cybersecurity min_retweets:3, Twitter, 8/8/2019 10:39:41 AM, 206076


FAQ | Problem?

cybersecurity min_retweets:3 Twitter NodeXL SNA Map and Report for Wednesday, 07 August 2019 at 17:4
cybersecurity min_retweets:3 Twitter NodeXL SNA Map and Report for Wednesday, 07 August 2019 at 17:4
From:
Connected Action NodeXL-Reports
Uploaded on:
August 08, 2019
Short Description:
cybersecurity min_retweets:3 via NodeXL http://bit.ly/2MMFRxl
@fabriziobustama
@evankirstel
@dynamicciso
@archonsec
@grazytgrazynatt
@cyberspeaklc
@google
@defcon
@sputnikint
@realdonaldtrump

Top hashtags:
#cybersecurity
#infosec
#ai
#malware
#security
#iot

Description:
Description
The graph represents a network of 4,489 Twitter users whose recent tweets contained "cybersecurity min_retweets:3", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Wednesday, 07 August 2019 at 18:38 UTC.

The tweets in the network were tweeted over the 9-day, 4-hour, 39-minute period from Monday, 29 July 2019 at 12:58 UTC to Wednesday, 07 August 2019 at 17:37 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4489
Unique Edges : 4625
Edges With Duplicates : 6747
Total Edges : 11372
Number of Edge Types : 3
Mentions : 8959
Tweet : 2244
Replies to : 169
Self-Loops : 2244
Reciprocated Vertex Pair Ratio : 0.0262697022767075
Reciprocated Edge Ratio : 0.0511945392491468
Connected Components : 1269
Single-Vertex Connected Components : 826
Maximum Vertices in a Connected Component : 2204
Maximum Edges in a Connected Component : 8982
Maximum Geodesic Distance (Diameter) : 19
Average Geodesic Distance : 6.001516
Graph Density : 0.000232693980810291
Modularity : 0.40437
NodeXL Version : 1.0.1.418

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[17] https://www.politico.com/story/2019/08/05/election-security-cybersecurity-1445539
[16] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[11] https://cyberstartupobservatory.com/
[10] https://thehill.com/policy/cybersecurity/455243-woman-arrested-for-hacking-tens-of-millions-of-capital-one-customer
[9] https://www.hackers-arise.com/osint
[8] https://www.cyberscoop.com/capital-one-cybersecurity-data-breach-what-went-wrong/
[8] https://twitter.com/womenknowcyber/lists/women-in-cybersecurity-1/members
[8] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/07/30/the-cybersecurity-202-mitch-mcconnell-just-ensured-election-security-will-be-key-senate-campaign-issue/5d3f697088e0fa1454f80005/
[8] https://cyberstartupobservatory.com/infographics/
[8] https://cyberstartupobservatory.com/download-observatory-us-third-edition/

Top URLs in Tweet in G1:
[16] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[6] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/07/30/the-cybersecurity-202-mitch-mcconnell-just-ensured-election-security-will-be-key-senate-campaign-issue/5d3f697088e0fa1454f80005/
[6] http://www.reydes.com/d/?q=videos
[5] http://www.reydes.com/d/?q=videos_2018
[4] https://www.openideo.com/challenge-briefs/cybersecurity-visuals
[4] https://www.wsj.com/articles/russia-linked-buyout-firm-violates-deal-with-u-s-national-security-panel-to-sell-stake-11564479001
[4] https://pro.smu.edu/l/85762/2019-07-29/614hf8
[4] https://thehill.com/policy/cybersecurity/455993-lawsuit-filed-against-github-in-wake-of-capital-one-data-breach
[4] https://www.thedailybeast.com/trump-nominee-john-ratcliffes-ties-to-whistleblower-case-surfaced-as-officials-warned-against-him-for-dni
[4] https://www.santander.com/csgs/Satellite/CFWCSancomQP01/es_ES/Corporativo/Sala-de-comunicacion/Cybersecurity-Summer-Tips.html

