cybersecurity, Twitter, 8/8/2019 11:14:10 AM, 206080


FAQ | Problem?

cybersecurity Twitter NodeXL SNA Map and Report for Wednesday, 07 August 2019 at 12:39 UTC
cybersecurity Twitter NodeXL SNA Map and Report for Wednesday, 07 August 2019 at 12:39 UTC
From:
Connected Action NodeXL-Reports
Uploaded on:
August 08, 2019
Short Description:
cybersecurity via NodeXL http://bit.ly/2MOaC54
@sectest9
@cybersec_feeds
@wynandbooysen
@thetechninjauk
@politico
@usairforce
@forbes
@lisamei62
@annie_amountain
@cephalopodluke2

Top hashtags:
#cybersecurity
#infosec
#security
#iot
#ai
#malware
#ransomware

Description:
Description
The graph represents a network of 11,972 Twitter users whose recent tweets contained "cybersecurity", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Wednesday, 07 August 2019 at 15:26 UTC.

The tweets in the network were tweeted over the 1-day, 1-hour, 30-minute period from Tuesday, 06 August 2019 at 11:08 UTC to Wednesday, 07 August 2019 at 12:38 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 11972
Unique Edges : 22127
Edges With Duplicates : 14625
Total Edges : 36752
Number of Edge Types : 4
Tweet : 7076
Retweet : 9684
Mentions : 19502
Replies to : 490
Self-Loops : 7306
Reciprocated Vertex Pair Ratio : 0.0320450662603315
Reciprocated Edge Ratio : 0.0621001297481097
Connected Components : 2900
Single-Vertex Connected Components : 2059
Maximum Vertices in a Connected Component : 7305
Maximum Edges in a Connected Component : 31024
Maximum Geodesic Distance (Diameter) : 19
Average Geodesic Distance : 4.800713
Graph Density : 0.000155955185494916
Modularity : 0.514797
NodeXL Version : 1.0.1.418

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[198] https://thehill.com/policy/cybersecurity/400882-wikileaks-says-senate-panel-requested-assange-testimony-in-russia-probe
[148] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[77] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[76] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[50] https://www.us-cert.gov/ncas/current-activity/2019/08/06/el-paso-and-dayton-tragedy-related-scams-and-malware-campaigns
[45] https://thehill.com/policy/cybersecurity/456282-social-media-bots-pose-threat-ahead-of-2020
[43] https://www.terilogy.com/event/seminar_20190826.html?utm_source=hootsuite&utm_medium=twitter&utm_term=nozominetworks&utm_content=7df1192d-a8be-4fbe-923e-174ced6ddaa9&utm_campaign=
[43] https://iiot-world.com/cybersecurity/the-cybersecurity-implications-of-infrastructure-modernization/
[37] https://www.zdnet.com/article/at-t-employees-took-bribes-to-plant-malware-on-the-companys-network/
[36] https://twinybots.ch/

Top URLs in Tweet in G1:
[14] https://thehill.com/policy/cybersecurity/456256-key-house-republican-examines-federal-election-security-efforts
[12] https://hbr.org/sponsored/2019/06/catalyzing-new-opportunities-for-the-cybersecurity-industry-in-new-york-city?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+harvardbusiness+%28HBR.org%29
[11] https://www.darkreading.com/vulnerabilities---threats/when-perceived-cybersecurity-risk-outweighs-reality/a/d-id/1335417?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
[11] https://nakedsecurity.sophos.com/2019/08/07/monzo-sticks-a-pin-in-cybersecurity-slip-up/
[10] https://www.forbes.com/sites/forbestechcouncil/2019/08/05/can-ai-be-used-to-bolster-cybersecurity/
[8] https://twinybots.ch/
[7] https://thehill.com/policy/cybersecurity/456282-social-media-bots-pose-threat-ahead-of-2020
[7] https://www.vmware.com/radius/how-much-trust-cybersecurity/
[7] https://www.darkreading.com/vulnerabilities---threats/when-perceived-cybersecurity-risk-outweighs-reality/a/d-id/1335417?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple&utm_source=dlvr.it&utm_medium=twitter
[7] https://www.darkreading.com/vulnerabilities---threats/when-perceived-cybersecurity-risk-outweighs-reality/a/d-id/1335417

