(Cyber Security) OR Cybersecurity, Twitter, 7/28/2020 2:01:42 PM, 231225


FAQ | Problem?

(Cyber Security) OR Cybersecurity_2020-07-27_23-26-45.xlsx
(Cyber Security) OR Cybersecurity_2020-07-27_23-26-45.xlsx
From:
NodeXLExcelAutomator
Uploaded on:
July 28, 2020
Short Description:
(Cyber Security) OR Cybersecurity via NodeXL https://bit.ly/39ycOXG
@websecurityit
@secburo
@cyb3rops
@cioamaro
@developersbot
@hakin9
@ottlegalrebels
@fabriziobustama
@cybazesocial
@jayeshmthakur

Top hashtags:
#cybersecurity
#infosec
#datascience
#security
#iot

Description:
Description
The graph represents a network of 4,206 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 28 July 2020 at 06:36 UTC.

The requested start date was Tuesday, 28 July 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 5-hour, 44-minute period from Sunday, 26 July 2020 at 00:45 UTC to Monday, 27 July 2020 at 06:29 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4206
Unique Edges : 2858
Edges With Duplicates : 8532
Total Edges : 11390
Number of Edge Types : 5
Tweet : 1606
Retweet : 3423
MentionsInRetweet : 4360
Mentions : 1861
Replies to : 140
Self-Loops : 1700
Reciprocated Vertex Pair Ratio : 0.0194059405940594
Reciprocated Edge Ratio : 0.0380730380730381
Connected Components : 864
Single-Vertex Connected Components : 472
Maximum Vertices in a Connected Component : 2275
Maximum Edges in a Connected Component : 8488
Maximum Geodesic Distance (Diameter) : 17
Average Geodesic Distance : 5.208909
Graph Density : 0.000291073903256941
Modularity : 0.428308
NodeXL Version : 1.0.1.439
Data Import : The graph represents a network of 4,206 Twitter users whose tweets in the requested range contained "(Cyber Security) OR Cybersecurity", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Tuesday, 28 July 2020 at 06:36 UTC.

The requested start date was Tuesday, 28 July 2020 at 00:01 UTC and the maximum number of days (going backward) was 14.

The maximum number of tweets collected was 5,000.

The tweets in the network were tweeted over the 1-day, 5-hour, 44-minute period from Sunday, 26 July 2020 at 00:45 UTC to Monday, 27 July 2020 at 06:29 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : GraphServerTwitterSearch
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[124] https://cypressdatadefense.com/blog/benefits-of-outsourcing-security-services/
[69] https://cypressdatadefense.com/blog/devops-challenges-and-solutions/
[32] https://hakin9.org/dnsteal-dns-exfiltration-tool-for-stealthily-sending-files-over-dns-requests/
[27] https://cypressdatadefense.com/blog/cloud-computing-security-vulnerabilities/
[26] https://cypressdatadefense.com/blog/mobile-app-security-risks/
[25] https://krebsonsecurity.com/2020/07/thinking-of-a-cybersecurity-career-read-this/
[24] https://thehill.com/policy/cybersecurity/509098-mcconnell-rubio-defend-senior-intel-official-over-remarks-on-election
[21] https://freebeacon.com/national-security/chinese-officials-at-houston-consulate-engaged-in-espionage-and-cyber-theft-senior-officials-say/
[17] https://www.theverge.com/2020/7/26/21339451/voting-local-election-email-phishing-trump-biden-cybersecurity?utm_source=dlvr.it&utm_medium=twitter
[15] https://www.smallcapvoice.com/9-18-19-smallcapvoice-interview-iiot-oxys-itox/