Top URLs in Tweet in G2:
[11] https://cyberstartupobservatory.com/
[8] https://cyberstartupobservatory.com/infographics/
[8] https://cyberstartupobservatory.com/download-observatory-us-third-edition/
[6] https://new.siemens.com/global/en/company/topic-areas/digitalization/cybersecurity.html
[6] https://straighttalk.hcltech.com/sites/default/files/stinsights_tweetchat-_securing_the_unsecured_state_of_cybersecurity_2019_july_31st_at_10_00_a_m_edt.ics
[5] https://iiot-world.com/cybersecurity/cybersecurity-qa-with-abb/
[5] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=205728
[5] https://cyberstartupobservatory.com/resources-cyberslide/
[5] http://www.uscybersecurity.net/subscribe/
[4] https://www.techradar.com/news/how-ai-can-support-cybersecurity-leaders

Top URLs in Tweet in G3:
[4] https://www.itspmagazine.com/itsp-chronicles/chats-on-the-road-to-hacker-summer-camp-2019-wicked6-games-competitors
[3] https://www.itspmagazine.com/company-directory/ncsa
[3] https://www.bugcrowd.com/event/black-hat-2019/?utm_source=ITSPmagazine&utm_medium=web&utm_campaign=eventcover
[3] http://www.itspmagazine.com/company-directory/reversinglabs
[2] https://dt-global.com/company/careers/australia
[2] https://www.itspmagazine.com/itsp-chronicles/an-infosec-life-a-conversation-with-chris-cochran
[2] https://soundcloud.com/itspmagazine/an-infosec-life-a-conversation-with-chris-cochran
[2] https://www.itspmagazine.com/itsp-chronicles/chats-on-the-road-to-hacker-summer-camp-2019-def-con-27-policymakers-a-conversation-with-meg-king-and-beau-woods
[2] https://www.itspmagazine.com/company-directory/bugcrowd
[2] https://www.itspmagazine.com/event-listings/

Top URLs in Tweet in G4:
[9] https://www.hackers-arise.com/osint
[6] https://www.hackers-arise.com/single-post/2018/05/11/The-Wisdom-of-Master-OTW
[5] https://www.hackers-arise.com/single-post/2017/02/17/Reverse-Engineering-Malware-Part-1-Getting-Started
[5] https://www.technologyreview.com/f/614022/a-light-sentence-for-a-famous-hacker-has-actually-made-the-world-safer/?utm_source=twitter&utm_medium=tr_social&utm_campaign=site_visitor.unpaid.engagement
[3] https://www.hackers-arise.com/single-post/2017/12/13/Mr-Robot-Hacks-Season-3-E9-How-Elliot-Traces-the-Dark-Army
[3] https://www.hackers-arise.com/single-post/2019/03/04/Network-Basics-for-Hackers-Server-Message-Block-SMB
[3] https://www.hackers-arise.com/scada-hacking
[3] https://www.youtube.com/cyberhubengage
[2] https://www.hackers-arise.com/single-post/2019/05/03/Open-Source-Intelligence-OSINT-Part-1-Mining-Intelligence-from-Twitter-mattgaetz
[2] https://www.hackers-arise.com/single-post/2018/03/22/SCADA-Hacking-Exploiting-SCADAICS-Systems-with-the-Command-Line-Tool-modbus-cli

Top URLs in Tweet in G5:
[5] https://view.joomag.com/cyberscape-africa-magazine-q2-2019/0724403001564646611?short
[2] https://www.gig.co.ke/events/223
[2] http://www.ekraal.org/program/incubation/apply
[2] https://emc.v-org.com/wp/conferences-workshops-other-events/
[2] https://www.kcsfa.co.ke/index.php/events-trainings/cybersecurity-training/register-for-august-training
[1] https://academy.microsoft.com/en-us/professional-program/tracks/cyber-security/
[1] https://twitter.com/Cc_HUB/status/1156160553573933057
[1] https://twitter.com/CyberInAfrica/status/1158306762707079168
[1] https://ledgerops.com/blog/how-hackers-can-profile-your-organization-using-osint/08/06/2019
[1] https://www.cybersecfill.com/cybersecurity-in-africa/