Top URLs in Tweet in G2:
[114] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[66] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[65] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[18] http://www.arrakisconsulting.com
[15] https://www.techrepublic.com/article/how-to-prevent-the-top-11-threats-in-cloud-computing/
[11] https://phishstats.info/
[10] https://www.zdnet.com/article/singapore-eases-approval-process-for-fintech-trials-unveils-cybersecurity-rules/
[10] https://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/
[10] https://www.bbc.com/news/business-49244232?ocid=socialflow_twitter
[9] https://medium.com/futuresin/ai-is-evolving-faster-than-you-think-6c8244fa131e

Top URLs in Tweet in G3:
[35] https://iiot-world.com/cybersecurity/the-cybersecurity-implications-of-infrastructure-modernization/
[29] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[28] https://www.computing.co.uk/ctg/news/3080077/marriott-data-breach-gdpr-fine
[23] https://www.rise.global/the-cybersecurity-power-100
[18] https://cyberstartupobservatory.com/infographics-artificial-intelligence/
[14] https://www.zdnet.com/article/at-t-employees-took-bribes-to-plant-malware-on-the-companys-network/
[14] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=205728
[13] https://cyberstartupobservatory.com/
[12] https://www.techrepublic.com/article/how-to-protect-your-corporate-bank-account-after-the-capital-one-breach-10-tips/#ftag=RSS56d97e7
[12] https://blog.flanker017.me/galaxy-leapfrogging-pwning-the-galaxy-s8/

Top URLs in Tweet in G4:
[9] https://www.forbes.com/sites/thomasbrewster/2019/08/05/apple-is-giving-out-hacker-friendly-iphones-plots-mac-bug-bounty-sources/?utm_source=TWITTER&utm_medium=social&utm_content=2535628289&utm_campaign=sprinklrForbesMainTwitter#3a4f39804f09
[7] https://www.csoonline.com/article/3429363/looking-for-answers-at-black-hat-2019-5-important-cybersecurity-issues.html
[5] https://techhq.com/2019/08/ai-in-cybersecurity-works-but-watch-the-hype/
[5] https://cyberday.lu/
[5] https://wwwen.uni.lu/university/events/cyberday_2019
[5] https://trib.al/Kcx3Pgc
[4] https://codiceinsicuro.it/blog/basic-insicuri-create-a-python-exploit-skeleton-template-in-gnome/
[4] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[4] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-NEW-today.txt
[4] https://codiceinsicuro.it

Top URLs in Tweet in G5:
[35] https://thehill.com/policy/cybersecurity/456282-social-media-bots-pose-threat-ahead-of-2020
[16] https://thehill.com/policy/cybersecurity/456440-dhs-warns-of-potential-cyber-scams-tied-to-el-paso-dayton-shootings
[14] https://app.any.run/tasks/9d3ada1c-2a8f-43ef-9085-016a4e735881/
[9] https://view.joomag.com/cyberscape-africa-magazine-q2-2019/0724403001564646611?short
[9] https://thehill.com/policy/cybersecurity/456256-key-house-republican-examines-federal-election-security-efforts
[6] https://www.gig.co.ke/events/223
[5] https://www.ncsc.gov.uk/news/ncsc-and-girlguiding-team-up-to-create-a-new-cyber-resource
[4] https://www.youtube.com/watch?v=V5kByTWAyXY&feature=youtu.be

[4] http://joom.ag/Qo3e
[4] https://www.jdsupra.com/legalnews/legal-lessons-from-the-capital-one-15932/

Top URLs in Tweet in G6:
[28] https://www.us-cert.gov/ncas/current-activity/2019/08/06/el-paso-and-dayton-tragedy-related-scams-and-malware-campaigns
[7] https://www.us-cert.gov/ncas/bulletins/sb19-217
[6] https://www.linkedin.com/company/cyberwatchingeu
[4] https://jaxenter.com/blockchain-technology-the-future-of-cybersecurity-160452.html
[4] https://biicscyber.com/
[3] https://ec.europa.eu/digital-single-market/en/news/have-your-say-future-investment-europes-digital-economy
[3] https://twitter.com/concordiah2020/status/1158762987454377984
[3] http://thejewishvoice.com/2019/07/31/orthodox-jewish-woman-from-bklyn-tapped-for-cybersecurity-post/
[2] https://www.us-cert.gov/ncas/current-activity/2019/08/06/swapgs-spectre-side-channel-vulnerability
[2] https://www.enisa.europa.eu/news/enisa-news/call-for-expression-of-interest-for-the-first-ad-hoc-working-group-on-cybersecurity-certification

