Visualizing Cyber Security Threats
It won’t have escaped your notice that cybercrime has become a permanent headache for many organizations. As IT networks increase in size and connectedness, they have also become more vulnerable to...
View ArticleKeyLines News – June 2014
Welcome to June’s KeyLines News – your occasional round up of news, articles and goings-on. We’ve had a busy couple of months, settling into our new offices, celebrating our third birthday and...
View ArticleData-led Cyber Security
Welcome to the first edition of KeyLines News of 2015! We hope you had an enjoyable New Year, and found the time to watch our fireworks display – built with KeyLines. Take a look at our latest blog...
View ArticleWebinar: KeyLines for cyber security
Webinar: KeyLines for cyber security Date – Tuesday 03 March 2015 Time – 9.30am PST / 12.30pm EST / 5.30pm GMT Duration – 45 mins + Q&A The most severe common threat faced by business and...
View ArticleKeyLines News
Understanding cyber security requires a solid understanding of connections – between devices, IPs, people, events. Detangling these complex connections enables us to pinpoint evolving threats and...
View ArticleData Visualization and Cyber Security
Last week, we were lucky enough to take part in the Cyber Innovation Zone at Infosec 2015. Our Product Manager, Ed Wood sums up his experience at Europe’s largest information security event. As a...
View ArticleCambridge Intelligence CEO joins PM’s mission to Washington
Cambridge CEO Joe Parry, with UK Prime Minister David Cameron Joe Parry, CEO of Cambridge Intelligence, joined the Prime Minister’s trip to Washington this week, representing the best UK cyber security...
View ArticleCyber security and KeyLines
Thanks to everyone who attended our recent webinar. It was awesome to bring together so many cyber security and data visualisation enthusiasts from all over the world. During the session, our friends...
View ArticleIntroducing KeyLines 3.0: Supercharge your Charts with WebGL
We’re pleased to announce the release of KeyLines 3.0 to all of our customers and evaluators. This latest version includes significant performance enhancements, making KeyLines the most powerful graph...
View ArticleVisualizing Cyber Security Data: Detecting Anomalies
There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts, line graphs… But none of these can capture a key dimension: connections. That’s where network...
View ArticleMaking sense of Cyber threats with graph technologies
Graph visualization is a vital component of any cyber security strategy. Without it, analysts struggle to uncover insight from complex logs, which limits their investigative powers and leaves systems...
View ArticleGraph visualization use cases: cyber security
Our last blog post was the first of three exploring real world applications for graph visualization. Use cases for graph visualization: Cyber Security Last time we reviewed two of the older commercial...
View Article
More Pages to Explore .....