Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Twitter, Chrome, