The blog

Tag Publications: cyber security

Graph data visualisation for cyber-security threats analysis

 In this blog post, we will offer an overview on how to deal with Security information and event management/log management (SIEM/LM) data overflow. Let’s see how Linkurious’ advanced graph visualisation solution helps easily identify and investigate cyber-security threats. Switching to a data lake architecture is often a required first step for analysts who wish to use graph […]

Brute force attacks and graphs

Brute force is a basic hacking method and yet it is effective and hard to spot. What if graphs could help identify brute force attacks? What is a brute force attack? In a brute force attack, a hacker will access a system by trying a list of passwords until he finds one that works. It […]

Cyber security : how to use graphs to do an attack analysis

Cyber security experts have a challenging job. They analyse huge datasets to track anomalies, find security holes and patch them. Reacting quickly against an attack is key. We are going to see how graphs can accelerate an attack analysis and help identify potential attack vectors before they are used. The booming business of cyber crime […]

Cyber security : how Cisco uses graph analytics to identify threats

Cisco is using graph analytics at scale to identify servers controlled by criminals. Here is a quick look at how graphs can improve cyber security. A massive dataset on cyber security threats According to Datanami, “like all big Internet security firms, Cisco collects data from its customers’ firewalls, IPSs, and security appliances so it can […]