Network Observability Using Knowledge Graphs at Commonwealth Bank Australia
By Angela Zimmerman
October 31, 2022 12 mins read
During Neo4j’s inaugural GraphSummit, we had the pleasure of hosting partners and customers to share insights and stories behind their connected data experiences. We will be featuring more of them in this series of blogs – so watch this space for more recaps.
Keywords: banking customer use case cybers cybersecurity finance GraphSummit 2022 Knowledge Graph presentation
Graphs for Cybersecurity: Knowledge Graph as Digital Twin
By Enzo
July 26, 2022 10 mins read
Learn how knowledge graphs help you defend against cyberattacks – from before it begins to until it ends as well as for subsequent analysis.
Keywords: Analytics cybersecurity cyberthreat digital twin graph algorithms graph database infrastructure Intelligence Knowledge Graph neo4j
Graphs for Cybersecurity: Cybersecurity Policy and Strategy
By Enzo
June 1, 2022 5 mins read
Discover some of the most effective cybersecurity policies and strategies to consider when defending against modern cyber attacks.
Keywords: Authentication cybersecurity cypher Data Visualization policy Security Strategy
Graph Algorithms for Cybersecurity: A Picture Is Worth 1,000 Rows
By Enzo
May 27, 2022 13 mins read
Learn how cybersecurity firm Uplevel uses graph algorithms and analytics to detect malicious patterns and prevent cyberattacks.
Keywords: alerts Analytics centrality cluster community detection Cyberattacks cybersecurity data science graph algorithms graph database
GraphConnect 2022: 10 Sessions You Don’t Want to Miss
By Enzo
May 24, 2022 10 mins read
Here are 10 highly-anticipated GraphConnect 2022 presentations (among 130+ sessions) that you don’t want to miss.
Keywords: accenture Adobe Agenda audience Austin blockchain cybersecurity data science dell Developer
Graphs for Cybersecurity: Cyberthreats, Vulnerabilities, and Risk
By Enzo
May 12, 2022 6 mins read
Learn about cyberthreats, tradeoffs related to cloud versus on-premise deployment, and a look at sources and impacts from security breaches.
Keywords: cloud Cyber Attacks cybersecurity cyberthreats DDoS on-premise ransomware risk social engineering third-party
Cybersecurity: To Graph or Not to Graph. That Is the Query.
By Angela Zimmerman
April 15, 2022 4 mins read
Don’t miss these insightful presentations on cybersecurity from the event Connections: Combatting Modern Cyber Threats with Graph Databases.
Keywords: Analytics cloud connections cyberattack cybersecurity cyberthreats digital twin graph Graph Databases insights
Graphie Pioneer in AML, Fraud, and Cybersecurity: 5-Minute Interview with PwC Canada
By Angela Zimmerman
February 10, 2022 9 mins read
We were delighted to honor PwC Canada with a Graphie Award for being a Pioneer in AML, Fraud, and Cybersecurity, and had the pleasure of sitting down with Sam Samon, Partner, Financial Crime Technology at PwC, to discuss his work and the win.
Keywords: 2021 graphie awards AML anti-fraud AuraDB banking Bloom Connected Data cybersecurity financial crime financial services
Capgemini’s UK Graph Guild: 5-Minute Interview with Calum Chalmers
By David Penick
December 18, 2020 2 mins read
Check out this week’s 5-Minute Interview with Calum Chalmers, Senior Data Scientist at Capgemini, about the UK Graph Guild.
Keywords: 5-minute interview Capgemini Graph Analytics graph database Haystack mapreduce POCs SQL vs. Graph UK Graph Guild
Combating Money Laundering: AML Compliance Program Design
By David Penick
August 17, 2020 < 1 min read
Read the second blog in Neo4j’s new six-part series on how Neo4j’s graph technology can help you combat money laundering.
Keywords: AI / Machine Learning AML aml compliance graph algorithms graph data science money laundering money laundering detection
Financial Fraud Detection with Graph Data Science: Identifying Fraud Rings
By David Penick
May 4, 2020 5 mins read
Read blog four in this series on how financial services enterprises are using Neo4j’s graph technology to prevent and detect financial fraud.
Keywords: artificial intelligence Cypher Query data science Financial Fraud Detection Fraud Rings graph algorithms Graph Analytics graph data science Neo4j Bloom python
Financial Fraud Detection with Graph Data Science: Identifying First-Party Fraud
By David Penick
April 27, 2020 2 mins read
Read blog three on how financial services enterprises are using Neo4j’s graph technology to prevent and detect financial fraud.
Keywords: AI / Machine Learning blog cypher data lakes data science Financial Fraud Detection Fraud Rings Graph Algorithm graph database graph technology
Financial Fraud Detection with Graph Data Science: Analytics and Feature Engineering
By David Penick
April 20, 2020 6 mins read
Read blog two on how financial services enterprises are using Neo4j’s graph technology to prevent and detect financial fraud.
