(Cyber Security) OR Cybersecurity, Twitter, 12/20/2019 1:20:39 AM, 219219


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2019-12-19_04-58-15.xlsx
(Cyber Security) OR Cybersecurity_2019-12-19_04-58-15.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
December 20, 2019
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL http://bit.ly/2r9z2gY
@cybersec_feeds
@yourxss
@chidambara09
@sectest9
@cybersecurityn8
@ibm
@mikequindazzi
@stpiindia
@malapersona10
@ipfconline1

Top hashtags:
#cybersecurity
#infosec
#security
#ai
#iot
#cyberattack

Description:
Description
The graph represents a network of 3,869 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Thursday, 19 December 2019 at 12:59 UTC.

The requested start date was Wednesday, 18 December 2019 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 1-hour, 40-minute period from Monday, 16 December 2019 at 11:25 UTC to Tuesday, 17 December 2019 at 13:05 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 3869
Unique Edges : 5617
Edges With Duplicates : 3321
Total Edges : 8938
Number of Edge Types : 3
Mentions : 6920
Tweet : 1910
Replies to : 108
Self-Loops : 1910
Reciprocated Vertex Pair Ratio : 0.0186099506266616
Reciprocated Edge Ratio : 0.0365398956002983
Connected Components : 781
Single-Vertex Connected Components : 454
Maximum Vertices in a Connected Component : 2302
Maximum Edges in a Connected Component : 7237
Maximum Geodesic Distance (Diameter) : 11
Average Geodesic Distance : 3.993371
Graph Density : 0.000358429357743237
Modularity : 0.52429
NodeXL Version : 1.0.1.422
Data Import : The graph represents a network of 3,869 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Thursday, 19 December 2019 at 12:59 UTC.

The requested start date was Wednesday, 18 December 2019 at 01:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 1-hour, 40-minute period from Monday, 16 December 2019 at 11:25 UTC to Tuesday, 17 December 2019 at 13:05 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[77] https://www.facebook.com/cyberwarbooks
[38] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[25] https://twinybots.ch/
[18] https://www.forbes.com/sites/daveywinder/2019/12/14/new-orleans-declares-state-of-emergency-following-cyber-attack/
[16] https://www.ncsc.gov.uk/report/weekly-threat-report-13th-december-2019
[15] https://github.com/bfuzzy/auditd-attack
[14] https://www.techrepublic.com/article/10-cybersecurity-stories-in-2019-that-make-us-feel-less-secure/
[13] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html?utm_campaign=buffer
[11] https://sapns2.com/artificial-intelligence-and-its-impact-on-cybersecurity/
[11] https://thehackernews.com/2019/12/whatsapp-group-crash.html

Top URLs in Tweet in G1:
[6] https://twinybots.ch/
[4] https://dailytechmonde.blogspot.com/2019/11/reconnaissance-faciale.html
[4] https://www.washingtonpost.com/politics/the-cybersecurity-202-pressure-still-on-mcconnell-after-425-million-election-security-deal/2019/12/17/6ae40b9c-1785-407c-959a-4e31eac45ee3_story.html?utm_source=dlvr.it&utm_medium=twitter
[3] https://www.csoonline.com/article/3505816/are-we-running-out-of-time-to-fix-aviation-cybersecurity.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_all
[3] https://www.csoonline.com/article/3505816/are-we-running-out-of-time-to-fix-aviation-cybersecurity.html#tk.rss_all
[3] https://www.lawfareblog.com/closing-critical-gap-cybersecurity
[3] https://www.hostreview.com/
[2] https://www.techrepublic.com/article/10-cybersecurity-stories-in-2019-that-make-us-feel-less-secure/
[2] https://www.forbes.com/sites/louiscolumbus/2019/12/15/shadow-it-is-the-cybersecurity-threat-that-keeps-giving-all-year-long/
[2] https://www.ncsc.gov.uk/report/weekly-threat-report-13th-december-2019