Top URLs in Tweet in G6:
[1] https://www.linkedin.com/pulse/create-good-energy-cr%C3%A9ez-une-bonne-%C3%A9nergie-tw%C3%B3rzcie-dobr%C4%85-gra%C5%BCyna-tt/
[1] https://www.linkedin.com/pulse/want-grow-exponentially-you-can-gra%C5%BCyna-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3B08d5lJgJT0mFgrn%2FYjGwTA%3D%3D
[1] https://www.linkedin.com/pulse/cybersecurity-begins-integrity-impressing-using-most-popular-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3BN0a13BSRSemQfhSPhh6%2BKA%3D%3D
[1] https://www.linkedin.com/pulse/remember-you-winner-gra%C5%BCyna-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3B7MUO6XmmQ4OeVLPxMLrXFw%3D%3D
[1] https://www.linkedin.com/posts/gtatidea_proedutech-influencerpromotion-yourmustread-activity-6561824685804314624-k0wQ

Top URLs in Tweet in G7:
[2] https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html?smid=nytcore-ios-share
[1] https://sputniknews.com/analysis/20190806/1076481516/there-is-no-question-that-google-does-not-want-trump-as-president---cybersecurity-expert.html?utm_source=short_direct&utm_medium=short_url&utm_content=8Tk6&utm_campaign=URL_shortening
[1] https://apnews.com/f82d6b27caf64167852ace2dad6c0c63?utm_campaign=SocialFlow&utm_medium=AP&utm_source=Twitter
[1] https://datenschutz-hamburg.de/assets/pdf/2019-08-01_press-release-Google_Assistant.pdf
[1] https://twitter.com/kylegriffin1/status/1157088695935295488
[1] https://www.theverge.com/2019/7/30/20747088/congress-election-security-mitch-mcconnell-cybersecurity-paper-ballots
[1] https://searchsecurity.techtarget.com/feature/IoT-Cybersecurity-Improvement-Act-calls-for-deployment-standards

Top URLs in Tweet in G8:
[8] https://twitter.com/womenknowcyber/lists/women-in-cybersecurity-1/members
[3] https://cybersecurityventures.com/creative-hacking-detective-work-and-stopping-bad-people-whats-not-to-love/
[1] https://www.amazon.com/Women-Know-Cyber-Fascinating-Cybercrime/dp/1733015701
[1] https://cybersecurityventures.com/cybersecurity-almanac-2019/
[1] https://www.scmagazine.com/home/opinion/executive-insight/lessons-learned-can-education-solve-cybersecuritys-people-problem/
[1] https://www.statler.wvu.edu/news/2019/07/16/wvu-west-virginia-manufacturing-extension-partnership-to-hold-cybersecurity-workshop-in-beckley
[1] https://abcnews4.com/news/local/the-citadel-hosts-cybersecurity-camp-just-for-girls
[1] https://www.forbes.com/sites/bobzukis/2019/03/05/a-ceo-cheat-sheet-for-the-cybersecurity-big-one/#14b3ca626a2a
[1] https://www.forbes.com/sites/mariaclaracobo/2019/07/31/the-most-valuable-college-majors-are-where-the-jobs-are/#5925c1e778a0
[1] https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/

Top URLs in Tweet in G9:
[5] http://www.brinknews.com/cyber-resiliency-is-the-future-of-cybersecurity/
[3] https://arstechnica.com/information-technology/2019/07/cybersecurity-officials-warn-state-and-local-agencies-again-to-fend-off-ransomware/
[2] https://www.forbes.com/sites/kateoflahertyuk/2019/07/24/nsa-launches-cybersecurity-arm-to-defend-the-u-s-from-foreign-adversaries/#135f9a1455c4
[2] https://www.forbes.com/sites/forbestechcouncil/2019/07/25/seven-common-cybersecurity-mistakes-made-with-ai/#2483cf213d4c
[2] https://www.zdnet.com/article/us-company-selling-weaponized-bluekeep-exploit/
[2] https://blog.malwarebytes.com/threat-analysis/2019/07/a-deep-dive-into-phobos-ransomware/
[2] https://venturebeat.com/2019/07/24/the-video-game-industry-is-a-black-hole-for-cybersecurity/
[2] https://blog.malwarebytes.com/threat-spotlight/2019/07/threat-spotlight-sodinokibi-ransomware-attempts-to-fill-gandcrab-void/
[2] https://archerint.com/how-ransomware-really-gets-onto-your-computer/
[2] https://fortune.com/2019/07/24/fighting-deepfakes-gets-real/