Top URLs in Tweet in G7:
[10] https://www.politico.com/story/2019/08/05/election-security-cybersecurity-1445539
[4] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/06/the-cybersecurity-202-the-government-s-relationship-with-ethical-hackers-has-improved-security-experts-say/5d48a4bf88e0fa1454f8019a/
[2] https://trib.al/h6YVIPG
[2] https://www.nextgov.com/cybersecurity/2019/08/lawmakers-urge-state-department-warn-american-travelers-about-chinese-surveillance/158906/
[1] https://edscoop.com/universities-cybersecurity-education-expanding-workforce-demand/
[1] https://www.politico.com/newsletters/morning-cybersecurity/2019/08/06/exclusive-cyber-nonprofit-steps-into-presidential-campaign-707516
[1] https://trib.al/dc9ddMe
[1] https://trib.al/3CQdfLO
[1] https://www.politico.com/interactives/2019/election-security-americas-voting-machines/
[1] https://twitter.com/politico/status/1158430018042834944

Top URLs in Tweet in G8:
[10] https://www.youtube.com/watch?v=iF8AKrDeyxg&feature=youtu.be

[8] https://owncloud.gwdg.de/index.php/s/WkjRBDgAYgi9ESJ
[7] https://constructech.com/improving-estimating-and-document-management/
[6] http://www.adaptivebox.net/artificial-intelligence-ai-business-directory/
[5] https://twinybots.ch/
[4] https://constructech.com/the-state-of-security-in-construction/
[4] https://constructech.com/going-digital-in-construction/
[4] http://www.rbrlondon.com/acs
[4] https://eventreg.oracle.com/profile/web/index.cfm?PKwebID=0x6491364369&varPage=home
[3] https://www.rbrlondon.com/acs

Top URLs in Tweet in G9:
[9] https://hakin9.org/people-tracker-on-the-internet-osint-analysis-and-research-tool/
[8] http://www.wbur.org/bostonomix/2019/08/05/el-paso-mass-shooting-internet-security
[6] https://hakin9.org/how-to-check-and-verify-that-your-vpn-is-secure/
[6] https://www.wired.com/story/defcon-medical-device-village-hacking-hospital/
[5] https://hakin9.org/essential-libraries-for-machine-learning-in-python-by-shubhi-asthana/
[4] https://www.sentinelone.com/blog/what-is-osint-how-is-it-used/
[4] https://www.sentinelone.com/blog/malware-living-off-land-with-certutil/
[4] https://www.sentinelone.com/blog/open-source-security/
[4] http://DataBreaches.net
[4] https://www.reddit.com/r/blueteamsec/comments/cn0lw1/azure_sentinel_microsofts_siem_soar_solution/?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G10:
[189] https://thehill.com/policy/cybersecurity/400882-wikileaks-says-senate-panel-requested-assange-testimony-in-russia-probe
[1] https://www.vpnranks.com/blog/experts-insight-online-privacy-in-2019/
[1] https://ar407.isrefer.com/go/2mm-od-ship/mm2org/

Top Domains
Top Domains in Tweet in Entire Graph:
[447] linkedin.com
[365] twitter.com
[355] thehill.com
[341] co.uk
[317] forbes.com
[307] github.com
[258] tobem.com
[226] zdnet.com
[173] helpnetsecurity.com
[167] youtube.com

Top Domains in Tweet in G1:
[180] linkedin.com
[84] twitter.com
[69] ziftsolutions.com
[68] forbes.com
[62] co.uk
[50] zdnet.com
[44] thehill.com
[37] darkreading.com
[35] joistamatic.com
[31] soundcloud.com