Top URLs in Tweet in G1:
[124] https://cypressdatadefense.com/blog/benefits-of-outsourcing-security-services/
[62] https://cypressdatadefense.com/blog/devops-challenges-and-solutions/
[26] https://cypressdatadefense.com/blog/cloud-computing-security-vulnerabilities/
[25] https://cypressdatadefense.com/blog/mobile-app-security-risks/
[14] https://cypressdatadefense.com/blog/cybersecurity-risks/
[12] https://johannesdrooghaag.com/
[12] https://cypressdatadefense.com/blog/mobile-app-security-vulnerabilities-and-how-to-mitigate-them-infographic/
[10] https://www.bankinfosecurity.com/could-large-scale-iiot-failures-be-on-horizon-a-14686#.Xxz5YL2PbHw.twitter
[9] https://www.youtube.com/ShiraRubinoffTV
[9] https://www.forbes.com/sites/louiscolumbus/2020/06/30/5-mistakes-that-threaten-infrastructure-cybersecurity-and-resilience/#2296db735089

Top URLs in Tweet in G2:
[16] https://www.theverge.com/2020/7/26/21339451/voting-local-election-email-phishing-trump-biden-cybersecurity?utm_source=dlvr.it&utm_medium=twitter
[11] https://mashable.com/uk/shopping/july-26-cybersecurity-bundle/?utm_source=dlvr.it&utm_medium=twitter
[10] https://krebsonsecurity.com/2020/07/thinking-of-a-cybersecurity-career-read-this/
[7] https://thehill.com/policy/cybersecurity/509098-mcconnell-rubio-defend-senior-intel-official-over-remarks-on-election
[6] https://ltauditor.com/splunk/
[5] https://mashable.com/uk/shopping/july-26-cybersecurity-bundle/
[3] https://www.zdnet.com/article/garmins-outage-ransomware-attack-response-lacking-as-earnings-loom/
[3] https://mashable.com/uk/shopping/july-26-cybersecurity-bundle/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Mashable+%28Mashable%29
[3] https://augustafreepress.com/virginia-cyber-ranges-annual-cybersecurity-education-conference-goes-virtual/
[3] https://www.theverge.com/2020/7/26/21339451/voting-local-election-email-phishing-trump-biden-cybersecurity

Top URLs in Tweet in G3:
[6] https://www.mattysparadigm.org/biblios-blood/hell-computers/
[6] https://twitter.com/aneeshnair/status/1287219601982586882
[5] https://cctvbuyersguide.com/2020/07/chinachem-and-scc-sign-mou-to-foster-smart-city-development-and-cybersecurity-standards/
[5] https://thethreatreport.com/how-to-protect-yourself-from-ransomware/
[5] https://www.ehackingnews.com/2020/07/gothic-panda-and-stone-panda-chinese.html
[5] https://www.csoonline.com/article/3245748/what-is-devsecops-developing-more-secure-applications.html?utm_campaign=organic&utm_medium=social&utm_content=content&utm_source=twitter
[5] https://www.csoonline.com/article/3390221/microsoft-office-now-the-most-targeted-platform-as-browser-security-improves.html?utm_content=content&utm_campaign=organic&utm_source=twitter&utm_medium=social
[5] https://twitter.com/aneeshnair/status/1287578622887440384
[4] https://yourstory.com/2020/07/aristi-labs-wijungle-lucideous-top-indian-cybersecurity-startups
[4] https://medium.com/@vinsloev/cybersecurity-101-what-is-a-honeypot-c6b721b401b8?source=rss------cybersecurity-5

Top URLs in Tweet in G4:
[18] https://hakin9.org/dnsteal-dns-exfiltration-tool-for-stealthily-sending-files-over-dns-requests/
[8] https://hakin9.org/pypykatz-mimikatz-implementation-in-pure-python/
[6] https://www.smallcapvoice.com/9-18-19-smallcapvoice-interview-iiot-oxys-itox/
[6] https://tiny.cc/y2tqjz
[6] https://medium.com/@ReversingMagic/zero2automated-advanced-malware-re-course-custom-sample-analysis-40e14ddca78d
[5] https://myhackertech.com/collections/courses
[5] http://pwnable.kr
[5] https://www.taintedbits.com/2020/04/28/linux-binary-exploitation-series-with-pwnable-kr/
[4] https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools
[4] https://medium.com/s/story/cybersecurity-isnt-just-about-hacks-f11c7ad07660