Top URLs in Tweet in G10:
[3] https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_Zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_Zt0106_sm-post_social_threatpost
[2] https://www.helpnetsecurity.com/2019/08/06/online-skimming/
[2] https://www.helpnetsecurity.com/2019/07/30/abusing-twitter/
[2] https://www.helpnetsecurity.com/2019/08/01/mandatory-password-changes-are-obsolete/
[2] https://www.bleepingcomputer.com/news/security/new-systembc-malware-uses-your-pc-to-hide-malicious-traffic/#.XUNFBDQUl9o.twitter
[2] https://threatpost.com/aws-arrest-data-breach-capital-one/146758/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_zt0106_sm-post_social_threatpost
[2] https://www.hrdive.com/news/cybersecurity-training-is-up-but-a-hiring-gap-remains/559839/
[2] https://www.helpnetsecurity.com/2019/07/17/shadow-it-control/
[2] https://www.scoop.it/topic/cyber-resilience-leadership/p/4108013005/2019/06/04/why-cyber-resiliency-really-matters?utm_medium=social&utm_source=twitter
[2] https://hackersonlineclub.com/learn-tcp-ip/

Top Domains
Top Domains in Tweet in Entire Graph:
[207] twitter.com
[111] forbes.com
[80] cyberstartupobservatory.com
[67] linkedin.com
[67] hackers-arise.com
[63] zdnet.com
[61] thehill.com
[49] co.uk
[49] itspmagazine.com
[47] youtube.com

Top Domains in Tweet in G1:
[67] twitter.com
[32] linkedin.com
[25] github.com
[22] co.uk
[21] hakin9.org
[19] trib.al
[19] forbes.com
[19] reydes.com
[18] thehill.com
[14] youtube.com

Top Domains in Tweet in G2:
[80] cyberstartupobservatory.com
[50] forbes.com
[34] bing.com
[29] twitter.com
[26] zdnet.com
[26] tobem.com
[25] techrepublic.com
[21] medium.com
[20] twib.in
[19] google.com

Top Domains in Tweet in G3:
[47] itspmagazine.com
[10] csoonline.com
[7] twitter.com
[6] darkreading.com
[3] soundcloud.com
[3] bugcrowd.com
[3] cyberdefensemagazine.com
[3] dlvr.it
[2] dt-global.com
[2] ucf.edu

Top Domains in Tweet in G4:
[67] hackers-arise.com
[15] cyberdefence24.pl
[10] technologyreview.com
[6] youtube.com
[5] forbes.com
[4] co.uk
[4] twitter.com
[4] myshopify.com
[4] dynamicciso.com
[3] crn.com

Top Domains in Tweet in G5:
[6] twitter.com
[5] co.ke
[5] cybersecfill.com
[5] joomag.com
[3] securitymagazine.com
[2] ekraal.org
[2] v-org.com
[2] fraudsupport.org
[1] microsoft.com
[1] ledgerops.com

Top Domains in Tweet in G6:
[5] linkedin.com

Top Domains in Tweet in G7:
[2] nytimes.com
[1] sputniknews.com
[1] apnews.com
[1] datenschutz-hamburg.de
[1] twitter.com
[1] theverge.com
[1] techtarget.com

Top Domains in Tweet in G8:
[9] cybersecurityventures.com
[8] twitter.com
[4] recordedfuture.com
[3] forbes.com
[3] youtube.com
[2] moneymorning.com
[2] co.uk
[1] amazon.com
[1] scmagazine.com
[1] wvu.edu

