List of 10+ graph database cyber security

2 Cyber security : how to use graphs to do an attack analysis

  • Author: linkurious.com
  • Published: 03/01/2022
  • Review: 4.72 (531 vote)
  • Summary: · On the contrary, graph databases like Neo4j, Titan or InfiniteGraph make it easy to store and query unstructured data, even as the volume grows

3 Cybersecurity: Combatting Modern Threats with Graph Databases

  • Author: odbms.org
  • Published: 02/13/2022
  • Review: 4.46 (576 vote)
  • Summary: · Cybersecurity: Combating Modern Threats with Graph Databases is an inspiring half-day virtual event featuring graph database thought leaders 

4 CyGraph: Big-Data Graph Analysis For Cybersecurity and Mission

  • Author: resources.sei.cmu.edu
  • Published: 09/18/2021
  • Review: 4.2 (595 vote)
  • Summary: CyGraph leverages big-data NoSQL graph database technology to capture the complex and large-scale relationships among entities in the cybersecurity domain

5 Neo4j-graph-examples/cybersecurity – GitHub

  • Author: github.com
  • Published: 03/21/2022
  • Review: 4.19 (341 vote)
  • Summary: Graphs in Cybersecurity – Bloodhound. Contribute to neo4j-graph-examples/cybersecurity development by creating an account on GitHub

6 What is a graph database? The role of graphs in data analysis – Lytics

  • Author: lytics.com
  • Published: 03/27/2022
  • Review: 3.85 (200 vote)
  • Summary: · Likewise, a cyber-security department may use graph databases to detect threat vectors and formulate fraud prevention plans

7 Threat Graph | Falcon Platform – CrowdStrike

  • Author: crowdstrike.com
  • Published: 03/04/2022
  • Review: 3.72 (337 vote)
  • Summary: Purpose-built Graph Database for Cybersecurity · Power of Security Cloud · Power of Data · Maximum Security Efficiency · Single Source of Truth

8 World’s Leading Companies Use Neo4j to Enhance Cybersecurity

  • Author: prnewswire.com
  • Published: 02/11/2022
  • Review: 3.4 (218 vote)
  • Summary: · With a graph database, cybersecurity teams can achieve a connected and contextualized view of all their assets, allowing them to understand the 

9 Exploring the Neo4j browser | Cybersecurity Attacks – Red Team

  • Author: subscription.packtpub.com
  • Published: 06/12/2022
  • Review: 3.38 (420 vote)
  • Summary: Adversarial Tradecraft in Cybersecurity. Hinne Hettema (2022) … Chapter 5: Situational Awareness – Mapping Out the Homefield Using Graph Databases

10 An example query in the graph database Neo4j of the user

  • Author: researchgate.net
  • Published: 11/22/2021
  • Review: 3.03 (314 vote)
  • Summary: While cyber attacks are often regarded as a technical problem for network security experts, the individuals and groups that perpetrate these attacks are still 

11 Open Source Tool – Cybersecurity Graph Database in Neo4j

  • Author: zzun.app
  • Published: 11/03/2021
  • Review: 2.98 (102 vote)
  • Summary: · With GraphKer you can have the most recent update of cyber-security vulnerabilities, weaknesses, attack patterns and platforms from MITRE and 

12 Graphs Are a Security Trump Card – Cybersecurity Asean

  • Author: cybersecurityasean.com
  • Published: 02/02/2022
  • Review: 2.77 (143 vote)
  • Summary: · Such was the underlying message of the March instalment of Neo4j … “Cybersecurity: Combating Modern Threats with Graph Databases,” focused 

13 How to Have a Cybersecurity Graph Database on Your PC – Neo4j

  • Author: neo4j.com
  • Published: 09/15/2021
  • Review: 2.77 (168 vote)
  • Summary: · GraphKer is a free and open-source tool, providing a detailed and updated cybersecurity graph database using Neo4j

14 Ideas for Graph DBs like Neo4j – Open Security Summit

  • Author: open-security-summit.org
  • Published: 08/22/2021
  • Review: 2.59 (151 vote)
  • Summary: · Good resources on using Neo4j in Cyber Security. Cyber security and attack analysis · GraphKer – Cybersecurity Graph Database in Neo4j by 

15 World’s Leading Companies Use Neo4j to Enhance Cybersecurity

  • Author: aithority.com
  • Published: 06/11/2022
  • Review: 2.51 (111 vote)
  • Summary: · Neo4j, the leader in graph technology, announced a rise in adoption from organizations seeking to leverage graph databases to strengthen 

16 CrowdStrike doubles down on visibility with new graph database

  • Author: securitybrief.co.nz
  • Published: 10/05/2021
  • Review: 2.42 (58 vote)
  • Summary: · According to CrowdStrike, Visibility is one of the foundational principles of cybersecurity because businesses cannot secure and defend the