Top URLs in Tweet in G2:
[9] https://sapns2.com/artificial-intelligence-and-its-impact-on-cybersecurity/
[6] https://www.ncsc.gov.uk/report/weekly-threat-report-13th-december-2019
[5] https://www.techrepublic.com/article/10-cybersecurity-stories-in-2019-that-make-us-feel-less-secure/#ftag=RSS56d97e7
[5] https://www.nbcnews.com/nightly-news/video/privacy-and-power-your-digital-fingerprint-part-2-74786373977
[4] https://www.information-age.com/predictions-for-cyber-security-2020-123486362/
[4] https://www.pwc.com/sg/en/publications/assets/fintech-talent-survey-2019.pdf
[4] https://www.gartner.com/en/documents/3224717
[4] https://www.teiss.co.uk/hackers-selling-credit-card-records/
[3] https://www.aitimejournal.com/@manoj.rupareliya/how-to-leverage-deep-learning-cognitive-computing-for-cybersecurity
[3] https://www.iiotnewshub.com/news/articles/443680-when-implementing-iiot-quality-assurance-everything.htm#.XdKr6gqqRZ8.twitter

Top URLs in Tweet in G3:
[71] https://www.facebook.com/cyberwarbooks
[26] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[7] http://sec.eddyproject.com/6000-hackerone-disclosed-reports/
[7] https://siliconangle.com/2019/12/15/visa-warns-cybercrime-gangs-targeting-gas-stations-pos-malware/
[7] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-links-ACTIVE-NOW.txt
[7] http://www.startuprad.io/
[7] https://podcasts.apple.com/de/podcast/security-sutra-by-startuprad-io/id1484317644
[6] https://softwaredevelopersindia.com/blog/data-privacy-day-3-ways-to-protect-your-business-with-better-internet-security/
[6] https://opinionatedsecurity.blogspot.com/2019/12/the-dark-underside-of-cyber-visibility.html?p=t
[6] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html?utm_campaign=buffer

Top URLs in Tweet in G4:
[13] https://twinybots.ch/
[7] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[6] https://www.forbes.com/sites/daveywinder/2019/12/14/new-orleans-declares-state-of-emergency-following-cyber-attack/
[6] https://thefintechtimes.com/2020-cybersecurity-trends/
[5] https://www.beingcert.com/Certification/Certified-Data-Protection-Officer
[4] https://www.linkedin.com/slink?code=eWsTbMS
[4] https://www.linkedin.com/slink?code=ec2mxaQ
[4] http://www.arrakisconsulting.com
[3] https://blog.logrocket.com/ai-in-browsers-comparing-tensorflow-onnx-and-webdnn-for-image-classification/
[3] https://www.wric.com/news/taking-action/cybersecurity-expert-shares-how-to-avoid-having-your-ring-camera-hacked/

Top URLs in Tweet in G5:
[7] https://www.thepythoncode.com/article/encrypt-decrypt-files-symmetric-python
[5] https://trustd.dev/
[5] https://cyberstartupobservatory.com/another-day-another-data-breach/
[4] https://track.totalav.com/5c82907aeddcb/click/twitter-blog/us-state-department-puts-bounty-on-banking-malware-suspect/sid3?url=https://news.totalav.com/us-state-department-puts-bounty-on-banking-malware-suspect
[4] https://www.engadget.com/2019/12/16/visa-gas-station-fraud-malware/
[4] https://www.helpnetsecurity.com/2019/12/16/pci-point-to-point-encryption-standard/
[4] https://cyberstartupobservatory.com/can-we-automate-security-testing/
[4] https://delapcyber.com/cyber-security-news/
[3] http://digitalhealthage.com/safeguarding-the-healthcare-industry-for-2020-and-beyond/
[3] http://www.actuarialpost.co.uk/article/models-must-evolve-to-tackle-silent-cyber-17648.htm

Top URLs in Tweet in G6:
[4] https://www.dailymail.co.uk/tvshowbiz/article-7795121/Melissa-Benoist-hugs-screen-sister-celebrate-Supergirls-100th-episode-huge-cake.html?ito=amp_twitter_share-top
[4] https://twinybots.ch/
[4] https://cyware.com/news/new-vegalocker-ransomware-variant-targets-healthcare-and-it-sectors-57131ade
[3] http://bit.ly/2RRFC6C?utm_content=108792867&utm_medium=social&utm_source=twitter&hss_channel=tw-247327135
[3] https://www.hellenicshippingnews.com/nyk-group-accredited-by-classnk-for-cybersecurity-management/
[3] https://www.thecourier.co.uk/fp/news/local/dundee/1042899/abertay-university-opens-new-5-5-million-videogames-and-cybersecurity-centre/
[3] https://www.business2community.com/cybersecurity/cyber-security-revisiting-the-questions-the-board-should-ask-02266153
[3] https://shuftipro.com/news/beware-of-puppy-scams-this-holiday-season-bbb/
[2] https://www.theglobeandmail.com/featured-reports/article-small-business-struggles-to-compete-for-cybersecurity-talent/
[2] https://www.dailymail.co.uk/tvshowbiz/article-7796821/Bella-Hadid-puts-stylish-display-androgynous-chic-look-steps-JFK-airport.html?ito=amp_twitter_share-top

