Securing Your Connections%3A Graph Data in Cybersecurity