News

Microsoft announced the general availability of the "activity logs" capability in Microsoft Graph, giving administrators more options to track user activity and identify patterns of potential misuse.
Security graphs are becoming indispensable for understanding system access and network activity and empowering security teams ...
We’ve gotten better at connecting data. But in the rush to unify, we forgot to ask: are we connecting anything real?
How graph databases can be used to explore and analyse the decentralised XRP ledger, focusing on exploring networks of fraudulent accounts and distribution patterns.