Top URLs in Tweet in G5:
[2] https://tweetedtimes.com/v/18466?s=rgp
[2] https://tweetedtimes.com/v/18466?s=tnp
[1] https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware
[1] https://secalerts.co/article/the-week-in-cyber-security-news-july-20---26/ed1d0242
[1] https://twitter.com/monicalewinsky/status/1286787059026292736
[1] https://medium.com/@ReversingMagic/zero2automated-advanced-malware-re-course-custom-sample-analysis-40e14ddca78d

Top URLs in Tweet in G6:
[8] https://phishstats.info/
[4] https://www.informationsecuritybuzz.com/expert-comments/experts-reaction-on-university-of-york-hit-by-serious-data-breach/
[4] https://www.embedthis.com/blog/posts/stories/iot-developer-security-checklist.html
[4] https://amp.elperiodico.cat/ca/economia/20200726/avantatges-desavantatges-teletreball-8044572
[4] https://www.ccma.cat/324/els-dispositius-garmin-quatre-dies-fora-de-joc-per-un-possible-atac-informatic/noticia-amp/3039189/
[4] https://objectsecurity.com/afwerxshowcase
[3] https://www.nytimes.com/2020/07/23/us/politics/dji-drones-security-vulnerability.html?smid=tw-share
[3] https://twitter.com/DGPMaharashtra/status/1286876959763398657
[3] https://www.zdnet.com/article/kingminer-botnet-brute-forces-mssql-databases-to-install-cryptocurrency-miner/
[2] https://www.informationsecuritybuzz.com/expert-comments/expert-reacton-on-privacy-flaws-in-south-korea-quarantine-app/

Top URLs in Tweet in G7:
[6] https://www.infosecurity-magazine.com/news/cisos-cyber-insurance-cover/?utm_source=dlvr.it&utm_medium=twitter
[6] https://www.infosecurity-magazine.com/news/home-working-cybersecurity-hiring/?utm_source=dlvr.it&utm_medium=twitter
[5] https://www.csoonline.com/article/3390221/microsoft-office-now-the-most-targeted-platform-as-browser-security-improves.html?utm_source=dlvr.it&utm_medium=twitter#tk.rss_all
[5] https://www.infosecurity-magazine.com/news/garmin-outage-could-ground/?utm_source=dlvr.it&utm_medium=twitter
[5] https://blog.eccouncil.org/an-introduction-to-network-traffic-monitoring/
[4] https://threatpost.com/asus-home-router-bugs-snooping-attacks/157682/?utm_source=dlvr.it&utm_medium=twitter
[4] https://threatpost.com/cisco-zoom-and-others-must-bolster-security-say-privacy-chiefs/157662/?utm_source=dlvr.it&utm_medium=twitter
[4] https://www.infosecurity-magazine.com/news/cloud-misconfigurations-compliance/?utm_source=dlvr.it&utm_medium=twitter
[4] https://securityaffairs.co/wordpress/106267/apt/mata-multi-platform-malware-framework.html?utm_source=dlvr.it&utm_medium=twitter&utm_campaign=mata-multi-platform-malware-framework
[4] https://www.infosecurity-magazine.com/news/blackbaud-breach-hits-nine-more/?utm_source=dlvr.it&utm_medium=twitter

Top URLs in Tweet in G8:
[6] https://www.hackers-arise.com/cryptography-basics
[6] https://github.com/projectdiscovery/nuclei-templates
[4] https://twitter.com/three_cube/status/1287177812554604544
[4] https://krebsonsecurity.com/2020/07/thinking-of-a-cybersecurity-career-read-this/
[3] https://www.hackers-arise.com/post/wi-fi-hacking-anatomy-of-wi-fi-frames-for-hackers
[2] https://twitter.com/hackerfantastic/status/1287558697405816834
[2] https://www.hackers-arise.com/post/2016/05/23/getting-started-with-kali-linux
[2] https://www.hackers-arise.com/osint
[2] https://hakin9.org/the-lazy-script-will-make-your-life-easier-and-of-course-faster/
[2] http://www.helpnet.pro/sjk7