Top Domains in Tweet in G2:
[247] github.com
[97] zdnet.com
[91] dy.si
[86] twitter.com
[78] darkreading.com
[66] helpnetsecurity.com
[61] threatpost.com
[60] linkedin.com
[58] co.uk
[49] medium.com

Top Domains in Tweet in G3:
[95] forbes.com
[90] co.uk
[74] cyberstartupobservatory.com
[53] jdsupra.com
[53] twitter.com
[49] iiot-world.com
[46] github.com
[36] linkedin.com
[36] tobem.com
[34] techrepublic.com

Top Domains in Tweet in G4:
[205] tobem.com
[61] forbes.com
[20] twitter.com
[20] linkedin.com
[17] codiceinsicuro.it
[17] csoonline.com
[16] co.uk
[14] armoredcode.com
[11] github.com
[8] securityboulevard.com

Top Domains in Tweet in G5:
[64] thehill.com
[21] linkedin.com
[15] any.run
[12] appknox.com
[10] sophos.com
[9] joomag.com
[9] forbes.com
[7] youtube.com
[7] com.au
[6] co.ke

Top Domains in Tweet in G6:
[41] us-cert.gov
[17] twitter.com
[17] europa.eu
[10] cyberdefence24.pl
[7] linkedin.com
[4] cyberwatching.eu
[4] concordia-h2020.eu
[4] jaxenter.com
[4] biicscyber.com
[4] nist.gov

Top Domains in Tweet in G7:
[12] politico.com
[4] trib.al
[4] washingtonpost.com
[2] nextgov.com
[1] edscoop.com
[1] twitter.com
[1] thehill.com

Top Domains in Tweet in G8:
[66] dlvr.it
[49] tomshw.it
[22] constructech.com
[20] hwupgrade.it
[15] youtube.com
[13] scmagazine.com
[12] vectorfive.us
[9] 01net.it
[8] rbrlondon.com
[8] codiceinsicuro.it

Top Domains in Tweet in G9:
[34] hakin9.org
[24] linkedin.com
[19] hackers-arise.com
[16] sentinelone.com
[13] threatshub.org
[12] darkreading.com
[12] databreaches.net
[9] newsfusion.com
[8] wired.com
[8] wbur.org

Top Domains in Tweet in G10:
[189] thehill.com
[1] vpnranks.com
[1] isrefer.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[10574] cybersecurity
[2163] infosec
[968] security
[908] iot
[847] ai
[721] malware
[561] ransomware
[518] technology
[505] hacker
[479] hacking



Top Hashtags in Tweet in G1:
[1269] cybersecurity
[132] infosec
[112] security
[81] technology
[64] iot
[53] business
[52] ai
[51] hacking
[48] cyber
[46] tech

Top Hashtags in Tweet in G2:
[3100] cybersecurity
[853] infosec
[312] malware
[247] phishing
[239] security
[201] ransomware
[198] cybersec
[180] hacking
[154] iot
[137] cybercrime

Top Hashtags in Tweet in G3:
[2106] cybersecurity
[602] infosec
[440] ai
[370] iot
[307] security
[210] malware
[208] ransomware
[181] bigdata
[174] databreach
[166] tech

Top Hashtags in Tweet in G4:
[606] cybersecurity
[216] hacker
[41] infosec
[34] blog
[27] ai
[27] bot
[23] security
[21] iot
[18] tech
[17] digital

Top Hashtags in Tweet in G5:
[295] cybersecurity
[93] infosec
[48] malware
[46] security
[33] threatintel
[33] threathunting
[24] cyberscapeafrica
[23] iot
[20] ah2019
[18] technology

Top Hashtags in Tweet in G6:
[177] cybersecurity
[43] ransomware
[39] enisa
[37] certification
[33] infosec
[26] vulnerability
[25] swapgs
[18] cyber
[12] privacy
[11] eu

Top Hashtags in Tweet in G7:
[2] electionsecurity
[1] cybersecurity
[1] hackers
[1] votingmachines
[1] election

Top Hashtags in Tweet in G8:
[349] cybersecurity
[112] pcexpander
[112] cybernews
[77] tecnology
[75] iot
[68] nonstopnews
[57] cyberattack
[52] ai
[49] machinelearning
[49] news