Top Domains in Tweet in G9:
[21] forbes.com
[21] zdnet.com
[15] radian6.com
[9] inspiredelearning.com
[8] malwarebytes.com
[5] brinknews.com
[4] arstechnica.com
[3] infosecurity-magazine.com
[2] venturebeat.com
[2] techcrunch.com

Top Domains in Tweet in G10:
[18] helpnetsecurity.com
[12] hackersonlineclub.com
[10] threatpost.com
[5] scoop.it
[4] welivesecurity.com
[3] computerweekly.com
[3] forbes.com
[2] bleepingcomputer.com
[2] proofpoint.com
[2] esentire.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3185] cybersecurity
[846] infosec
[427] ai
[317] malware
[313] security
[302] iot
[288] ransomware
[240] bigdata
[236] fintech
[224] blockchain



Top Hashtags in Tweet in G1:
[721] cybersecurity
[214] infosec
[96] hacking
[88] security
[63] iot
[61] ai
[59] malware
[58] pentest
[57] hackers
[55] cybercrime

Top Hashtags in Tweet in G2:
[1029] cybersecurity
[341] infosec
[250] ai
[199] ransomware
[190] malware
[174] iot
[159] bigdata
[152] fintech
[130] blockchain
[130] digitaltransformation

Top Hashtags in Tweet in G3:
[131] cybersecurity
[73] infosec
[14] bhusa
[14] blackhat2019
[10] blackhat
[10] defcon27
[10] cyber
[8] defcon
[7] technology
[6] hacker

Top Hashtags in Tweet in G4:
[148] cybersecurity
[25] infosec
[15] osint
[13] malware
[12] security
[11] dfir
[10] forensics
[10] databreach
[9] recon
[8] hacker

Top Hashtags in Tweet in G5:
[95] cybersecurity
[29] cyberinafrica
[23] kigf2019
[18] kenyaigf2019
[13] wls2019
[11] ah2019
[11] kesig2019
[9] infosec
[6] ah6
[6] nogofallmaga

Top Hashtags in Tweet in G6:
[82] yourmustread
[58] cybersecurity
[56] influencerpromotion
[56] topcasestudy
[56] influencermarketing
[53] knowledge
[49] influencers
[49] ai
[48] fintech
[43] smm

Top Hashtags in Tweet in G7:
[3] cybersecurity
[2] capitalone
[2] houserepublicans
[2] usa
[1] dpc
[1] ictcyber
[1] dataprotection
[1] moscowmitchmctreason
[1] iot

Top Hashtags in Tweet in G8:
[47] cybersecurity
[9] women
[6] threatintelligence
[4] cybercrime
[3] ics
[2] ciso
[2] infosec
[2] digibyte
[2] cybertalks
[2] databreach

Top Hashtags in Tweet in G9:
[110] cybersecurity
[34] infosec
[17] ransomware
[14] malware
[10] iot
[10] security
[9] securityawareness
[9] itsecurity
[6] hackers
[6] phishing

Top Hashtags in Tweet in G10:
[101] cybersecurity
[39] infosec
[34] security
[29] ciso
[22] cio
[19] leadership
[19] cto
[15] management
[12] tech
[12] hackersonlineclub

Top Words
Top Words in Tweet in Entire Graph:
[3084] Words in Sentiment List#1: Positive
[3011] Words in Sentiment List#2: Negative
[0] Words in Sentiment List#3: Your list of keywords
[108569] Non-categorized Words
[114664] Total Words
[3182] #cybersecurity
[1154] cybersecurity
[846] #infosec
[600] security
[474] amp

Top Words in Tweet in G1:
[721] #cybersecurity
[383] cybersecurity
[214] #infosec
[143] security
[109] more
[102] cyber
[96] amp
[96] #hacking
[88] #security
[82] data

Top Words in Tweet in G2:
[1028] #cybersecurity
[341] #infosec
[250] #ai
[217] cybersecurity
[199] #ransomware
[196] security
[190] #malware
[174] #iot
[159] #bigdata
[152] #fintech

