NodeXL Graph Gallery: Interactive Graph


Donate to the Social Media Research Foundation's NodeXL development fund

cybersecurity min_retweets:3 Twitter NodeXL SNA Map and Report for Wednesday, 07 August 2019 at 17:4 (experimental version)
NOTE: This version of the graph is not available with the browser you are using. A more recent version of the browser is required.
Zoom in Zoom out Reset the graph
Go to the graph's main page

From:
Connected Action NodeXL-Reports
Uploaded on:
August 08, 2019
Short Description:
cybersecurity min_retweets:3 via NodeXL http://bit.ly/2MMFRxl
@fabriziobustama
@evankirstel
@dynamicciso
@archonsec
@grazytgrazynatt
@cyberspeaklc
@google
@defcon
@sputnikint
@realdonaldtrump

Top hashtags:
#cybersecurity
#infosec
#ai
#malware
#security
#iot

Description:
Description
The graph represents a network of 4,489 Twitter users whose recent tweets contained "cybersecurity min_retweets:3", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Wednesday, 07 August 2019 at 18:38 UTC.

The tweets in the network were tweeted over the 9-day, 4-hour, 39-minute period from Monday, 29 July 2019 at 12:58 UTC to Wednesday, 07 August 2019 at 17:37 UTC.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 4489
Unique Edges : 4625
Edges With Duplicates : 6747
Total Edges : 11372
Number of Edge Types : 3
Mentions : 8959
Tweet : 2244
Replies to : 169
Self-Loops : 2244
Reciprocated Vertex Pair Ratio : 0.0262697022767075
Reciprocated Edge Ratio : 0.0511945392491468
Connected Components : 1269
Single-Vertex Connected Components : 826
Maximum Vertices in a Connected Component : 2204
Maximum Edges in a Connected Component : 8982
Maximum Geodesic Distance (Diameter) : 19
Average Geodesic Distance : 6.001516
Graph Density : 0.000232693980810291
Modularity : 0.40437
NodeXL Version : 1.0.1.418

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[17] https://www.politico.com/story/2019/08/05/election-security-cybersecurity-1445539
[16] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[11] https://cyberstartupobservatory.com/
[10] https://thehill.com/policy/cybersecurity/455243-woman-arrested-for-hacking-tens-of-millions-of-capital-one-customer
[9] https://www.hackers-arise.com/osint
[8] https://www.cyberscoop.com/capital-one-cybersecurity-data-breach-what-went-wrong/
[8] https://twitter.com/womenknowcyber/lists/women-in-cybersecurity-1/members
[8] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/07/30/the-cybersecurity-202-mitch-mcconnell-just-ensured-election-security-will-be-key-senate-campaign-issue/5d3f697088e0fa1454f80005/
[8] https://cyberstartupobservatory.com/infographics/
[8] https://cyberstartupobservatory.com/download-observatory-us-third-edition/

Top URLs in Tweet in G1:
[16] https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-NEW-last-hour.txt
[6] https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/07/30/the-cybersecurity-202-mitch-mcconnell-just-ensured-election-security-will-be-key-senate-campaign-issue/5d3f697088e0fa1454f80005/
[6] http://www.reydes.com/d/?q=videos
[5] http://www.reydes.com/d/?q=videos_2018
[4] https://www.openideo.com/challenge-briefs/cybersecurity-visuals
[4] https://www.wsj.com/articles/russia-linked-buyout-firm-violates-deal-with-u-s-national-security-panel-to-sell-stake-11564479001
[4] https://pro.smu.edu/l/85762/2019-07-29/614hf8
[4] https://thehill.com/policy/cybersecurity/455993-lawsuit-filed-against-github-in-wake-of-capital-one-data-breach
[4] https://www.thedailybeast.com/trump-nominee-john-ratcliffes-ties-to-whistleblower-case-surfaced-as-officials-warned-against-him-for-dni
[4] https://www.santander.com/csgs/Satellite/CFWCSancomQP01/es_ES/Corporativo/Sala-de-comunicacion/Cybersecurity-Summer-Tips.html

