neo4j-examples / cybersecurity-demoLinks
Neo4j Cybersecurity Demo
☆17Updated 3 years ago
Alternatives and similar repositories for cybersecurity-demo
Users that are interested in cybersecurity-demo are comparing it to the libraries listed below
Sorting:
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- Generative AI Governance for Enterprises☆16Updated 10 months ago
- Security and compliance proxy for LLM APIs☆49Updated 2 years ago
- Test Software for the Characterization of AI Technologies☆260Updated last week
- ATLAS tactics, techniques, and case studies data☆85Updated 2 weeks ago
- OWASP Ontology-driven Threat Modelling framework☆41Updated 2 years ago
- Curated list of awesome software and resources for Senzing, The First Real-Time AI for Entity Resolution.☆62Updated this week
- A repository containing experimental and upcoming pipelines and features for Morpheus☆34Updated 3 months ago
- ☆20Updated 2 months ago
- The Auditree common fetchers, checks and harvest reports library.☆20Updated last year
- The NORIA-O project is a data model for IT networks, events and operations information. The ontology is developed using web technologies …☆34Updated 6 months ago
- Security Control Knowledge Graph☆42Updated 3 years ago
- Go from graph data to a secure and interactive visual graph app in 15 minutes. Batteries-included self-hosting of graph data apps with St…☆235Updated this week
- ☆18Updated 10 months ago
- The Auditree framework tool to run compliance control checks as unit tests.☆71Updated last year
- A toolset to test data classification engines that generates mock data in various file formats, sizes and data profiles.☆44Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆63Updated last year
- GAMECHANGER Machine Learning Repo☆24Updated last year
- Sample solution to automate tedious regulatory compliance processes using multi-agent systems☆18Updated 6 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year
- Entity Resolution☆16Updated last year
- BlindBox is a tool to isolate and deploy applications inside Trusted Execution Environments for privacy-by-design apps☆62Updated last year
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated 2 years ago
- Demo setup for compliance-trestle☆35Updated last month
- An example app that explores the challenges of building production-quality AI applications.☆28Updated last week
- Security Control Knowledge Graph☆30Updated last year
- Compliance-to-Policy (C2P) provides the framework to bridge the gap between compliance and policy administration.☆32Updated 6 months ago
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Framework☆63Updated 5 years ago
- A Workflow for Data Scientists to bring Jupyter Notebook Visualizations to Kibana Dashboards☆45Updated 2 years ago
- DevOps AI Assistant CLI. Ask questions about your AWS services, cloudwatch metrics, and billing.☆70Updated last year