Top Words in Tweet in G3:
[131] #cybersecurity
[73] #infosec
[37] amp
[30] co
[26] cybersecurity
[25] security
[24] more
[21] cyber
[20] learn
[15] itspmagazine

Top Words in Tweet in G4:
[148] #cybersecurity
[25] #infosec
[20] intelligence
[19] part
[19] one
[17] security
[17] cybersecurity
[15] #osint
[15] cyberdefence24
[14] hacker

Top Words in Tweet in G5:
[95] #cybersecurity
[30] cybersecurity
[29] #cyberinafrica
[23] amp
[23] #kigf2019
[21] security
[18] #kenyaigf2019
[18] kictanet
[15] data
[14] cyber

Top Words in Tweet in G6:
[82] #yourmustread
[58] #cybersecurity
[56] #influencerpromotion
[56] #topcasestudy
[56] #influencermarketing
[53] #knowledge
[50] cynthia_lardner
[49] #influencers
[49] #ai
[49] tom__coleman

Top Words in Tweet in G7:
[6] cybersecurity
[5] realdonaldtrump
[3] google
[3] president
[3] #cybersecurity
[2] smart
[2] issues
[2] amp
[2] hurdonthehill
[2] hey

Top Words in Tweet in G8:
[47] #cybersecurity
[22] cybersecurity
[18] more
[16] know
[11] cyber
[11] security
[9] cybersecuritysf
[9] #women
[7] one
[7] infosec

Top Words in Tweet in G9:
[110] #cybersecurity
[40] cybersecurity
[34] #infosec
[22] security
[20] forbes
[17] #ransomware
[14] #malware
[12] cyber
[12] zdnet
[11] company

Top Words in Tweet in G10:
[101] #cybersecurity
[39] #infosec
[38] gt
[34] #security
[29] #ciso
[22] #cio
[19] #leadership
[19] #cto
[15] #management
[14] security

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[339] #cybersecurity,#infosec
[117] gt,gt
[111] #cybersecurity,#databreach
[96] #cybersecurity,#cybercrime
[93] #infosec,#cybersecurity
[91] cyber,security
[90] capital,one
[89] #fintech,#blockchain
[88] #hackers,#infosec
[87] #databreach,#ransomware

Top Word Pairs in Tweet in G1:
[82] #cybersecurity,#infosec
[34] #infosec,#cybersecurity
[28] #infosec,#hacking
[26] cyber,security
[25] capital,one
[25] #hacking,#hackers
[25] #hackers,#pentesting
[25] #pentesting,#programming
[25] #programming,#pentest
[24] #opensource,#cybersecurity

Top Word Pairs in Tweet in G2:
[126] #cybersecurity,#infosec
[96] #cybersecurity,#databreach
[87] #fintech,#blockchain
[86] #hackers,#infosec
[85] #bigdata,#datascience
[84] #databreach,#ransomware
[84] #ransomware,#hackers
[84] #infosec,reach2ratan
[84] reach2ratan,#ai
[84] #blockchain,#chatbots

Top Word Pairs in Tweet in G3:
[30] #cybersecurity,#infosec
[10] learn,more
[8] #infosec,#cybersecurity
[5] stay,tuned
[5] uncwilmington,cyber
[5] cyber,seahawks
[5] infosec,life
[5] marcociappelli,sean_martin
[5] #blackhat2019,#cybersecurity
[5] more,co

Top Word Pairs in Tweet in G4:
[11] #cybersecurity,#infosec
[10] open,source
[10] source,intelligence
[9] basics,hackers
[9] cyberdefence24,#cybersecurity
[8] intelligence,osint
[8] reverse,engineering
[8] engineering,malware
[8] malware,part
[7] become,open

Top Word Pairs in Tweet in G5:
[7] #cyberinafrica,#cybersecurity
[6] #cybersecurity,#cyberinafrica
[6] #kenyaigf2019,#cyberinafrica
[5] #kigf2019,#kenyaigf2019
[5] #kenyaigf2019,#kigf2019
[5] part,#cybersecurity
[5] #cybersecurity,#personaldata
[5] #personaldata,panel
[5] panel,topic
[5] personal,data