Top URLs in Tweet in G2:
[11] https://cyberstartupobservatory.com/
[8] https://cyberstartupobservatory.com/infographics/
[8] https://cyberstartupobservatory.com/download-observatory-us-third-edition/
[6] https://new.siemens.com/global/en/company/topic-areas/digitalization/cybersecurity.html
[6] https://straighttalk.hcltech.com/sites/default/files/stinsights_tweetchat-_securing_the_unsecured_state_of_cybersecurity_2019_july_31st_at_10_00_a_m_edt.ics
[5] https://iiot-world.com/cybersecurity/cybersecurity-qa-with-abb/
[5] https://nodexlgraphgallery.org/Pages/Graph.aspx?graphID=205728
[5] https://cyberstartupobservatory.com/resources-cyberslide/
[5] http://www.uscybersecurity.net/subscribe/
[4] https://www.techradar.com/news/how-ai-can-support-cybersecurity-leaders

Top URLs in Tweet in G3:
[4] https://www.itspmagazine.com/itsp-chronicles/chats-on-the-road-to-hacker-summer-camp-2019-wicked6-games-competitors
[3] https://www.itspmagazine.com/company-directory/ncsa
[3] https://www.bugcrowd.com/event/black-hat-2019/?utm_source=ITSPmagazine&utm_medium=web&utm_campaign=eventcover
[3] http://www.itspmagazine.com/company-directory/reversinglabs
[2] https://dt-global.com/company/careers/australia
[2] https://www.itspmagazine.com/itsp-chronicles/an-infosec-life-a-conversation-with-chris-cochran
[2] https://soundcloud.com/itspmagazine/an-infosec-life-a-conversation-with-chris-cochran
[2] https://www.itspmagazine.com/itsp-chronicles/chats-on-the-road-to-hacker-summer-camp-2019-def-con-27-policymakers-a-conversation-with-meg-king-and-beau-woods
[2] https://www.itspmagazine.com/company-directory/bugcrowd
[2] https://www.itspmagazine.com/event-listings/

Top URLs in Tweet in G4:
[9] https://www.hackers-arise.com/osint
[6] https://www.hackers-arise.com/single-post/2018/05/11/The-Wisdom-of-Master-OTW
[5] https://www.hackers-arise.com/single-post/2017/02/17/Reverse-Engineering-Malware-Part-1-Getting-Started
[5] https://www.technologyreview.com/f/614022/a-light-sentence-for-a-famous-hacker-has-actually-made-the-world-safer/?utm_source=twitter&utm_medium=tr_social&utm_campaign=site_visitor.unpaid.engagement
[3] https://www.hackers-arise.com/single-post/2017/12/13/Mr-Robot-Hacks-Season-3-E9-How-Elliot-Traces-the-Dark-Army
[3] https://www.hackers-arise.com/single-post/2019/03/04/Network-Basics-for-Hackers-Server-Message-Block-SMB
[3] https://www.hackers-arise.com/scada-hacking
[3] https://www.youtube.com/cyberhubengage
[2] https://www.hackers-arise.com/single-post/2019/05/03/Open-Source-Intelligence-OSINT-Part-1-Mining-Intelligence-from-Twitter-mattgaetz
[2] https://www.hackers-arise.com/single-post/2018/03/22/SCADA-Hacking-Exploiting-SCADAICS-Systems-with-the-Command-Line-Tool-modbus-cli

Top URLs in Tweet in G5:
[5] https://view.joomag.com/cyberscape-africa-magazine-q2-2019/0724403001564646611?short
[2] https://www.gig.co.ke/events/223
[2] http://www.ekraal.org/program/incubation/apply
[2] https://emc.v-org.com/wp/conferences-workshops-other-events/
[2] https://www.kcsfa.co.ke/index.php/events-trainings/cybersecurity-training/register-for-august-training
[1] https://academy.microsoft.com/en-us/professional-program/tracks/cyber-security/
[1] https://twitter.com/Cc_HUB/status/1156160553573933057
[1] https://twitter.com/CyberInAfrica/status/1158306762707079168
[1] https://ledgerops.com/blog/how-hackers-can-profile-your-organization-using-osint/08/06/2019
[1] https://www.cybersecfill.com/cybersecurity-in-africa/