Top Hashtags in Tweet in G9:
[273] cybersecurity
[99] infosec
[65] dfir
[55] osint
[54] hacking
[26] hackers
[25] pentest
[25] owaspzsc
[23] forensics
[23] evadeav

Top Hashtags in Tweet in G10:
[1] ebook
[1] cybersecurity
[1] onlinedanger
[1] drericcole
[1] cyberattack

Top Words
Top Words in Tweet in Entire Graph:
[12971] Words in Sentiment List#1: Positive
[12116] Words in Sentiment List#2: Negative
[0] Words in Sentiment List#3: Your list of keywords
[439200] Non-categorized Words
[464287] Total Words
[14704] #cybersecurity
[4460] cybersecurity
[3504] #infosec
[3132] security
[2231] gt

Top Words in Tweet in G1:
[1283] #cybersecurity
[1103] cybersecurity
[392] security
[204] cyber
[194] 2019
[193] new
[172] more
[153] amp
[151] data
[133] #infosec

Top Words in Tweet in G2:
[4135] #cybersecurity
[1302] #infosec
[659] security
[567] #malware
[535] new
[498] amp
[465] cybersecurity
[454] more
[428] gt
[368] #ransomware

Top Words in Tweet in G3:
[3410] #cybersecurity
[1613] gt
[1138] #infosec
[729] #ai
[696] security
[695] #iot
[538] #security
[523] #malware
[453] #bigdata
[452] #ransomware

Top Words in Tweet in G4:
[726] #cybersecurity
[218] #hacker
[149] cybersecurity
[141] security
[98] forbes
[88] more
[86] cyber
[73] new
[69] people
[67] know

Top Words in Tweet in G5:
[416] #cybersecurity
[131] #infosec
[131] security
[75] new
[74] cybersecurity
[73] cyber
[60] amp
[58] #malware
[55] #security
[54] more

Top Words in Tweet in G6:
[293] #cybersecurity
[151] amp
[119] more
[85] #infosec
[77] state
[69] #cyber
[68] cybersecurity
[65] cisagov
[60] cyber
[58] take

Top Words in Tweet in G7:
[381] machines
[346] paperless
[317] voting
[284] counties
[237] waiting
[225] 2020
[222] plan
[220] hacked
[220] startling
[220] number

Top Words in Tweet in G8:
[502] #cybersecurity
[201] cybersecurity
[150] digibyte
[132] di
[126] dgb
[125] security
[113] #pcexpander
[113] #cybernews
[103] #tecnology
[98] #iot

Top Words in Tweet in G9:
[423] #cybersecurity
[139] #infosec
[89] cybersecurity
[82] #dfir
[81] #osint
[68] out
[66] #hacking
[61] security
[55] #pentest
[51] #nogofallmaga

Top Words in Tweet in G10:
[189] wikileaks
[189] senate
[189] panel
[189] requested
[189] assange
[189] testimony
[189] russia
[189] probe
[5] cybersecurity
[5] thoughts

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[1306] #cybersecurity,#infosec
[1009] gt,gt
[617] #infosec,#cybersecurity
[554] cyber,security
[334] voting,machines
[325] read,more
[321] check,out
[310] #cybersecurity,#hacker
[288] paperless,voting
[274] #cybersec,#cybersecurity

Top Word Pairs in Tweet in G1:
[61] cisco,named
[61] named,champion
[61] champion,canalys
[61] canalys,cybersecurity
[61] cybersecurity,leadership
[61] leadership,matrix
[61] matrix,2019
[55] cyber,security
[49] #cybersecurity,#infosec
[44] #infosec,#cybersecurity

Top Word Pairs in Tweet in G2:
[617] #cybersecurity,#infosec
[220] #infosec,#cybersecurity
[184] #cybersec,#cybersecurity
[152] new,#phishing
[152] #malware,#dataviz
[137] #infosec,#malware
[132] phishfindr,found
[132] 2019,08
[132] #dataviz,#datamunching
[128] gt,found

Top Word Pairs in Tweet in G3:
[862] gt,gt
[324] #cybersecurity,#infosec
[206] #ai,#iot
[163] cyber,security
[137] #cybersecurity,#databreach
[135] #infosec,#cybersecurity
[113] #fintech,#blockchain
[111] #hackers,#infosec
[108] mikequindazzi,gt
[101] #databreach,#ransomware