Top Word Pairs in Tweet in G6:
[56] #influencerpromotion,#topcasestudy
[54] #topcasestudy,#cybersecurity
[53] #cybersecurity,#knowledge
[49] #yourmustread,#influencerpromotion
[48] #influencers,#influencermarketing
[40] #ai,#strategy
[36] #bitcoin,#fintech
[34] #strategy,#smm
[33] #proedutech,#yourmustread
[33] #yourmustread,#proedutech

Top Word Pairs in Tweet in G7:
[2] president,obama
[2] obama,give
[2] give,cybersecurity
[2] stand,down
[2] down,order
[2] order,russian
[2] russian,interference
[2] years,ago
[2] ago,one
[2] one,former

Top Word Pairs in Tweet in G8:
[9] know,#cybersecurity
[8] #women,know
[5] cybersecurity,ventures
[4] cybercrime,magazine
[3] know,cyber
[3] according,cybersecurity
[3] #cybersecurity,#cybercrime
[3] learn,more
[2] cybersecurity,rapidly
[2] united,states

Top Word Pairs in Tweet in G9:
[30] #cybersecurity,#infosec
[7] dismal,industry
[7] industry,unsustainable
[7] unsustainable,burden
[7] burden,cybersecurity
[7] #cybersecurity,#securityawareness
[7] #security,#cybersecurity
[6] forbes,#cybersecurity
[6] zdnet,#cybersecurity
[6] future,#cybersecurity

Top Word Pairs in Tweet in G10:
[19] #cio,#cto
[15] #leadership,#management
[13] #infosec,#security
[12] #ciso,#cio
[10] #cybersecurity,#security
[9] #cybersecurity,#infosec
[9] #security,#infosec
[8] #infosec,#leadership
[8] #hackersonlineclub,#cybersecurity
[7] #cto,#ciso

Top Replied-To
Top Replied-To in Entire Graph:
@pvynckier
@cynthia_lardner
@drnikolova_rumi
@rosatrunk
@marcusjcarey
@mocana
@drjdrooghaag
@influencerprom1
@chidambara09
@mwfaanigeria

Top Replied-To in G1:
@cyfirma

Top Replied-To in G2:
@pvynckier
@mocana
@drjdrooghaag
@_schmielewski
@avrohomg
@google
@rbs
@drcwebbbaphd
@archonsec
@haroldsinnott

Top Replied-To in G3:
@cyberdefensemag
@mansimusa
@ecpiuniversity
@marcociappelli
@appsec_village

Top Replied-To in G4:
@pvynckier
@wired
@facebook

Top Replied-To in G5:
@cybertalknaija
@bomu
@aprielle_moraa
@innovatelawafri
@danielberzosa
@omondibob
@sheetalkumar

Top Replied-To in G6:
@cynthia_lardner
@drnikolova_rumi
@rosatrunk
@influencerprom1
@chidambara09
@kiyotaka_1991
@sumawun
@vipeurope5
@fujio0606
@masao__tanaka

Top Replied-To in G7:
@realdonaldtrump
@alyssa_milano
@mmmpeg59
@laurasessions10

Top Replied-To in G9:
@zackwhittaker

Top Replied-To in G10:
@microsoft
@cioonline

Top Mentioned
Top Mentioned in Entire Graph:
@reach2ratan
@archonsec
@drjdrooghaag
@mclynd
@digitalcloudgal
@aghiathchbib
@robmay70
@antgrasso
@chuckdbrooks
@pvynckier

Top Mentioned in G1:
@centurylink
@ioteventshub
@icesontario
@ezscott
@bsidesrdu
@ainewsalliance
@crimes_saudi
@ccwhistleblower
@cyber_xploits
@pittcyber

Top Mentioned in G2:
@archonsec
@reach2ratan
@drjdrooghaag
@mclynd
@digitalcloudgal
@aghiathchbib
@robmay70
@antgrasso
@chuckdbrooks
@pvynckier