Keywords: artificial intelligence betweeness centrality community detection algorithm cypher cypher queries data science Financial Fraud Detection fraud detection graph algorithms Graph Analytics
The Future of the Intelligent Application: Granular Security
By Deb Cameron
March 17, 2020 4 mins read
For the third installment of this four-part blog series, we will discuss how Neo4j 4.0 provides powerful robust, granular security.
Keywords: App development cybersecurity data governance data privacy dev graph database identity access management intelligent application schema
Neo4j 4.0 Security Rocks: The 5-Minute Interview with Michal Bachman, CEO, GraphAware
By David Penick
February 14, 2020 4 mins read
In this week’s five-minute interview with Michal (conducted at GraphTour NYC 2019), we discuss how his company, GraphAware, uses graph technology.
Keywords: 5-minute interview ai data model graph algorithms graph database GraphAware java Knowledge Graph machine learning Neo4j Community
Graphs on GPUs: 5-Minute Interview with Saul Rosales
By David Penick
December 6, 2019 3 mins read
In this week’s five-minute interview (conducted at GraphTour DC 2019), we discuss how Saul Rosales and his team use Neo4j with Graphistry.
Keywords: 5-minute interview artificial intelligence cybersecurity data lakes GPUs graph database graph technology Graphistry machine learning Saul Rosales
Overcoming CCPA Challenges: Graph Technology Solves Personal Data Privacy Challenges
By David Penick
October 21, 2019 < 1 min read
Read the second installment in our series on CCPA, which provides an overview on why graph databases are the right foundation for data privacy compliance.
Keywords: California Privacy Act CCPA CCPA compliance data breach data privacy GDPR graph database graph technology neo4j
Overcoming CCPA Compliance Challenges: What Is CCPA?
By David Penick
October 14, 2019 3 mins read
Read the first installment in our series on CCPA, which provides a background on CCPA and breaks down these compliance challenges for businesses like yours.
Keywords: California Privacy Act CCPA CCPA compliance data breach data privacy GDPR graph database graph technology neo4j
Solving Real-World Problems: 5-Minute Interview with David Bader
By Jocelyn Hoppa
July 26, 2019 3 mins read
Check out this 5-minute interview with David Bader, professor and chair of the School of Computational Science and Engineering, at Georgia Tech.
Keywords: 5-minute interview cyber analytics cybersecurity David Bader Georgia Tech graph database graph technology Knowledge Graph neo4j Transportation
Graphs in Government: MITRE
By Jocelyn Hoppa
May 20, 2019 3 mins read
Discover how MITRE developed CyGraph, a tool for cyber warfare analytics, visualization and knowledge management, using Neo4j.
Keywords: cyber warfare analytics cybersecurity data ingestion data model government agencies graph database graph visualization knowledge management mitre property graph
Graph Technology to Fight Terrorist Threats
By Jocelyn Hoppa
May 15, 2019 10 mins read
Discover how the American Enterprise Institute uses Neo4j and Linkurious to find hidden complex data relationships to uncover terrorist threats.
Keywords: Critical Threats Project geospatial analysis graph analysis graph intelligence platform graph visualization graphconnect real-time network visualization terrorist threat threat detection
#GraphCast: How Graphs Are Used around the Globe
By Bryce Merkl Sasaki
May 10, 2019 2 mins read
Check out this week’s #GraphCast, featuring graph technology users from around the world talking about how they use Neo4j to solve connected data problems.
Keywords: Adobe Data Visualization Global Graph Celebration Day Graph Theory GraphCast Leonhard Euler machine learning nasa Neo4j Bloom Panama Papers
BloodHound: How Graphs Changed the Way Hackers Attack
By Jocelyn Hoppa
April 17, 2019 16 mins read
Read this blog to learn how graphs revolutionized how hackers attack, and how SpecterOps uses Neo4j to access a company’s cybersecurity measures.
Keywords: Active Directory adversary resilience bloodhound cybersecurity Graph Theory graphconnect javascript Mimikatz neo4j situational awareness
Enterprise Graphs: 5-Minute Interview
with Dan Woods
By Jocelyn Hoppa
March 29, 2019 6 mins read
“People are now moving from a project-based approach to adopting graphs to graphs as a platform for their technology,” said Dan Woods, Principal Analyst at Early Adopter Research and Founder and CEO of Evolved Media. Enterprises face challenges in adopting… Read more →
Keywords: 5-minute interview Dan Woods enterprise graph etl Google Kubernetes Enterprise graph technology Knowledge Graph microservices OLAP OLTP
Sentiment and Social Network Analysis
By Jocelyn Hoppa
March 13, 2019 13 mins read
Editor’s Note: This presentation was given by Laura Drummer at GraphConnect New York in November 2017. Presentation Summary Traditional social network analysis is performed on a series of nodes and edges, generally gleaned from metadata about interactions between several actors… Read more →
Keywords: communications data cyber analytics document term matrix graphconnect NMF Novetta social network analysis social network map SocialBee topic modeling