/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
API keys, docs, usage dashboard
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Person

Bold

Filtered to competitor pattern ×
2 articles stable
Articles
2
mentions
Velocity
0.0%
growth rate
Acceleration
0.000
velocity change
Sources
2
publications

Coverage Timeline

2026-03-12
Business Insider 4 related

Tel Aviv-based Bold, which uses AI agents to secure enterprise devices like laptops from cyberattacks, emerges from stealth with $40M in funding

2021-11-04
The Record 6 related

CISA creates a catalog of known exploited vulnerabilities, including in Apple and Google products, and orders federal agencies to patch within timeframes

Binding Operational Directive (BOD) 22-01 establishes timeframes for mitigation of known exploited vulnerabilities and requires improvements in vulnerability management programs: https://www.cisa.gov/...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...