Sqrrl Blog

Sep 12, 2016 3:41:22 PM

The Applicability of Graphs for Information Security Combatants

This post by Henrik Johansen originally appeared on Medium. Henrik is an IT Security professional at a Danish public sector entity called Region Syddanmark.

I have been tweeting a lot lately about Graphs and how they can be utilised in the context of Information Security. Since this is a topic that seems interesting to a few people I thought a more thorough explanation would make sense. Think of this as the “why” and “what” more than the “how”. 

Read More

Topics: Graphs, Incident Response, Threat Hunting, Cyber Threat Hunting

Aug 20, 2014 2:24:00 PM

The NoSQL Animal Kingdom

With NoSQL Now! is currently underway in the Valley (and with a few Sqrrls in attendance), I got to thinking about how this phenomenon came to be, how it gained momentum, and the types of possibility we have before us in terms of solving actual problems.

Read More

Topics: NoSQL, Sqrrl Enterprise, Graphs