Top URLs in Tweet in G6:
[1] https://www.linkedin.com/pulse/create-good-energy-cr%C3%A9ez-une-bonne-%C3%A9nergie-tw%C3%B3rzcie-dobr%C4%85-gra%C5%BCyna-tt/
[1] https://www.linkedin.com/pulse/want-grow-exponentially-you-can-gra%C5%BCyna-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3B08d5lJgJT0mFgrn%2FYjGwTA%3D%3D
[1] https://www.linkedin.com/pulse/cybersecurity-begins-integrity-impressing-using-most-popular-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3BN0a13BSRSemQfhSPhh6%2BKA%3D%3D
[1] https://www.linkedin.com/pulse/remember-you-winner-gra%C5%BCyna-tt/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3B7MUO6XmmQ4OeVLPxMLrXFw%3D%3D
[1] https://www.linkedin.com/posts/gtatidea_proedutech-influencerpromotion-yourmustread-activity-6561824685804314624-k0wQ

Top URLs in Tweet in G7:
[2] https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html?smid=nytcore-ios-share
[1] https://sputniknews.com/analysis/20190806/1076481516/there-is-no-question-that-google-does-not-want-trump-as-president---cybersecurity-expert.html?utm_source=short_direct&utm_medium=short_url&utm_content=8Tk6&utm_campaign=URL_shortening
[1] https://apnews.com/f82d6b27caf64167852ace2dad6c0c63?utm_campaign=SocialFlow&utm_medium=AP&utm_source=Twitter
[1] https://datenschutz-hamburg.de/assets/pdf/2019-08-01_press-release-Google_Assistant.pdf
[1] https://twitter.com/kylegriffin1/status/1157088695935295488
[1] https://www.theverge.com/2019/7/30/20747088/congress-election-security-mitch-mcconnell-cybersecurity-paper-ballots
[1] https://searchsecurity.techtarget.com/feature/IoT-Cybersecurity-Improvement-Act-calls-for-deployment-standards

Top URLs in Tweet in G8:
[8] https://twitter.com/womenknowcyber/lists/women-in-cybersecurity-1/members
[3] https://cybersecurityventures.com/creative-hacking-detective-work-and-stopping-bad-people-whats-not-to-love/
[1] https://www.amazon.com/Women-Know-Cyber-Fascinating-Cybercrime/dp/1733015701
[1] https://cybersecurityventures.com/cybersecurity-almanac-2019/
[1] https://www.scmagazine.com/home/opinion/executive-insight/lessons-learned-can-education-solve-cybersecuritys-people-problem/
[1] https://www.statler.wvu.edu/news/2019/07/16/wvu-west-virginia-manufacturing-extension-partnership-to-hold-cybersecurity-workshop-in-beckley
[1] https://abcnews4.com/news/local/the-citadel-hosts-cybersecurity-camp-just-for-girls
[1] https://www.forbes.com/sites/bobzukis/2019/03/05/a-ceo-cheat-sheet-for-the-cybersecurity-big-one/#14b3ca626a2a
[1] https://www.forbes.com/sites/mariaclaracobo/2019/07/31/the-most-valuable-college-majors-are-where-the-jobs-are/#5925c1e778a0
[1] https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/

Top URLs in Tweet in G9:
[5] http://www.brinknews.com/cyber-resiliency-is-the-future-of-cybersecurity/
[3] https://arstechnica.com/information-technology/2019/07/cybersecurity-officials-warn-state-and-local-agencies-again-to-fend-off-ransomware/
[2] https://www.forbes.com/sites/kateoflahertyuk/2019/07/24/nsa-launches-cybersecurity-arm-to-defend-the-u-s-from-foreign-adversaries/#135f9a1455c4
[2] https://www.forbes.com/sites/forbestechcouncil/2019/07/25/seven-common-cybersecurity-mistakes-made-with-ai/#2483cf213d4c
[2] https://www.zdnet.com/article/us-company-selling-weaponized-bluekeep-exploit/
[2] https://blog.malwarebytes.com/threat-analysis/2019/07/a-deep-dive-into-phobos-ransomware/
[2] https://venturebeat.com/2019/07/24/the-video-game-industry-is-a-black-hole-for-cybersecurity/
[2] https://blog.malwarebytes.com/threat-spotlight/2019/07/threat-spotlight-sodinokibi-ransomware-attempts-to-fill-gandcrab-void/
[2] https://archerint.com/how-ransomware-really-gets-onto-your-computer/
[2] https://fortune.com/2019/07/24/fighting-deepfakes-gets-real/

