“Cyber threat intelligence is high volume, unstructured and highly related. That last attribute makes it great for graphs,” said Eric Spiegelberg, Senior Consultant at GraphAware. In this week’s five-minute interview (conducted at GraphConnect New York), we discuss GraphAware’s work on… Read more →

You already know there are many exciting reasons you should attend GraphConnect 2018 – and, of course, we’ve got you properly jazzed on this year’s roster of must-see presenters (including our two most recently announced keynote presenters). But the best… Read more →

There’s a common one-liner, “I hate math…but I love counting money.” Except for total and complete nerds, a lot of people didn’t like mathematics while growing up. In fact, of all school subjects, it’s the most consistently derided in pop… Read more →

With the advent of graph database technology, data modeling has become accessible to masses. Mapping business needs into a well-defined structure for data storage and organization has made a sortie du temple (of sorts) from the realm of the well-educated… Read more →

Editor’s Note: This presentation was given by Dave da Silva at GraphConnect Europe in May 2017. Presentation Summary Capgemini, a global leader in consulting, technology and outsourcing services, believes that using multiple databases improves your ability to unlock the business… Read more →

Basically, we get paid to break into organizations, steal their data, and give them a report on how we did it, said Andy Robbins, Pen Tester and Red Team Lead at SpecterOps. Andy is one of the founders of BloodHound,… Read more →

A great graph database use case that is starting to emerge is the use of graph technology as a way to better support the police and other law enforcement officials, which also has applications for other security and investigative use… Read more →

According to PwC, 92 percent of multinational companies cite compliance with the looming General Data Protection Regulation (GDPR) data privacy regulations as a top data-protection priority. More than three-quarters of those organizations have allocated over a million dollars for related… Read more →

According to Eurostat, 81% of Europeans feel they don’t wholly control their online data and 69% worry that firms might use their data for purposes other than those advertised. The European Union’s General Data Protection Regulation (GDPR) states that individuals… Read more →

It’s no secret that Russian operatives used Twitter and other social media platforms in attempt to influence the most recent U.S. presidential election cycle with fake news. The question most people aren’t asking is: How did they do it? More… Read more →

European Union regulators are dead serious about protecting the privacy of their citizens’ personal data. The General Data Protection Regulations (GDPR) that take effect on 25 May 2018 apply to all EU and foreign organizations handling personal data of EU… Read more →

I recently had the opportunity to combine work and pleasure and meet with Dr. Aaron Clauset, an expert on network science, data science and complex systems. In 2016, Clauset won the Erdos-Renyi Prize in Network Science but you might be… Read more →

In order to re-invent the value chain from linear to circular and highly connected, retailers need to modernize their IT infrastructure rapidly and cost-effectively. In addition, web-based retailers must find a way to handle scale and sophistication to remain competitive.… Read more →

As mentioned in our earlier blog post about Meltdown and Spectre, we have been running tests to discover the impact on Neo4j of the patches and workarounds for the Meltdown and Spectre vulnerabilities. The Neo4j engineering team has now completed… Read more →

UPDATE: Please read this blog post for the most up-to-date information about Neo4j performance testing and results affected by Meltdown and Spectre patches. Following the public announcement of the Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715) security vulnerabilities earlier this… Read more →

Once again, the International Consortium of Investigative Journalists (ICIJ) has shaken the world with a far-reaching, in-depth investigation into the shadowy world of offshore finance: The Paradise Papers. Using Neo4j, the ICIJ has built upon their Pulitzer Prize-winning investigation of… Read more →

Cybersecurity We are becoming increasingly dependent on technology. Yet, without diligent attention paid to cybersecurity, technology is vulnerable to unauthorized access, change or even destruction. These vulnerabilities pose threats to our individual and collective safety, security and human and economic… Read more →

Within the IT organization of any financial services enterprise, identity and entitlements management must be managed to minimize risk. Over time, the centralized entitlements structure – whether represented in Active Directory or an LDAP directory – grows in such a… Read more →

Fake news is one of the more troubling trends of 2017. The term is liberally applied to discredit everything, from stories with perceived bias through to ‘alternative facts’ and downright lies. It has a warping effect on public opinion and… Read more →

When it comes to graph database security, it’s essential that you have the flexibility to customize every factor of authentication and authorization for your specific deployment. After all, no architecture or organization is the same, so you need the versatility… Read more →

Fraud is becoming increasingly difficult to discover and prevent as fraudsters are increasingly employing complex techniques and advanced technologies to perpetrate fraud. Who Are Today’s Fraudsters? Today, fraudsters are organized in groups, possess synthetic or manufactured identities – which in… Read more →

You already have all the reasons you should attend GraphConnect Europe and now you know who the top 10 presenters will be, but now it’s time for the easiest selling point of all: the bottom-to-top agenda of all the keynotes,… Read more →

No matter the size or scope of your graph database, it’s vital to maintain secure control of your data and to keep a record of security events. Starting in Neo4j 3.1 and all future releases, users will have increased control… Read more →

Neo4j 3.1 supports the LDAP protocol, so you can integrate Neo4j with Active Directory, OpenLDAP or other LDAP-compatible authentication services. Unlike with native users, management of federated users is performed through the external LDAP service. The only aspect of user… Read more →

In Neo4j 3.1 Enterprise Edition, we introduced a new role-based access control framework for user and application access to the database. The framework enables system administrators to manage permissions and ensure that authenticated users and applications can perform only authorized… Read more →