Top URLs in Tweet in G7:
[6] https://ciowatercooler.co.uk/the-state-of-cybersecurity-jean-christophe-gaillard-md-founder-corix-partners/?sp_url=6nyh
[6] https://www.cio.com/article/3201147/why-ai-is-crucial-to-cyber-security.html?utm_campaign=buffer
[5] https://www.brighttalk.com/webcast/14809/259541?utm_content=buffer689cd&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[5] https://www.csoonline.com/article/3204160/the-lessons-of-wannacry-attack.html?utm_campaign=buffer
[5] https://www.techrepublic.com/article/10-cybersecurity-stories-in-2019-that-make-us-feel-less-secure/
[5] https://www.csoonline.com/article/3489045/2020-cybersecurity-trends-9-threats-to-watch.html
[4] https://www.computerweekly.com/news/252475324/Alarm-bells-ring-the-IoT-is-listening
[4] https://spectacularmag.com/2019/12/16/visa-warns-of-hacking-risk-at-gas-stations/
[4] http://www.viruss.eu/security-news/researchers-fooled-chinese-facial-recognition-terminals-with-just-a-mask-2/
[4] https://www.rcrwireless.com/20191216/5g/what-is-threat-modeling-for-5g-cybersecurity

Top URLs in Tweet in G8:
[2] https://www.forbes.com/sites/forbestechcouncil/2019/05/15/whats-it-like-to-work-in-infosec/
[1] https://www.thepythoncode.com/article/encrypt-decrypt-files-symmetric-python
[1] https://paper.li/franzrusso?edition_id=0b8dae40-20b7-11ea-a278-0cc47a0d1605

Top URLs in Tweet in G9:
[1] https://economictimes.indiatimes.com/tech/internet/ibm-launches-open-tech-to-speed-response-to-cyber-threats-across-clouds/articleshow/72140809.cms
[1] https://economictimes.indiatimes.com/tech/internet/meity-planning-strategy-for-national-use-of-blockchain/articleshow/72259826.cms

Top URLs in Tweet in G10:
[13] https://github.com/bfuzzy/auditd-attack
[6] https://www.securityinfowatch.com/cybersecurity/article/21114214/a-brief-history-of-machine-learning-in-cybersecurity
[4] https://www.redpacketsecurity.com/exist-web-application-for-aggregating-and-analyzing-cyber-threat-intelligence/
[3] https://hakin9.org/homepwn-swiss-army-knife-for-pentesting-of-iot-devices/
[3] https://www.cleverism.com/latest-stats-on-women-in-tech/
[3] https://pentestmag.com/dagon-advanced-hash-cracking-manipulation-system/
[3] https://www.scmagazineuk.com/ceo-listen-cisos-share-strategies/article/1664201?utm_source=SC&utm_medium=Twitter&utm_campaign=SCTwitter
[2] https://hakin9.org/opencti-open-cyber-threat-intelligence-platform/
[2] https://pentestmag.com/shell-lunch-box/
[2] https://www.infosecurity-magazine.com/news/new-orleans-scrambles/

Top Domains
Top Domains in Tweet in Entire Graph:
[146] linkedin.com
[131] co.uk
[111] tobem.com
[107] twitter.com
[89] forbes.com
[79] github.com
[78] facebook.com
[51] csoonline.com
[49] bit.ly
[38] youtube.com

Top Domains in Tweet in G1:
[47] linkedin.com
[24] co.uk
[18] stwb.co
[13] twitter.com
[10] csoonline.com
[10] blogspot.com
[9] forbes.com
[6] youtube.com
[6] twinybots.ch
[6] zdnet.com