Top Mentioned in G3:
@itspmagazine
@blackhatevents
@defcon
@bugcrowd
@wicked6games
@sean_martin
@reversinglabs
@uncwilmington
@prevailion
@marcociappelli

Top Mentioned in G4:
@cyberdefence24
@reach2ratan
@capitalone
@rneelmani
@sparya
@security10x
@sameeranja
@taosecurity
@cyb3rops
@m49d4ch3lly

Top Mentioned in G5:
@kictanet
@ca_kenya
@safaricomplc
@usiuafrica
@ekraal_
@shehacks_ke
@africahackon
@wls_globallaw
@opcde
@microsoftafrica

Top Mentioned in G6:
@tom__coleman
@jilliemary
@malekalby
@tripletsfan19
@kugey
@srinualme
@carlramallo
@cynthia_lardner
@chikara_inoue
@papaporter1

Top Mentioned in G7:
@realdonaldtrump
@google
@hurdonthehill
@naphisoc
@susanbordo
@bannerite
@proudresister
@ginaortizjones
@ewarren
@njterrie

Top Mentioned in G8:
@cybersecuritysf
@cisco
@forbes
@karla_reffold
@hacks4pancakes
@youtube
@dragosinc
@franksec42
@difreeze
@moneymorning

Top Mentioned in G9:
@forbes
@zdnet
@fireeye
@campuscodi
@brinknewsnow
@mmc_global
@kirkwright
@thepacketrat
@immelty
@forbeseurope

Top Mentioned in G10:
@lukasstefanko
@kaspersky
@gartner_inc
@helpnetsecurity
@luxorlv
@computerweekly
@transform_sec
@pcissc
@rh_isac
@trendmicro

Top Tweeters
Top Tweeters in Entire Graph:
@feedingjoy
@arkangelscrap
@easy_branches
@paoloigna1
@sectest9
@ee
@cyberdomain
@cybertoolsbooks
@independent
@evankirstel

Top Tweeters in G1:
@abscbnnews
@inspiteoftrump
@ancalerts
@jilevin
@huffpost
@new_narrative
@business
@channelnewsasia
@valaafshar
@wlwt

Top Tweeters in G2:
@arkangelscrap
@sectest9
@cyberdomain
@evankirstel
@evanderburg
@biconnections
@richsimmondsza
@economictimes
@marshacollier
@lesechos

Top Tweeters in G3:
@gameofthrones
@jgamblin
@hbo
@blackgirlscode
@sassoftware
@ecpiuniversity
@rndrive
@imsmartinc
@thewilsoncenter
@manicode

Top Tweeters in G4:
@independent
@ottlegalrebels
@shellykramer
@wil_bielert
@theregister
@mumbaipolice
@gate_15_analyst
@securitytube
@jack_daniel
@kfalconspb

Top Tweeters in G5:
@cybertoolsbooks
@safaricomplc
@nigerianewsdesk
@atsen_
@winknews
@un
@tyrus_
@worldbank
@silverkayondo
@xymbiz

Top Tweeters in G6:
@feedingjoy
@easy_branches
@jilliemary
@ssscoop475
@lorimoreno
@rosatrunk
@chidambara09
@ludmarx1
@gracemurphy2
@datsyuklover

Top Tweeters in G7:
@bannerite
@graceslick77
@morgfair
@co_rapunzel4
@ronsupportsyou
@puestoloco
@letat_lechat
@catlady628
@goprapebuster
@reporterphoenix

Top Tweeters in G8:
@honda
@hacks4pancakes
@christinayiotis
@unix_guru
@moneymorning
@sforslev
@fortalicellc
@amazon
@isik5
@eenewsupdates

Top Tweeters in G9:
@joviannfeed
@zdnet
@forbes
@sec_cyber
@fortunemagazine
@jose_garde
@phillyinquirer
@engadget
@vice
@venturebeat

Top Tweeters in G10:
@eleconomista
@jc_vazquez
@symbiansymoh
@sdxcentral
@mylessuer
@cioonline
@computerweekly
@helpnetsecurity
@plymuni
@kaspersky