Transitioning From Lists to Graphs — Just as with a burglary, when a cyber attack occurs, there are pieces of evidence that point to the source. In a cyber attack, evidence includes things like phishing emails, IP addresses, and domain names. With this evidence, analysts develop threat intelligence that can be used to identify future malicious…