Top Domains in Tweet in G2:
[11] gov.uk
[10] forbes.com
[9] techrepublic.com
[9] sapns2.com
[6] nbcnews.com
[6] co.uk
[5] youtube.com
[5] cmun.it
[4] information-age.com
[4] zdnet.com

Top Domains in Tweet in G3:
[87] tobem.com
[71] facebook.com
[40] github.com
[26] co.uk
[18] blogspot.com
[17] csoonline.com
[15] forbes.com
[14] linkedin.com
[13] bit.ly
[12] hostnoc.com

Top Domains in Tweet in G4:
[35] tomshw.it
[24] linkedin.com
[17] forbes.com
[17] twitter.com
[14] github.com
[13] twinybots.ch
[10] tobem.com
[9] hwupgrade.it
[7] youtube.com
[6] darkreading.com

Top Domains in Tweet in G5:
[28] yourxss.pro
[21] linkedin.com
[18] helpnetsecurity.com
[17] co.uk
[17] twitter.com
[14] cyberstartupobservatory.com
[8] forbes.com
[7] thepythoncode.com
[6] trustd.dev
[6] sophos.com

Top Domains in Tweet in G6:
[19] co.uk
[19] linkedin.com
[14] dlvr.it
[7] bit.ly
[6] cybersecurity-insiders.com
[5] csoonline.com
[5] forbes.com
[5] comptia.org
[4] twinybots.ch
[4] twitter.com

Top Domains in Tweet in G7:
[20] co.uk
[16] viruss.eu
[12] csoonline.com
[11] sophos.com
[10] ehackingnews.com
[9] securityaffairs.co
[8] linkedin.com
[7] medium.com
[7] scoop.it
[6] forbes.com

Top Domains in Tweet in G8:
[2] forbes.com
[1] thepythoncode.com
[1] paper.li

Top Domains in Tweet in G9:
[2] indiatimes.com

Top Domains in Tweet in G10:
[14] github.com
[6] hakin9.org
[6] pentestmag.com
[6] securityinfowatch.com
[4] redpacketsecurity.com
[3] cleverism.com
[3] infosecurity-magazine.com
[3] scmagazineuk.com
[2] gov.uk
[2] latesthackingnews.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2978] cybersecurity
[552] infosec
[466] security
[420] ai
[406] iot
[222] cyberattack
[206] cybercrime
[178] cyber
[177] ransomware
[177] malware



Top Hashtags in Tweet in G1:
[222] cybersecurity
[30] security
[23] cyber
[21] iot
[20] infosec
[15] cybercrime
[13] ai
[11] technology
[10] ransomware
[10] data

Top Hashtags in Tweet in G2:
[309] cybersecurity
[201] iot
[175] ai
[111] fintech
[87] mpgvip
[86] pwc
[64] infosec
[54] bigdata
[49] security
[44] machinelearning

Top Hashtags in Tweet in G3:
[634] cybersecurity
[161] infosec
[138] security
[93] hacker
[81] cybercrime
[71] malware
[64] cyberattacks
[64] ransomware
[60] dataprotection
[60] cyber

Top Hashtags in Tweet in G4:
[545] cybersecurity
[75] cybernews
[74] pcexpander
[67] cyberattack
[58] security
[53] nonstopnews
[46] infosec
[45] tecnology
[41] ai
[40] news

Top Hashtags in Tweet in G5:
[364] cybersecurity
[77] infosec
[52] security
[47] cyberattack
[35] news
[25] pcexpander
[25] cybernews
[24] nonstopnews
[23] iot
[21] tecnology

Top Hashtags in Tweet in G6:
[173] cybersecurity
[22] iot
[20] security
[19] healthcare
[19] cyber
[18] technology
[15] ai
[15] infosec
[15] artificialintelligence
[12] bigdata

Top Hashtags in Tweet in G7:
[258] cybersecurity
[65] infosec
[65] ai
[47] security
[41] artificialintelligence
[37] databreach
[34] malware
[33] hackers
[30] blockchain
[29] machinelearning

Top Hashtags in Tweet in G8:
[18] cybersecurity
[17] yourmustread
[14] ai
[12] influencerpromotion
[12] promoedutech
[11] brest
[10] topcasestudy
[10] paris
[10] influencermarketing
[10] fintech

