/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Maggie Miller

Filtered to controversy pattern ×
14 articles stable
Articles
14
mentions
Velocity
0.0%
growth rate
Acceleration
+0.500
velocity change
Sources
9
publications

Coverage Timeline

2021-12-15
CyberScoop 32 related

CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career

A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate networks; ransomware payl...

2021-11-16
The Record 8 related

DHS issues an interim rule that will, once finalized, let it hire cybersecurity professionals at salaries of up to $255,800 and up to $332,100 in special cases

and Retain—Cybersecurity Talent Maggie Miller / The Hill : DHS announces new program to attract and retain cybersecurity talent Natalie Alms / Federal Computer Week : New cyber talent system, years in...

2021-08-24
Wired 29 related

Researchers find 1,000+ web apps, from Ford, American Airlines, and others, mistakenly exposed 38M records stored on Microsoft's Power Apps service

Including Contact-Tracing Info Keumars Afifi-Sabet / IT PRO : Microsoft Power Apps misconfiguration exposes 38 million records James Vincent / The Verge : Check your permissions: default settings in M...

2021-02-01
The Hill

A look at the criticism in DC directed at CSET, a State Dept. bureau focused on cybersecurity and emerging technologies formed in the last days of Trump's admin

Maggie Miller / The Hill :

2021-01-13
The Hill 6 related

European Medicines Agency says that hackers leaked third-party documents on COVID-19 vaccines and medicines as part of a breach discovered late last year

Maggie Miller / The Hill :

2020-11-04
Washington Post 22 related

DHS and the FBI are investigating a robocall and text campaign warning US voters to “stay safe and stay home”

Despite scattered reports … New York Times : Despite Fears of Violence, Election Day Proceeds Smoothly as Millions Line Up to Vote Kate Cox / Ars Technica : “Stay Home” robocalls to voters prompt FBI,...

2020-07-17
Reuters 12 related

Sources: the FBI is leading a federal inquiry into the Twitter hack

don't have sensitive conversations in Twitter DMs. Move that stuff to Signal. You don't know who'll be in charge of Twitter five, ten, or twenty years from now. Remember the example of LiveJournal. ht...

2019-08-31
Project Zero 81 related

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...