From Data Privacy Foundation
This is the approved revision of this page, as well as being the most recent.
A series of visualsiations that use progger logs as the base data set.
Real-Time Security Visualization
File activity and dependency
File Activity and Dependency