Top Hashtags in Tweet in G9:
[57] stpiindia
[2] cloudpakforsecurity
[2] cloud
[2] opensource
[2] blockchain
[1] cyberthreats
[1] egovernance
[1] bfsi
[1] cybersecurity
[1] stpiblockchaincoe

Top Hashtags in Tweet in G10:
[27] infosec
[27] cybersecurity
[17] it
[16] security
[15] tech
[14] news
[14] itsecurity
[13] hacking
[12] pentest
[11] hackers

Top Words
Top Words in Tweet in Entire Graph:
[3137] Words in Sentiment List#1: Positive
[2888] Words in Sentiment List#2: Negative
[22] Words in Sentiment List#3: Angry/Violent
[111237] Non-categorized Words
[117264] Total Words
[2978] #cybersecurity
[1144] security
[910] gt
[857] cyber
[776] cybersecurity

Top Words in Tweet in G1:
[222] #cybersecurity
[200] security
[168] cybersecurity
[165] cyber
[51] more
[42] 2020
[37] data
[30] #security
[29] time
[28] business

Top Words in Tweet in G2:
[613] gt
[309] #cybersecurity
[201] #iot
[198] mikequindazzi
[173] #ai
[111] #fintech
[105] 2020
[100] entering
[93] top
[91] focus

Top Words in Tweet in G3:
[634] #cybersecurity
[180] security
[165] cyber
[161] #infosec
[138] #security
[93] #hacker
[88] gt
[81] #cybercrime
[71] #malware
[70] 2019

Top Words in Tweet in G4:
[545] #cybersecurity
[87] security
[75] #cybernews
[74] #pcexpander
[67] #cyberattack
[66] cyber
[63] cybersecurity
[58] #security
[53] #nonstopnews
[51] 2020

Top Words in Tweet in G5:
[364] #cybersecurity
[77] security
[77] #infosec
[73] gt
[52] cyber
[52] #security
[47] #cyberattack
[44] cybersecurity
[35] #news
[35] data

Top Words in Tweet in G6:
[173] #cybersecurity
[109] cybersecurity
[86] security
[65] cyber
[51] videogames
[50] teaching
[44] 5m
[43] derekmackaysnp
[43] abertayuni's
[42] more

Top Words in Tweet in G7:
[258] #cybersecurity
[73] security
[69] gt
[65] #infosec
[65] #ai
[55] cyber
[50] reach2ratan
[47] #security
[41] #artificialintelligence
[38] cybersecurity

Top Words in Tweet in G8:
[22] grazytgrazynatt
[22] influencerprom1
[18] #cybersecurity
[17] #yourmustread
[14] itakethelead
[14] #ai
[12] #influencerpromotion
[12] #promoedutech
[11] #brest
[10] cynthia_lardner

Top Words in Tweet in G9:
[57] omkar_raii
[57] #stpiindia
[56] stpiindia
[56] dr
[56] dg
[56] esteemed
[56] keynote
[56] speaker
[56] address
[56] inaugural

Top Words in Tweet in G10:
[49] security
[44] web
[42] trimstray
[40] tools
[27] #infosec
[27] #cybersecurity
[26] linux
[20] pentesters
[20] researchers
[20] ssl

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[508] gt,gt
[442] cyber,security
[163] #cybersecurity,#infosec
[131] #cybersecurity,#hacker
[111] mikequindazzi,gt
[107] #iot,#cybersecurity
[107] state,emergency
[103] areas,focus
[101] top,11
[100] 11,#fintech

Top Word Pairs in Tweet in G1:
[105] cyber,security
[16] running,time
[16] time,fix
[16] fix,aviation
[16] aviation,cybersecurity
[12] cybersecurity,trends
[10] cyber,attacks
[10] election,security
[10] #security,#cybersecurity
[9] shadow,cybersecurity

Top Word Pairs in Tweet in G2:
[405] gt,gt
[96] mikequindazzi,gt
[88] areas,focus
[86] top,11
[86] 11,#fintech
[86] #fintech,areas
[86] focus,entering
[86] entering,2020
[86] 2020,gt
[86] gt,#pwc

Top Word Pairs in Tweet in G3:
[87] #cybersecurity,#hacker
[52] cyber,security
[50] #cybersecurity,#infosec
[39] 2019,12
[36] cioonline,kaspersky
[35] avgfree,eset
[32] kaspersky,thehackersnews
[31] #infosec,#security
[29] state,emergency
[27] #infosec,#cybersecurity