Top URLs in Tweet in G9:
[4] https://www.forbes.com/sites/forbestechcouncil/2020/06/15/kubernetes-and-disaggregated-storage-a-perfect-match/#6c3b9bfd4677
[3] https://cypressdatadefense.com/blog/devops-challenges-and-solutions/
[3] https://www.himss.org/resources/foundational-cybersecurity-fundamentals-securing-your-environment-webinar?utm_source=twitter&utm_medium=social&utm_campaign=webinar
[3] https://sans.org/u/16c4
[2] https://www.technative.io/are-we-at-the-tipping-point-for-global-biometric-payment-card-adoption/
[2] https://www.forbes.com/sites/forbestechcouncil/2020/06/16/ensuring-the-trust-of-mobile-devices-and-applications-through-containerization/#1644c13fd8c6
[2] https://www.forbes.com/sites/forbestechcouncil/2020/06/12/rethinking-encryption-to-enhance-security-and-utility/#417fce7c73be
[2] https://www.forbes.com/sites/forbestechcouncil/2020/06/17/the-importance-of-digital-workplace-security/#6ac2e06c400f
[2] https://www.forbes.com/sites/forbestechcouncil/2020/07/21/whats-under-the-hood-of-api-security/?utm_source=rss&utm_medium=Sendible&utm_campaign=RSS#74b8215454d9
[2] https://www.sdxcentral.com/networking/sd-wan/definitions/sase-vs-sd-wan-a-comparison/?hit=1718a5e2-31bd-4b4e-8414-e4004db2ed2b

Top URLs in Tweet in G10:
[4] https://4sysops.com/archives/admx-download-for-windows-10-2004-gpo-settings-reference-spreadsheet/
[4] https://twitter.com/rexchapman/status/1287561714242924545
[2] https://hakin9.org/browser-canvas-fingerprinting-a-sneaky-way-to-track-website-visitors/
[2] https://www.colorado-security.com/security-events/2020/8/13/secureset-cybersecurity-capture-the-flag-for-all-levels-813
[1] https://www.sans.org/webcasts/social-engineering-success-114220
[1] https://krebsonsecurity.com/2020/07/thinking-of-a-cybersecurity-career-read-this/#more-52199
[1] https://howto.thec2matrix.com/
[1] https://virtualseccons.org
[1] https://bit.ly/3jEefbW
[1] https://twitter.com/cyriseco/status/1287616452627853312

Top Domains
Top Domains in Tweet in Entire Graph:
[278] cypressdatadefense.com
[143] twitter.com
[89] hakin9.org
[73] linkedin.com
[72] forbes.com
[53] zdnet.com
[52] thehill.com
[50] infosecurity-magazine.com
[46] youtube.com
[36] theverge.com

Top Domains in Tweet in G1:
[269] cypressdatadefense.com
[29] forbes.com
[16] youtube.com
[15] zdnet.com
[14] twitter.com
[14] hakin9.org
[12] johannesdrooghaag.com
[12] bankinfosecurity.com
[11] bleepingcomputer.com
[11] 5stocksinto.com

Top Domains in Tweet in G2:
[35] linkedin.com
[26] twitter.com
[21] mashable.com
[19] theverge.com
[13] dlvr.it
[12] cybersecurity-jp.com
[12] thehill.com
[12] google.com
[11] krebsonsecurity.com
[9] blogspot.com

Top Domains in Tweet in G3:
[21] twitter.com
[11] nationalcybersecuritynews.today
[10] csoonline.com
[7] linkedin.com
[7] mattysparadigm.org
[7] ehackingnews.com
[6] hakin9.org
[5] cctvbuyersguide.com
[5] thethreatreport.com
[5] keepnetlabs.com

