Graph Techniques for Next Generation Cybersecurity