Top Word Pairs in Tweet in G4:
[65] #pcexpander,#cybernews
[53] #cybernews,#nonstopnews
[51] #nonstopnews,#cybersecurity
[45] #cybersecurity,#cyberattack
[35] #cyberattack,#tecnology
[35] #tecnology,#news
[30] state,emergency
[28] cyberdomain,#cybersecurity
[28] #cybersecurity,#hacker
[18] declares,state

Top Word Pairs in Tweet in G5:
[37] gt,gt
[28] #cybersecurity,#infosec
[27] #cybersecurity,#cyberattack
[24] #pcexpander,#cybernews
[24] #cybernews,#nonstopnews
[24] #nonstopnews,#cybersecurity
[21] #cyberattack,#tecnology
[21] #tecnology,#news
[16] #infosec,#cybersecurity
[16] cyber,security

Top Word Pairs in Tweet in G6:
[50] videogames,cybersecurity
[50] cybersecurity,teaching
[44] cyber,security
[33] 5m,videogames
[28] abertayuni's,5m
[22] economy,secretary
[22] secretary,derekmackaysnp
[22] derekmackaysnp,officially
[22] officially,opened
[22] opened,abertayuni's

Top Word Pairs in Tweet in G7:
[36] #cybersecurity,#databreach
[29] gt,gt
[29] cyber,security
[22] #databreach,#hackers
[22] #infosec,reach2ratan
[22] reach2ratan,#ai
[22] #ai,#ml
[22] #cloudsecurity,#machinelearning
[22] #blockchain,#dataprotection
[22] #dataprotection,#privacy

Top Word Pairs in Tweet in G8:
[10] #yourmustread,#influencerpromotion
[10] #influencerpromotion,#topcasestudy
[8] ai_miami,peterleah18
[8] #influencers,#influencermarketing
[7] #topcasestudy,#cybersecurity
[7] itakethelead,365surmarius
[7] 365surmarius,themrblueprint
[7] themrblueprint,mrkmrkmoh
[7] mrkmrkmoh,mariussou
[7] mariussou,kiyotaka_1991

Top Word Pairs in Tweet in G9:
[56] dr,omkar_raii
[56] omkar_raii,dg
[56] dg,#stpiindia
[56] #stpiindia,esteemed
[56] esteemed,keynote
[56] keynote,speaker
[56] speaker,address
[56] address,inaugural
[56] inaugural,session
[56] session,cii

Top Word Pairs in Tweet in G10:
[20] web,tools
[20] tools,pentesters
[20] pentesters,security
[20] security,researchers
[20] researchers,ssl
[20] ssl,security
[20] security,headers
[20] headers,web
[20] web,linters
[20] linters,dns

Top Replied-To
Top Replied-To in Entire Graph:
@symantec
@radiofreetom
@_____yo_____yo
@fsecure
@cioonline
@influencerprom1
@tspverlag
@grazytgrazynatt
@abertayuni
@officialmcafee

Top Replied-To in G2:
@hazloe3
@alvinfoo

Top Replied-To in G3:
@symantec
@cioonline
@officialmcafee
@sarahkendzior
@cybersecurityn8
@sectest9
@radiofreetom
@mcafee
@wired

Top Replied-To in G4:
@fsecure
@dragonwolftech
@otf_techween
@rvp
@fifonetworks
@gaby_dreo
@itauthorities
@attn_solutions

Top Replied-To in G5:
@ryanafournier

Top Replied-To in G6:
@abertayuni
@networkworld
@cybersecupdate

Top Replied-To in G7:
@spectacularmag
@corixpartners

Top Replied-To in G8:
@_____yo_____yo
@influencerprom1
@grazytgrazynatt
@sumawun
@_____yoyo

Top Replied-To in G10:
@charles_klaus

Top Mentioned
Top Mentioned in Entire Graph:
@mikequindazzi
@fisher85m
@kaspersky
@reach2ratan
@cioonline
@bitdefender
@omkar_raii
@thehackersnews
@stpiindia
@trimstray

Top Mentioned in G1:
@techopcode
@samirsali13
@sarah_pndj
@isms_online
@sslsecurity
@stepcoding
@analyst_infosec
@knolinfos