Top URLs in Tweet in G10:
[3] https://threatpost.com/90-enterprise-iphone-users-imessage-spy-attack/146899/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_Zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_Zt0106_sm-post_social_threatpost
[2] https://www.helpnetsecurity.com/2019/08/06/online-skimming/
[2] https://www.helpnetsecurity.com/2019/07/30/abusing-twitter/
[2] https://www.helpnetsecurity.com/2019/08/01/mandatory-password-changes-are-obsolete/
[2] https://www.bleepingcomputer.com/news/security/new-systembc-malware-uses-your-pc-to-hide-malicious-traffic/#.XUNFBDQUl9o.twitter
[2] https://threatpost.com/aws-arrest-data-breach-capital-one/146758/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_zt0106_sm-post_social_threatpost
[2] https://www.hrdive.com/news/cybersecurity-training-is-up-but-a-hiring-gap-remains/559839/
[2] https://www.helpnetsecurity.com/2019/07/17/shadow-it-control/
[2] https://www.scoop.it/topic/cyber-resilience-leadership/p/4108013005/2019/06/04/why-cyber-resiliency-really-matters?utm_medium=social&utm_source=twitter
[2] https://hackersonlineclub.com/learn-tcp-ip/

Top Domains
Top Domains in Tweet in Entire Graph:
[207] twitter.com
[111] forbes.com
[80] cyberstartupobservatory.com
[67] linkedin.com
[67] hackers-arise.com
[63] zdnet.com
[61] thehill.com
[49] co.uk
[49] itspmagazine.com
[47] youtube.com

Top Domains in Tweet in G1:
[67] twitter.com
[32] linkedin.com
[25] github.com
[22] co.uk
[21] hakin9.org
[19] trib.al
[19] forbes.com
[19] reydes.com
[18] thehill.com
[14] youtube.com

Top Domains in Tweet in G2:
[80] cyberstartupobservatory.com
[50] forbes.com
[34] bing.com
[29] twitter.com
[26] zdnet.com
[26] tobem.com
[25] techrepublic.com
[21] medium.com
[20] twib.in
[19] google.com

Top Domains in Tweet in G3:
[47] itspmagazine.com
[10] csoonline.com
[7] twitter.com
[6] darkreading.com
[3] soundcloud.com
[3] bugcrowd.com
[3] cyberdefensemagazine.com
[3] dlvr.it
[2] dt-global.com
[2] ucf.edu

Top Domains in Tweet in G4:
[67] hackers-arise.com
[15] cyberdefence24.pl
[10] technologyreview.com
[6] youtube.com
[5] forbes.com
[4] co.uk
[4] twitter.com
[4] myshopify.com
[4] dynamicciso.com
[3] crn.com

Top Domains in Tweet in G5:
[6] twitter.com
[5] co.ke
[5] cybersecfill.com
[5] joomag.com
[3] securitymagazine.com
[2] ekraal.org
[2] v-org.com
[2] fraudsupport.org
[1] microsoft.com
[1] ledgerops.com

Top Domains in Tweet in G6:
[5] linkedin.com

Top Domains in Tweet in G7:
[2] nytimes.com
[1] sputniknews.com
[1] apnews.com
[1] datenschutz-hamburg.de
[1] twitter.com
[1] theverge.com
[1] techtarget.com

Top Domains in Tweet in G8:
[9] cybersecurityventures.com
[8] twitter.com
[4] recordedfuture.com
[3] forbes.com
[3] youtube.com
[2] moneymorning.com
[2] co.uk
[1] amazon.com
[1] scmagazine.com
[1] wvu.edu