Top Domains in Tweet in G4:
[52] hakin9.org
[19] iammarketingmedia.com
[15] twitter.com
[12] medium.com
[10] studynotesandtheory.com
[8] github.com
[6] smallcapvoice.com
[6] tiny.cc
[5] myhackertech.com
[5] pwnable.kr

Top Domains in Tweet in G5:
[4] tweetedtimes.com
[1] ted.com
[1] secalerts.co
[1] twitter.com
[1] medium.com

Top Domains in Tweet in G6:
[14] informationsecuritybuzz.com
[8] phishstats.info
[7] embedthis.com
[7] youtube.com
[5] twitter.com
[4] zdnet.com
[4] elperiodico.cat
[4] ccma.cat
[4] nytimes.com
[4] linkedin.com

Top Domains in Tweet in G7:
[30] infosecurity-magazine.com
[18] securityaffairs.co
[16] threatpost.com
[11] darkreading.com
[9] zdnet.com
[7] csoonline.com
[6] eccouncil.org
[5] grahamcluley.com
[5] hackread.com
[4] forbes.com

Top Domains in Tweet in G8:
[18] hackers-arise.com
[7] twitter.com
[7] hakin9.org
[7] github.com
[5] krebsonsecurity.com
[4] helpnetsecurity.com
[3] linkedin.com
[3] tripwire.com
[2] infosecurity-magazine.com
[2] helpnet.pro

Top Domains in Tweet in G9:
[17] forbes.com
[8] himss.org
[7] sans.org
[3] twitter.com
[3] technative.io
[3] bit.ly
[3] cypressdatadefense.com
[2] sdxcentral.com
[2] opendatascience.com
[2] healthcareitnews.com

Top Domains in Tweet in G10:
[6] twitter.com
[4] 4sysops.com
[2] hakin9.org
[2] colorado-security.com
[1] sans.org
[1] krebsonsecurity.com
[1] thec2matrix.com
[1] virtualseccons.org
[1] bit.ly

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[2513] cybersecurity
[880] infosec
[381] datascience
[359] security
[280] iot
[239] hacking
[223] malware
[200] hackers
[193] analytics
[179] bigdata



Top Hashtags in Tweet in G1:
[492] cybersecurity
[317] datascience
[173] analytics
[125] artificialintelligence
[122] iot
[114] infosec
[107] ai
[101] bigdata
[84] security
[75] fintech

Top Hashtags in Tweet in G2:
[231] cybersecurity
[33] infosec
[29] security
[17] cyber
[13] tech
[11] dataprotection
[11] iot
[9] technology
[9] hacking
[9] threatintelligence

Top Hashtags in Tweet in G3:
[300] cybersecurity
[130] infosec
[66] ransomware
[61] malware
[57] security
[32] databreach
[24] hacking
[23] cybercrime
[22] cyberattack
[21] ciso

Top Hashtags in Tweet in G4:
[290] cybersecurity
[212] infosec
[119] python
[109] hacking
[88] javascript
[80] iot
[69] programming
[68] 100daysofcode
[67] reactjs
[64] rstats

Top Hashtags in Tweet in G5:
[4] cybersecurity
[1] infosec
[1] malware

Top Hashtags in Tweet in G6:
[141] cybersecurity
[60] infosec
[26] malware
[21] security
[18] isdots
[15] phishing
[13] cyberattack
[12] iot
[12] ransomware
[11] databreach

Top Hashtags in Tweet in G7:
[201] cybersecurity
[100] infosec
[79] digital
[72] hackers
[32] malware
[29] cloud
[29] cloudsecurity
[29] privacy
[27] dataprotection
[21] security

Top Hashtags in Tweet in G8:
[110] cybersecurity
[23] infosec
[21] googlehacking
[21] webcams
[17] cyberwarrior
[16] iot
[15] infosecurity
[13] osint
[11] hackers
[11] wifi

Top Hashtags in Tweet in G9:
[71] cybersecurity
[16] security
[12] healthit
[9] cyber
[9] infosec
[8] cybersécurité
[8] data
[7] devsecops
[6] privacy
[6] cybercrime