Top Word Pairs in Tweet in G4:
[212] #cybersecurity,#hacker
[27] #blog,#bot
[27] #bot,#cybersecurity
[26] cyber,security
[25] cybercrime,magazine
[23] #cybersecurity,#infosec
[23] #cybersecurity,industry
[21] saltstack,#secops
[21] #blackhat2019,week
[21] black,unicorn

Top Word Pairs in Tweet in G5:
[51] #infosec,#cybersecurity
[49] #cybersecurity,#infosec
[35] #infosec,#security
[34] new,social
[34] social,media
[34] media,bots
[34] bots,pose
[34] pose,disinformation
[34] disinformation,threat
[34] threat,ahead

Top Word Pairs in Tweet in G6:
[80] #cybersecurity,#infosec
[62] #cyber,#cybersecurity
[54] read,more
[40] usnistgov,pcmatic
[40] pcmatic,cisagov
[39] local,governments
[38] #ransomware,attacks
[38] attacks,against
[38] against,georgia
[38] georgia,state

Top Word Pairs in Tweet in G7:
[301] voting,machines
[266] paperless,voting
[220] machines,waiting
[220] waiting,hacked
[220] hacked,2020
[220] 2020,startling
[220] startling,number
[220] number,counties
[220] counties,plan
[220] plan,doing

Top Word Pairs in Tweet in G8:
[103] #pcexpander,#cybernews
[72] #cybersecurity,#cyberattack
[70] #cybernews,#nonstopnews
[70] #nonstopnews,#cybersecurity
[70] #cyberattack,#tecnology
[70] #tecnology,#news
[41] cyber,security
[40] #iot,#ai
[40] digibyte,lock
[40] lock,dgb

Top Word Pairs in Tweet in G9:
[36] #infosec,#hacking
[36] #hacking,#hackers
[36] #hackers,#pentesting
[36] #pentesting,#programming
[36] #programming,#pentest
[36] #cybersecurity,#nogofallmaga
[32] #opensource,#cybersecurity
[30] #dfir,#cybersecurity
[29] abuja,market
[28] #pentest,#opensource

Top Word Pairs in Tweet in G10:
[189] wikileaks,senate
[189] senate,panel
[189] panel,requested
[189] requested,assange
[189] assange,testimony
[189] testimony,russia
[189] russia,probe
[3] isn,america
[3] america,taking
[3] taking,much

Top Replied-To
Top Replied-To in Entire Graph:
@paulachertok
@aoc
@cynthia_lardner
@symantec
@pvynckier
@lqiwfuokvh0ynyr
@cybertalknaija
@jbthecryptoking
@realdonaldtrump
@github

Top Replied-To in G2:
@symantec
@shehackspurple
@radware
@nicky_whiting
@akamai
@austcyber
@cybereason
@divvycloud
@marcociappelli
@pax8

Top Replied-To in G3:
@pvynckier
@mdkail
@cybersecboardrm
@ianmcalvert
@sentinelone
@chefsteinmeier
@gigastacey
@google
@yuhelenyu

Top Replied-To in G4:
@cyberdefensemag
@fireeye
@cybersecuritysf
@digitalcloudgal
@phxbizjournal
@bdoaccountant
@durdenseguridad
@adammcarrigan
@ketting83
@davidshipley

Top Replied-To in G5:
@github
@nvidia
@isacakampala
@cyberspacekenya
@adobe
@qualcomm
@nvidiageforce
@microsoft
@certpa

Top Replied-To in G6:
@meryemmarzouki
@andreacalderaro
@vanhipp
@andreabeccalli
@kkomaitis

Top Replied-To in G8:
@effectivepm
@vinsystraining
@masterofproject
@pmcerty
@china__focus

Top Replied-To in G9:
@cybertalknaija
@foreignpolicy

Top Mentioned
Top Mentioned in Entire Graph:
@antgrasso
@digitalcloudgal
@drjdrooghaag
@aghiathchbib
@mclynd
@mikequindazzi
@archonsec
@robmay70
@avrohomg
@pvynckier