Top Domains in Tweet in G9:
[21] forbes.com
[21] zdnet.com
[15] radian6.com
[9] inspiredelearning.com
[8] malwarebytes.com
[5] brinknews.com
[4] arstechnica.com
[3] infosecurity-magazine.com
[2] venturebeat.com
[2] techcrunch.com

Top Domains in Tweet in G10:
[18] helpnetsecurity.com
[12] hackersonlineclub.com
[10] threatpost.com
[5] scoop.it
[4] welivesecurity.com
[3] computerweekly.com
[3] forbes.com
[2] bleepingcomputer.com
[2] proofpoint.com
[2] esentire.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[3185] cybersecurity
[846] infosec
[427] ai
[317] malware
[313] security
[302] iot
[288] ransomware
[240] bigdata
[236] fintech
[224] blockchain



Top Hashtags in Tweet in G1:
[721] cybersecurity
[214] infosec
[96] hacking
[88] security
[63] iot
[61] ai
[59] malware
[58] pentest
[57] hackers
[55] cybercrime

Top Hashtags in Tweet in G2:
[1029] cybersecurity
[341] infosec
[250] ai
[199] ransomware
[190] malware
[174] iot
[159] bigdata
[152] fintech
[130] blockchain
[130] digitaltransformation

Top Hashtags in Tweet in G3:
[131] cybersecurity
[73] infosec
[14] bhusa
[14] blackhat2019
[10] blackhat
[10] defcon27
[10] cyber
[8] defcon
[7] technology
[6] hacker

Top Hashtags in Tweet in G4:
[148] cybersecurity
[25] infosec
[15] osint
[13] malware
[12] security
[11] dfir
[10] forensics
[10] databreach
[9] recon
[8] hacker

Top Hashtags in Tweet in G5:
[95] cybersecurity
[29] cyberinafrica
[23] kigf2019
[18] kenyaigf2019
[13] wls2019
[11] ah2019
[11] kesig2019
[9] infosec
[6] ah6
[6] nogofallmaga

Top Hashtags in Tweet in G6:
[82] yourmustread
[58] cybersecurity
[56] influencerpromotion
[56] topcasestudy
[56] influencermarketing
[53] knowledge
[49] influencers
[49] ai
[48] fintech
[43] smm

Top Hashtags in Tweet in G7:
[3] cybersecurity
[2] capitalone
[2] houserepublicans
[2] usa
[1] dpc
[1] ictcyber
[1] dataprotection
[1] moscowmitchmctreason
[1] iot

Top Hashtags in Tweet in G8:
[47] cybersecurity
[9] women
[6] threatintelligence
[4] cybercrime
[3] ics
[2] ciso
[2] infosec
[2] digibyte
[2] cybertalks
[2] databreach

Top Hashtags in Tweet in G9:
[110] cybersecurity
[34] infosec
[17] ransomware
[14] malware
[10] iot
[10] security
[9] securityawareness
[9] itsecurity
[6] hackers
[6] phishing

Top Hashtags in Tweet in G10:
[101] cybersecurity
[39] infosec
[34] security
[29] ciso
[22] cio
[19] leadership
[19] cto
[15] management
[12] tech
[12] hackersonlineclub

Top Words
Top Words in Tweet in Entire Graph:
[3084] Words in Sentiment List#1: Positive
[3011] Words in Sentiment List#2: Negative
[0] Words in Sentiment List#3: Your list of keywords
[108569] Non-categorized Words
[114664] Total Words
[3182] #cybersecurity
[1154] cybersecurity
[846] #infosec
[600] security
[474] amp

Top Words in Tweet in G1:
[721] #cybersecurity
[383] cybersecurity
[214] #infosec
[143] security
[109] more
[102] cyber
[96] amp
[96] #hacking
[88] #security
[82] data

Top Words in Tweet in G2:
[1028] #cybersecurity
[341] #infosec
[250] #ai
[217] cybersecurity
[199] #ransomware
[196] security
[190] #malware
[174] #iot
[159] #bigdata
[152] #fintech

