As graph database adoption accelerates, new data infrastructures like streaming graph will emerge to eliminate many of the scale struggles of graph database models.
Cloud architectures enable and encourage a new level of integration with 3rd party systems and data sources to deliver the enriched and personalized services our users and customers are looking for.
As crypto currencies go mainstream, better techniques for protecting users from fraud are needed. Enter streaming graph.
Part one in a series connecting different data producers to Quine streaming graph.
Advanced: Finding a malicious employee is one of the toughest cyber-security challenges in the industry.
This article builds on our previous analysis to further investigate the use of categorical anomaly detection to identify multi-stage exploit campaigns in AWS CloudTrail logs
Destructive attack campaigns like WannaCry, NotPetya, or even the Mirai DDoS family, succeed because they integrate new techniques or new hardcoded credentials to access and victimize their targets.
The move to the cloud represents new challenges for enterprise security teams.
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.
Since the launch of thatDot’s real-time Novelty Detector for Categorical data in November, we have received numerous feature requests for additional data exploration and data transformation capabilities.