Top Hashtags in Tweet in G10:
[38] cybersecurity
[12] infosec
[4] windows10
[2] ransomware
[2] wastedlocker
[2] infographic
[2] python
[2] osint
[2] forensics
[2] bugbounty

Top Words
Top Words in Tweet in Entire Graph:
[2513] #cybersecurity
[1394] security
[1033] cyber
[880] cybersecurity
[880] #infosec
[381] #datascience
[361] more
[359] #security
[279] #iot
[243] top

Top Words in Tweet in G1:
[492] #cybersecurity
[317] #datascience
[250] security
[173] #analytics
[153] gt
[148] top
[128] services
[125] #artificialintelligence
[124] benefits
[124] outsourcing

Top Words in Tweet in G2:
[231] #cybersecurity
[175] cybersecurity
[175] security
[152] cyber
[42] career
[40] more
[38] data
[33] #infosec
[31] election
[29] #security

Top Words in Tweet in G3:
[300] #cybersecurity
[130] #infosec
[69] cybersecurity
[66] #ransomware
[61] #malware
[57] #security
[56] security
[44] more
[41] cyber
[32] #databreach

Top Words in Tweet in G4:
[290] #cybersecurity
[212] #infosec
[119] #python
[109] #hacking
[88] #javascript
[80] #iot
[80] hakin9
[69] #programming
[68] #100daysofcode
[67] #reactjs

Top Words in Tweet in G5:
[176] cyber
[176] security
[174] cyb3rops
[174] apply
[4] google
[4] #cybersecurity
[4] 7gtech
[3] news
[3] id
[2] many

Top Words in Tweet in G6:
[141] #cybersecurity
[60] #infosec
[39] security
[30] garmin
[29] more
[28] cyber
[26] #malware
[23] cybersecurity
[22] data
[21] #security

Top Words in Tweet in G7:
[201] #cybersecurity
[100] #infosec
[95] reach2ratan
[79] #digital
[72] #hackers
[71] security
[37] australian
[33] cloud
[32] #malware
[30] home

Top Words in Tweet in G8:
[110] #cybersecurity
[54] three_cube
[48] hacking
[39] intelligence
[33] osint
[32] cybersecurity
[30] open
[30] source
[24] google
[24] briankrebs

Top Words in Tweet in G9:
[71] #cybersecurity
[38] co
[38] hubbucket
[32] prosumersoft
[20] hubprojects
[19] hubaccess
[17] hubdevops
[17] hubdataops
[16] #security
[16] hubiomt

Top Words in Tweet in G10:
[56] cybersecurity
[44] jorgeorchilles
[43] hands
[43] skills
[43] important
[43] little
[43] budget
[38] #cybersecurity
[32] virtual
[32] more

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[677] cyber,security
[324] #cybersecurity,#infosec
[183] #infosec,#cybersecurity
[178] apply,cyber
[177] cyb3rops,apply
[136] #datascience,#analytics
[131] security,services
[124] top,benefits
[124] benefits,outsourcing
[124] outsourcing,security

Top Word Pairs in Tweet in G1:
[136] #datascience,#analytics
[125] security,services
[124] top,benefits
[124] benefits,outsourcing
[124] outsourcing,security
[124] services,#datascience
[94] #datascience,#artificialintelligence
[92] gt,gt
[68] #analytics,#startu
[65] #analytics,#startups

Top Word Pairs in Tweet in G2:
[100] cyber,security
[23] crash,course
[23] course,cybersecurity
[23] cybersecurity,kickstart
[23] kickstart,career
[20] risk,phishing
[20] election,officials
[19] report,suggests
[19] suggests,local
[19] local,election

Top Word Pairs in Tweet in G3:
[37] #cybersecurity,#infosec
[36] #infosec,#cybersecurity
[20] #ransomware,#malware
[17] cyber,security
[17] #microsoft,office
[17] office,files
[17] files,more
[17] more,popular
[17] popular,pdfs
[17] pdfs,deliver