Top Words in Tweet in G3:
[131] #cybersecurity
[73] #infosec
[37] amp
[30] co
[26] cybersecurity
[25] security
[24] more
[21] cyber
[20] learn
[15] itspmagazine

Top Words in Tweet in G4:
[148] #cybersecurity
[25] #infosec
[20] intelligence
[19] part
[19] one
[17] security
[17] cybersecurity
[15] #osint
[15] cyberdefence24
[14] hacker

Top Words in Tweet in G5:
[95] #cybersecurity
[30] cybersecurity
[29] #cyberinafrica
[23] amp
[23] #kigf2019
[21] security
[18] #kenyaigf2019
[18] kictanet
[15] data
[14] cyber

Top Words in Tweet in G6:
[82] #yourmustread
[58] #cybersecurity
[56] #influencerpromotion
[56] #topcasestudy
[56] #influencermarketing
[53] #knowledge
[50] cynthia_lardner
[49] #influencers
[49] #ai
[49] tom__coleman

Top Words in Tweet in G7:
[6] cybersecurity
[5] realdonaldtrump
[3] google
[3] president
[3] #cybersecurity
[2] smart
[2] issues
[2] amp
[2] hurdonthehill
[2] hey

Top Words in Tweet in G8:
[47] #cybersecurity
[22] cybersecurity
[18] more
[16] know
[11] cyber
[11] security
[9] cybersecuritysf
[9] #women
[7] one
[7] infosec

Top Words in Tweet in G9:
[110] #cybersecurity
[40] cybersecurity
[34] #infosec
[22] security
[20] forbes
[17] #ransomware
[14] #malware
[12] cyber
[12] zdnet
[11] company

Top Words in Tweet in G10:
[101] #cybersecurity
[39] #infosec
[38] gt
[34] #security
[29] #ciso
[22] #cio
[19] #leadership
[19] #cto
[15] #management
[14] security

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[339] #cybersecurity,#infosec
[117] gt,gt
[111] #cybersecurity,#databreach
[96] #cybersecurity,#cybercrime
[93] #infosec,#cybersecurity
[91] cyber,security
[90] capital,one
[89] #fintech,#blockchain
[88] #hackers,#infosec
[87] #databreach,#ransomware

Top Word Pairs in Tweet in G1:
[82] #cybersecurity,#infosec
[34] #infosec,#cybersecurity
[28] #infosec,#hacking
[26] cyber,security
[25] capital,one
[25] #hacking,#hackers
[25] #hackers,#pentesting
[25] #pentesting,#programming
[25] #programming,#pentest
[24] #opensource,#cybersecurity

Top Word Pairs in Tweet in G2:
[126] #cybersecurity,#infosec
[96] #cybersecurity,#databreach
[87] #fintech,#blockchain
[86] #hackers,#infosec
[85] #bigdata,#datascience
[84] #databreach,#ransomware
[84] #ransomware,#hackers
[84] #infosec,reach2ratan
[84] reach2ratan,#ai
[84] #blockchain,#chatbots

Top Word Pairs in Tweet in G3:
[30] #cybersecurity,#infosec
[10] learn,more
[8] #infosec,#cybersecurity
[5] stay,tuned
[5] uncwilmington,cyber
[5] cyber,seahawks
[5] infosec,life
[5] marcociappelli,sean_martin
[5] #blackhat2019,#cybersecurity
[5] more,co

Top Word Pairs in Tweet in G4:
[11] #cybersecurity,#infosec
[10] open,source
[10] source,intelligence
[9] basics,hackers
[9] cyberdefence24,#cybersecurity
[8] intelligence,osint
[8] reverse,engineering
[8] engineering,malware
[8] malware,part
[7] become,open

Top Word Pairs in Tweet in G5:
[7] #cyberinafrica,#cybersecurity
[6] #cybersecurity,#cyberinafrica
[6] #kenyaigf2019,#cyberinafrica
[5] #kigf2019,#kenyaigf2019
[5] #kenyaigf2019,#kigf2019
[5] part,#cybersecurity
[5] #cybersecurity,#personaldata
[5] #personaldata,panel
[5] panel,topic
[5] personal,data

