Connections logo

Your all-access pass to Cybersecurity: Combating Modern Threats with Graph Databases

  • Cyber Threats and Resiliency Landscape

  • Digital Twinning the Cloud for DevSecOps

  • The Role of Graphs in Cybersecurity

  • The CI/CD Graph – An Attacker’s Perspective

  • Graph-based Threat Modeling, Security Analytics, and Threat Hunting

  • From Cyber Events to Cyber Stories

  • Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights