FireEye releases ThreatPursuit VM that comes packed with more than 50 tools, including Neo4j
By ZDNet - November 3, 2020
Explore: cybersecurity Graph Visualizations virtual machine
The Future of the Intelligent Application: Granular Security
By Deb Cameron
March 17, 2020 4 mins read
For the third installment of this four-part blog series, we will discuss how Neo4j 4.0 provides powerful robust, granular security.
Explore: App development cybersecurity data governance data privacy dev graph database identity access management intelligent application schema
Graphs on GPUs: 5-Minute Interview with Saul Rosales
By David Penick
December 6, 2019 3 mins read
In this week’s five-minute interview (conducted at GraphTour DC 2019), we discuss how Saul Rosales and his team use Neo4j with Graphistry.
Explore: 5-minute interview artificial intelligence cybersecurity data lakes GPUs graph database graph technology Graphistry machine learning Saul Rosales
Not Everyone Is a Data Scientist: 5-Minute Interview with Sony Green
By David Penick
October 25, 2019 7 mins read
In this week’s five-minute interview (conducted at GraphTour SF 2019), we discuss how Sony Green and his team use Neo4j with GraphXR.
Explore: 5-minute interview cybersecurity exploration graph database graph technology Healthcare healthcare data relational database Russian Twitter trolls Sony Green
Solving Real-World Problems: 5-Minute Interview with David Bader
By Jocelyn Hoppa
July 26, 2019 3 mins read
Check out this 5-minute interview with David Bader, professor and chair of the School of Computational Science and Engineering, at Georgia Tech.
Explore: 5-minute interview cyber analytics cybersecurity David Bader Georgia Tech graph database graph technology Knowledge Graph neo4j Transportation
Graphs in Government: MITRE
By Jocelyn Hoppa
May 20, 2019 3 mins read
Discover how MITRE developed CyGraph, a tool for cyber warfare analytics, visualization and knowledge management, using Neo4j.
Explore: cyber warfare analytics cybersecurity data ingestion data model government agencies graph database graph visualization knowledge management mitre property graph
BloodHound: How Graphs Changed the Way Hackers Attack
By Jocelyn Hoppa
April 17, 2019 16 mins read
Read this blog to learn how graphs revolutionized how hackers attack, and how SpecterOps uses Neo4j to access a company’s cybersecurity measures.
Explore: Active Directory adversary resilience bloodhound cybersecurity Graph Theory graphconnect javascript Mimikatz neo4j situational awareness
Graphs Are Game-Changing for Cybersecurity: 5-Minute Interview with Eric Spiegelberg, Senior Consultant at GraphAware
By Jocelyn Hoppa
October 5, 2018 5 mins read
“Cyber threat intelligence is high volume, unstructured and highly related. That last attribute makes it great for graphs,” said Eric Spiegelberg, Senior Consultant at GraphAware. In this week’s five-minute interview (conducted at GraphConnect New York), we discuss GraphAware’s work on… Read more →
Explore: 5-minute interview cyber threat cybersecurity graph database graph technology GraphAware graphconnect natural language processing nlp Panama Papers
Graph Databases for Beginners: Data Modeling Pitfalls to Avoid
By Bryce Merkl Sasaki
July 31, 2018 7 mins read
With the advent of graph database technology, data modeling has become accessible to masses. Mapping business needs into a well-defined structure for data storage and organization has made a sortie du temple (of sorts) from the realm of the well-educated… Read more →
Explore: Connected Data cybersecurity data model data modeling fraud detection graph data model graph data modeling graph database graph model graph technology
Network Science: The Hidden Field behind Machine Learning, Economics and Genetics That You’ve (Probably) Never Heard of – An Interview with Dr. Aaron Clauset [Part 1]
By Bryce Merkl Sasaki
February 13, 2018 9 mins read
I recently had the opportunity to combine work and pleasure and meet with Dr. Aaron Clauset, an expert on network science, data science and complex systems. In 2016, Clauset won the Erdos-Renyi Prize in Network Science but you might be… Read more →
Explore: complex systems cybersecurity data science economics genetics graph algorithms ICON dataset machine learning Network Science social network
Cybersecurity & Graph Technology: An Excellent Fit
By Bryce Merkl Sasaki
October 19, 2017 5 mins read
Cybersecurity We are becoming increasingly dependent on technology. Yet, without diligent attention paid to cybersecurity, technology is vulnerable to unauthorized access, change or even destruction. These vulnerabilities pose threats to our individual and collective safety, security and human and economic… Read more →
Explore: Big Data Connected Data cyber threat intelligence cybersecurity Equifax financial data graph technology GraphAware graphconnect mitre
Financial Services & Neo4j: Cybersecurity
By Bryce Merkl Sasaki
August 1, 2017 4 mins read
Cybersecurity is of critical importance to financial services firms. IT organizations must mitigate cybersecurity risk, both in terms of external access to the infrastructure and in understanding how a malware infection or attack can move across a particular network. These… Read more →
Explore: Connected Data cybersecurity cyberwarfare cypher financial services firewall configuration graph technology intrusion detection single points of failure situational awareness
The 5-Minute Interview: Jean Villedieu, Co-Founder of Linkurious
By Bryce Merkl Sasaki
June 10, 2016 3 mins read
For this week’s 5-Minute Interview, I chatted with Jean Villedieu, a co-founder of Linkurious. I sat down with Jean at GraphConnect Europe last April. Here’s what we discussed: Q: For people who might not be familiar with it, what is… Read more →
Explore: 5-minute interview anti-fraud cybersecurity fraud detection graph visualization graphconnect knowledge management Linkurious Network Management Panama Papers
The 5-Minute Interview: Ian Sinnott, Senior Software Engineer at TruSTAR
By Bryce Merkl Sasaki
April 29, 2016 5 mins read
For this week’s 5-Minute Interview, I chatted with Ian Sinnott, Senior Software Engineer at TruSTAR Technology in San Francisco. Here’s what we talked about: Q: Talk to me about how you guys use Neo4j at TruSTAR. Ian Sinnott: TruSTAR’s whole… Read more →
Explore: 5-minute interview cybersecurity data model Data Visualization graph database graph visualization incident report incident response neo4j TruSTAR
Building a Big Data Architecture for Cyber Attack Graphs
By Bryce Merkl Sasaki
April 16, 2016 12 mins read
Editor’s Note: Last October at GraphConnect San Francisco, Steven Noel – Cyber Security Researcher at MITRE – delivered this presentation on how graph technology can help prevent and simulate cyber attacks. For more videos from GraphConnect SF and to register… Read more →
Explore: capec cyber attack cybersecurity cygraph data-driven architecture graph visualization graphconnect intrusion detection mitre neo4j
CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive
By Bryce Merkl Sasaki
October 15, 2015 6 mins read
Preventing and reacting to attacks in cyberspace involves a complex and rapidly changing milieu of factors, requiring a flexible architecture for advanced analytics, queries and graph visualization. Information Overload in Security Analytics Cyber warfare is conducted in complex environments, with… Read more →
Explore: Big Data cyber warfare cybersecurity cygraph data architecture graph visualization mitre nosql database security analytics situational awareness
The GraphConnect San Francisco Agenda is Here!
By Bryce Merkl Sasaki
September 16, 2015 3 mins read
You already know all about why you should attend GraphConnect and who some of our top-notch speakers are going to be. Now it’s time for the best part: the full-fledged agenda of all the talks, meetups and activities you’ll see… Read more →
Explore: cybersecurity emil eifrem graph database graphconnect IBM MongoDB neo4j san francisco spring cloud world economic forum