Top Word Pairs in Tweet in G4:
[73] #cybersecurity,#infosec
[61] #python,#rstats
[53] #infosec,#hacking
[50] #infosec,#cybersecurity
[50] #infosec,#riskmanagement
[50] #riskmanagement,#encryption
[50] #encryption,#iot
[42] #iot,#twitter
[41] #java,#javascript
[40] #rstats,#java

Top Word Pairs in Tweet in G5:
[176] cyber,security
[174] apply,cyber
[173] cyb3rops,apply
[2] many,owe
[2] owe,success
[2] success,google
[2] google,thank
[2] thank,google
[2] google,made
[2] made,gathering

Top Word Pairs in Tweet in G6:
[32] #infosec,#cybersecurity
[19] cyber,security
[18] #isdots,#infosec
[16] more,visit
[15] #cybersecurity,#infosec
[14] visit,website
[10] #cybersecurity,find
[10] find,more
[10] ransomware,attack
[9] #security,#cybersecurity

Top Word Pairs in Tweet in G7:
[79] #cybersecurity,#digital
[64] #digital,#hackers
[40] #hackers,#infosec
[33] #infosec,reach2ratan
[28] reach2ratan,#malware
[27] #malware,#cloud
[27] #cloud,#cloudsecurity
[27] #cloudsecurity,#dataprotection
[27] #dataprotection,#privacy
[27] #privacy,#infosec

Top Word Pairs in Tweet in G8:
[30] open,source
[30] source,intelligence
[30] intelligence,osint
[22] wi,fi
[21] osint,finding
[21] finding,unsecured
[21] unsecured,web
[21] web,cams
[21] cams,google
[21] google,hacking

Top Word Pairs in Tweet in G9:
[23] hubbucket,prosumersoft
[19] hubprojects,hubaccess
[16] prosumersoft,hubprojects
[14] hubdevops,hubdataops
[13] hubaccess,hubdevops
[10] #cybersecurity,co
[9] hubiomt,hubbucketedge
[7] #cybersecurity,#security
[7] hubfabric,hubfunctions
[6] tweet,#cybersecurity

Top Word Pairs in Tweet in G10:
[43] cybersecurity,hands
[43] hands,skills
[43] skills,important
[43] important,little
[43] little,budget
[42] jorgeorchilles,cybersecurity
[29] added,more
[29] more,#cybersecurity
[29] #cybersecurity,virtual
[29] virtual,conferences

Top Replied-To
Top Replied-To in Entire Graph:
@garmin
@wired
@realdonaldtrump
@cioonline
@quan3solid
@troyhunt
@audi0phreak
@preppygardener
@sethabramson
@ebotayuk

Top Replied-To in G1:
@cybersecboardrm

Top Replied-To in G3:
@fbi
@financematt7

Top Replied-To in G4:
@ebotayuk

Top Replied-To in G6:
@garmin
@treymeans3
@bigoran14467189
@markmccubbin
@carryontrio

Top Replied-To in G7:
@cybergovau
@eco_cells

Top Replied-To in G8:
@briankrebs

Top Replied-To in G9:
@troyhunt

Top Replied-To in G10:
@jorgeorchilles

Top Mentioned
Top Mentioned in Entire Graph:
@cyb3rops
@hakin9
@secburo
@reach2ratan
@cioamaro
@mikequindazzi
@salahhasoneh1
@three_cube
@hacktechheaven
@datasciencebot_

Top Mentioned in G1:
@secburo
@mikequindazzi
@datasciencebot_
@joywinter90
@antgrasso
@fisher85m
@paula_piccard
@avrohomg
@krititiwari10
@fabriziobustama

Top Mentioned in G2:
@dataprivacyfeed
@theblaregroup
@ericwright0
@fintechzoom
@safeselfdrive
@alisterbrenton
@taylorbanks
@hostingjournal

