Bennett, Identity Solution Architect at Nulli.

Dave Bennett - This Week's Featured Community Member

Dave Bennett – This Week’s Featured Community Member

Dave is a regular answerer of questions on the #neo4j tag on StackOverflow and most recently has been helping people understand the output of the Cypher query profiler and how to use it to optimise their queries.

Dave’s also presented at the Calgary Neo4j meetup and co-presented Access Management: injecting identity into the graph at GraphConnect San Francisco 2015.

He also featured on the podcast in August 2016 which is well worth listening to if you want to learn how graphs and identify management play together.

On behalf of the Neo4j community thanks for all your work Dave!

Security Engineering with graphs


I came across quite a few interesting things security engineering related this week.

Timesketch and BloodHound

Timesketch and BloodHound – two security engineering tools

Timesketch, the open source collaborative forensic timeline analysis tool, now has Neo4j graph database support. Timesketch is a project created by Johan Berggren, a Senior Security Engineer at Google.

In Johan’s post he says “With an interface for communicating with the open source graph database Neo4j we are prepared for graph exploration of timeline data. Our goal is to provide an intuitive and powerful graph exploration frontend.” We’re looking forward to that!

On my GitHub travels I came across the BloodHound project created by Andrew Robbins, Rohan Vazarkar, and Will Schroeder.

BloodHound is an application which uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify and defenders can use BloodHound to identify and eliminate those same attack paths.

Last but not least, Anton wrote a blog post showing how to visualize and analyse Windows Logs With Neo4j.

OpenTheBox – a full view of Corporate Networks in Belgium


In this week’s online meetup Niek Bartholomeus showed us how he took publicly accessible data about Belgian corporations, processed it using Spark/Scala, and made it available in Neo4j in a matter of weeks.



Niek’s now published his work on openthebox.be so give it a try and let him know how you get on. He’s @niekbartho on twitter.

Knowledge Graphs, GoT NLP analysis, The Workflowy Graph


Summer 2017 Release of the APOC Procedures Library


Earlier this week Michael did the Summer 2017 release of APOC procedures.

Some of the take away features introduced in this release are fuzzy matching and Levenshtein distance functions, executing atomic operations on properties, and improvements to the Cypher export procedures.

If you haven’t given APOC a try yet now could be the time!

Next Week


Next week is a busy one in the world of graph databases.

We hope to see you at one of the events if they’re in your vicinity. If there aren’t any events in your local area and you wish there were drop us an email devrel@neo4j.com and we’ll try and help out.

Tweet of the Week


My favourite tweet this week comes from my colleague Kevin Van Gundy:

Don’t forget to RT if you liked it too.

That’s all for this week. Have a great weekend!

Cheers, Mark