Top Word Pairs in Tweet in G6:
[56] #influencerpromotion,#topcasestudy
[54] #topcasestudy,#cybersecurity
[53] #cybersecurity,#knowledge
[49] #yourmustread,#influencerpromotion
[48] #influencers,#influencermarketing
[40] #ai,#strategy
[36] #bitcoin,#fintech
[34] #strategy,#smm
[33] #proedutech,#yourmustread
[33] #yourmustread,#proedutech

Top Word Pairs in Tweet in G7:
[2] president,obama
[2] obama,give
[2] give,cybersecurity
[2] stand,down
[2] down,order
[2] order,russian
[2] russian,interference
[2] years,ago
[2] ago,one
[2] one,former

Top Word Pairs in Tweet in G8:
[9] know,#cybersecurity
[8] #women,know
[5] cybersecurity,ventures
[4] cybercrime,magazine
[3] know,cyber
[3] according,cybersecurity
[3] #cybersecurity,#cybercrime
[3] learn,more
[2] cybersecurity,rapidly
[2] united,states

Top Word Pairs in Tweet in G9:
[30] #cybersecurity,#infosec
[7] dismal,industry
[7] industry,unsustainable
[7] unsustainable,burden
[7] burden,cybersecurity
[7] #cybersecurity,#securityawareness
[7] #security,#cybersecurity
[6] forbes,#cybersecurity
[6] zdnet,#cybersecurity
[6] future,#cybersecurity

Top Word Pairs in Tweet in G10:
[19] #cio,#cto
[15] #leadership,#management
[13] #infosec,#security
[12] #ciso,#cio
[10] #cybersecurity,#security
[9] #cybersecurity,#infosec
[9] #security,#infosec
[8] #infosec,#leadership
[8] #hackersonlineclub,#cybersecurity
[7] #cto,#ciso

Top Replied-To
Top Replied-To in Entire Graph:
@pvynckier
@cynthia_lardner
@drnikolova_rumi
@rosatrunk
@marcusjcarey
@mocana
@drjdrooghaag
@influencerprom1
@chidambara09
@mwfaanigeria

Top Replied-To in G1:
@cyfirma

Top Replied-To in G2:
@pvynckier
@mocana
@drjdrooghaag
@_schmielewski
@avrohomg
@google
@rbs
@drcwebbbaphd
@archonsec
@haroldsinnott

Top Replied-To in G3:
@cyberdefensemag
@mansimusa
@ecpiuniversity
@marcociappelli
@appsec_village

Top Replied-To in G4:
@pvynckier
@wired
@facebook

Top Replied-To in G5:
@cybertalknaija
@bomu
@aprielle_moraa
@innovatelawafri
@danielberzosa
@omondibob
@sheetalkumar

Top Replied-To in G6:
@cynthia_lardner
@drnikolova_rumi
@rosatrunk
@influencerprom1
@chidambara09
@kiyotaka_1991
@sumawun
@vipeurope5
@fujio0606
@masao__tanaka

Top Replied-To in G7:
@realdonaldtrump
@alyssa_milano
@mmmpeg59
@laurasessions10

Top Replied-To in G9:
@zackwhittaker

Top Replied-To in G10:
@microsoft
@cioonline

Top Mentioned
Top Mentioned in Entire Graph:
@reach2ratan
@archonsec
@drjdrooghaag
@mclynd
@digitalcloudgal
@aghiathchbib
@robmay70
@antgrasso
@chuckdbrooks
@pvynckier

Top Mentioned in G1:
@centurylink
@ioteventshub
@icesontario
@ezscott
@bsidesrdu
@ainewsalliance
@crimes_saudi
@ccwhistleblower
@cyber_xploits
@pittcyber

Top Mentioned in G2:
@archonsec
@reach2ratan
@drjdrooghaag
@mclynd
@digitalcloudgal
@aghiathchbib
@robmay70
@antgrasso
@chuckdbrooks
@pvynckier