Top Mentioned in G1:
@digicatapult
@koddoscom
@ezscott
@techzine
@hpi_de
@ubuntu_pit
@industrytoday
@b2bdma
@symbol_security

Top Mentioned in G2:
@blackhatevents
@akamai
@zdnet
@z3rotrust
@itspmagazine
@darkreading
@reach2ratan
@techrepublic
@kaspersky
@defcon

Top Mentioned in G3:
@antgrasso
@digitalcloudgal
@drjdrooghaag
@aghiathchbib
@mclynd
@archonsec
@mikequindazzi
@robmay70
@avrohomg
@pvynckier

Top Mentioned in G4:
@forbes
@cybersecuritysf
@hacks4pancakes
@blackhatevents
@cyberdefensemag
@karla_reffold
@csoonline
@miliefsky
@robertherjavec
@cisco

Top Mentioned in G5:
@jameswt_mht
@malwrhunterteam
@matte_lodi
@merlos1977
@58_158_177_102
@reach2ratan
@vk_intel
@rneelmani
@malwaretechblog
@huntingmalware

Top Mentioned in G6:
@cisagov
@usnistgov
@pcmatic
@concordiah2020
@eu_h2020
@cyberdefence24
@dsmeu
@cybersec_eu
@enisa_eu
@ecso_eu

Top Mentioned in G7:
@senategop
@politico
@indianauniv

Top Mentioned in G8:
@youtube
@un
@antumid
@ingeniumtw
@ineightsoftware
@marshglobal
@block30labs
@v_id_blockchain
@engineeringspa
@symantec

Top Mentioned in G9:
@xymbiz
@csecurityalerts
@nogofallmaga
@linkedin
@sansinstitute
@bostonomix
@mattgaetz
@wbur
@vmray
@meshekah

Top Tweeters
Top Tweeters in Entire Graph:
@oldlady12345
@the_news_diva
@feedingjoy
@marshawright
@easy_branches
@sectest9
@robinsnewswire
@cowboyscifibot
@phildecarolis
@chris_1791

Top Tweeters in G1:
@the_news_diva
@feedjunkie
@webironbots
@prpnews
@cahulaan
@inspiteoftrump
@schestowitz
@newsfromspi
@new_narrative
@dtncanada

Top Tweeters in G2:
@chris_1791
@robre62
@british_airways
@bitcoinagile
@jcsura
@startupnws
@repubblica
@kotaknaren
@aaroncuddeback
@evanderburg

Top Tweeters in G3:
@sectest9
@cybertoolsbooks
@gamergeeknews
@evankirstel
@chidambara09
@jmlpyt
@fintechna
@wahlborn
@infopronetwork
@marshacollier

Top Tweeters in G4:
@cyberdomain
@monalisazelf
@rosenchild
@w55unicorn
@marconavarrolor
@anil7kishan
@kas_stoner
@njmike731
@trazlersgal
@forbes

Top Tweeters in G5:
@nosqldigest
@solutioneer72
@safaricomplc
@ottlegalrebels
@thehill
@trixywh
@stetayen
@chennylou
@trippbraden
@anchorsend1

Top Tweeters in G6:
@pickooo
@boriquagoddess
@evalb5
@mariancantwellf
@thd_it
@meryemmarzouki
@chasapple
@purrcival1
@candicelanier
@rtamesis

Top Tweeters in G7:
@oldlady12345
@carolmaewy
@sueleugers
@79topper
@njdoc
@bad_woof
@dpmax100
@amb0306
@burcham_don
@thesounddefense

Top Tweeters in G8:
@pcexpander
@nicochan33
@zaroonrkhan
@vectorfiveus
@applenews_it
@luisb
@daviddoughty
@manifattura40
@machine_ml
@aftenposten

Top Tweeters in G9:
@csa_dvillamizar
@drofdem
@rdsweb
@gonzalogarde
@rogue_corq
@mialis79
@realkitchenzink
@ace109_
@foreignpolicy
@osint_sec

Top Tweeters in G10:
@lyndag1963
@izzysroses
@dieb1948
@theconservitar3
@dianehauschildt
@lyndaatchison
@paolalopez1971
@amymariewillard
@realmrsgrits
@sasky1959