Top Mentioned in G3:
@aneeshnair
@cioamaro
@bamitav
@jeffryanpeters
@hakin9
@pwc
@secburo
@keepnetlabs
@evankirstel
@owasp

Top Mentioned in G4:
@hakin9
@coding_monkeys
@cioamaro
@hacktechheaven
@ptracesecurity
@tht_resmi
@ebotayuk
@fisheyeboxindia
@fisheyeboxlab
@pinakilaskar

Top Mentioned in G5:
@cyb3rops
@7gtech
@ptracesecurity
@5m477

Top Mentioned in G6:
@garmin
@youtube
@lighteyesnews
@aushcindia
@vteagueaus
@phishstats
@embedthat
@shravans821
@acronis
@ankura_consult

Top Mentioned in G7:
@reach2ratan
@cybergovau
@georgewillems1
@dta
@ritupaghosh
@bviseeon
@talk_cyber
@goldnsilica
@eccouncil
@cybersecboardrm

Top Mentioned in G8:
@three_cube
@briankrebs
@hakin9
@liontarakos
@pdnuclei
@shirastweet
@mimproxyble
@dmbisson
@cymune_inc
@qualys

Top Mentioned in G9:
@hubbucket
@prosumersoft
@hubprojects
@hubaccess
@hubdevops
@hubdataops
@hubiomt
@hubbucketedge
@hubbucketmobile
@rustysowers

Top Mentioned in G10:
@jorgeorchilles
@santosomar
@nicoleperlroth
@hakin9
@shad0wintel
@cybergovau
@jasonfossen
@aboutsecurity
@malware_r
@cioamaro

Top Tweeters
Top Tweeters in Entire Graph:
@informacija
@the_news_diva
@sectest9
@raizmakmur
@cyberdomain
@chidambara09
@evankirstel
@aaroncuddeback
@dancas2
@sudeepkhatri

Top Tweeters in G1:
@chidambara09
@alizardx
@rvp
@amazingchevvolt
@andrewmorrisuk
@marshacollier
@ronsupportsyou
@akwyz
@shicooks
@gvalan

Top Tweeters in G2:
@raizmakmur
@dancas2
@lucas_wyrsch
@olufemiadelaja
@peopleempr
@netsecu
@chahali
@suriyasubraman
@webnowcompany
@legalanalysis

Top Tweeters in G3:
@evankirstel
@ottlegalrebels
@websecurityit
@josjosmar59
@book_reviewz
@henryleerhenry
@ibtimes
@engadget
@rtehrani
@semmoneglynn

Top Tweeters in G4:
@aaroncuddeback
@iam__network
@femtech_
@calcaware
@sharerussharing
@learn__together
@serverlessfan
@ham_gretsky
@tediscript
@womencodersbot

Top Tweeters in G5:
@francodespecho
@gwinniejones
@kittylesiren
@suki3hunna
@mikanojo
@olusegunfadipe2
@jtkmkr1
@opexxx
@teflonmask
@stem_nastics

Top Tweeters in G6:
@teamyoutube
@financialxpress
@stfuimtweetn0_o
@techjunkiejh
@rdsweb
@gdpr25thmay18
@ichinadian
@gdprai
@christinayiotis
@iottogether

Top Tweeters in G7:
@sectest9
@it_securitynews
@lorettabower3
@adekleine
@markmilleritpro
@nicochan33
@politico
@newsanceandgg
@mig30m6
@securitynewsbot

Top Tweeters in G8:
@informacija
@1loriking
@samir_patil
@johnnyciocca
@parvez1
@albertan48
@techmeme
@hackerfantastic
@jnitterauer
@nikothedove

Top Tweeters in G9:
@rosenchild
@mailonline
@hubbucket
@digitaljournal
@benktallmadge
@hotspotshield
@ccprakay
@pythonista11
@troyhunt
@unix_guru

Top Tweeters in G10:
@kas_stoner
@weems
@diosecurity
@charlyaztec
@uradn
@crystalphinn
@valb00
@jc_vazquez
@kelikers
@wendygoliff


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.