Top Mentioned in G3:
@itspmagazine
@blackhatevents
@defcon
@bugcrowd
@wicked6games
@sean_martin
@reversinglabs
@uncwilmington
@prevailion
@marcociappelli

Top Mentioned in G4:
@cyberdefence24
@reach2ratan
@capitalone
@rneelmani
@sparya
@security10x
@sameeranja
@taosecurity
@cyb3rops
@m49d4ch3lly

Top Mentioned in G5:
@kictanet
@ca_kenya
@safaricomplc
@usiuafrica
@ekraal_
@shehacks_ke
@africahackon
@wls_globallaw
@opcde
@microsoftafrica

Top Mentioned in G6:
@tom__coleman
@jilliemary
@malekalby
@tripletsfan19
@kugey
@srinualme
@carlramallo
@cynthia_lardner
@chikara_inoue
@papaporter1

Top Mentioned in G7:
@realdonaldtrump
@google
@hurdonthehill
@naphisoc
@susanbordo
@bannerite
@proudresister
@ginaortizjones
@ewarren
@njterrie

Top Mentioned in G8:
@cybersecuritysf
@cisco
@forbes
@karla_reffold
@hacks4pancakes
@youtube
@dragosinc
@franksec42
@difreeze
@moneymorning

Top Mentioned in G9:
@forbes
@zdnet
@fireeye
@campuscodi
@brinknewsnow
@mmc_global
@kirkwright
@thepacketrat
@immelty
@forbeseurope

Top Mentioned in G10:
@lukasstefanko
@kaspersky
@gartner_inc
@helpnetsecurity
@luxorlv
@computerweekly
@transform_sec
@pcissc
@rh_isac
@trendmicro

Top Tweeters
Top Tweeters in Entire Graph:
@feedingjoy
@arkangelscrap
@easy_branches
@paoloigna1
@sectest9
@ee
@cyberdomain
@cybertoolsbooks
@independent
@evankirstel

Top Tweeters in G1:
@abscbnnews
@inspiteoftrump
@ancalerts
@jilevin
@huffpost
@new_narrative
@business
@channelnewsasia
@valaafshar
@wlwt

Top Tweeters in G2:
@arkangelscrap
@sectest9
@cyberdomain
@evankirstel
@evanderburg
@biconnections
@richsimmondsza
@economictimes
@marshacollier
@lesechos

Top Tweeters in G3:
@gameofthrones
@jgamblin
@hbo
@blackgirlscode
@sassoftware
@ecpiuniversity
@rndrive
@imsmartinc
@thewilsoncenter
@manicode

Top Tweeters in G4:
@independent
@ottlegalrebels
@shellykramer
@wil_bielert
@theregister
@mumbaipolice
@gate_15_analyst
@securitytube
@jack_daniel
@kfalconspb

Top Tweeters in G5:
@cybertoolsbooks
@safaricomplc
@nigerianewsdesk
@atsen_
@winknews
@un
@tyrus_
@worldbank
@silverkayondo
@xymbiz

Top Tweeters in G6:
@feedingjoy
@easy_branches
@jilliemary
@ssscoop475
@lorimoreno
@rosatrunk
@chidambara09
@ludmarx1
@gracemurphy2
@datsyuklover

Top Tweeters in G7:
@bannerite
@graceslick77
@morgfair
@co_rapunzel4
@ronsupportsyou
@puestoloco
@letat_lechat
@catlady628
@goprapebuster
@reporterphoenix

Top Tweeters in G8:
@honda
@hacks4pancakes
@christinayiotis
@unix_guru
@moneymorning
@sforslev
@fortalicellc
@amazon
@isik5
@eenewsupdates

Top Tweeters in G9:
@joviannfeed
@zdnet
@forbes
@sec_cyber
@fortunemagazine
@jose_garde
@phillyinquirer
@engadget
@vice
@venturebeat

Top Tweeters in G10:
@eleconomista
@jc_vazquez
@symbiansymoh
@sdxcentral
@mylessuer
@cioonline
@computerweekly
@helpnetsecurity
@plymuni
@kaspersky


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.