Top Mentioned in G2:
@mikequindazzi
@fisher85m
@archonsec
@paula_piccard
@antgrasso
@ronald_vanloon
@evankirstel
@wef
@ncsc
@albertogaruccio

Top Mentioned in G3:
@kaspersky
@cioonline
@thehackersnews
@eset
@bitdefender
@avgfree
@joeclark947
@cisco
@avast_antivirus
@malwarebytes

Top Mentioned in G4:
@cyberdomain
@pcexpander
@phishfindr
@yourxss
@joeclark947
@cybersecboardrm
@kaspersky
@bitdefender
@javier_carriazo
@fisher85m

Top Mentioned in G5:
@bitdefender
@helpnetsecurity
@joeclark947
@harvardbiz
@cioonline
@kaspersky
@cyberstartupobs
@cyberdomain
@python29501
@nimbushosting

Top Mentioned in G6:
@abertayuni
@derekmackaysnp
@scotgoveconomy
@gate_15_analyst
@r_demidchuk
@dailymailceleb
@ficci_india
@scotfundcouncil
@comptia
@csecurityalerts

Top Mentioned in G7:
@reach2ratan
@qavalley
@corix_jc
@cyberdefence24
@transform_sec
@divergentcio
@yourxss
@netsecu
@ciowatercooler
@corixpartners

Top Mentioned in G8:
@grazytgrazynatt
@influencerprom1
@itakethelead
@cynthia_lardner
@kiyotaka_1991
@vipeurope5
@heroldbarton
@ai_miami
@peterleah18
@srinualme

Top Mentioned in G9:
@omkar_raii
@stpiindia
@ibm
@goi_meity
@ciievents
@followcii

Top Mentioned in G10:
@trimstray
@hakin9
@machinelearnflx
@infosecuritymag
@redpacketsec
@pentestmag
@philmuncaster
@ncsc
@scmagazineuk
@cyberexpertsng

Top Tweeters
Top Tweeters in Entire Graph:
@pulpnews
@tomthunkitsmind
@easy_branches
@sectest9
@paoloigna1
@ns_online
@chris_1791
@cyberdomain
@crewislife
@cybertoolsbooks

Top Tweeters in G1:
@pulpnews
@defendressofsan
@raybae689
@billm9
@startupnws
@it_securitynews
@new_narrative
@quorumcall
@greeenorg
@resistmovetrm

Top Tweeters in G2:
@evankirstel
@itknowingness
@lelkan
@mashable
@akwyz
@time
@nomoreslaves
@andrewmorrisuk
@gvalan
@elianatrue

Top Tweeters in G3:
@sectest9
@cyberdomain
@techl0g
@csa_dvillamizar
@thedailybeast
@538355
@cybertaters
@zdnet
@mmckoy
@shatarup_

Top Tweeters in G4:
@paoloigna1
@ns_online
@rvp
@iam__network
@cybersec_feeds
@sherbah46958042
@pcexpander
@malikanura876
@tonyrobinsonobe
@jhaamit91

Top Tweeters in G5:
@ottlegalrebels
@nbcnews
@xaelbot
@engadget
@googleplay
@sfbusinesstimes
@valuewalk
@mineraldoc
@thinksnews
@jamescali3

Top Tweeters in G6:
@webironbots
@chidambara09
@tighnacoille
@1gkh
@skuemy
@inc
@weecass1888
@cabbidges
@katenasser
@akdm_bot

Top Tweeters in G7:
@netsecu
@techjunkiejh
@gorsefires
@amritabhinder
@ceektechnology
@jamesvgingerich
@r8uzz
@xzpwedvhhh37i3c
@rtehrani
@jayeshmthakur

Top Tweeters in G8:
@easy_branches
@jilliemary
@stevekrohn
@drjimmystar
@datsyuklover
@glaveanton
@wanderingstarz1
@papaporter1
@srinualme
@janankerstjerne

Top Tweeters in G9:
@ravi_sc_stpi
@followcii
@stpiindia
@ciievents
@prajwal0013
@omkar_raii
@goi_meity
@amollakras
@purshi_18
@ibm

Top Tweeters in G10:
@machinelearnflx
@rdsweb
@atsen_
@bbddpp
@cabal0
@yogeshbang
@metacurity
@infosecuritymag
@automeme
@scmagazineuk


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.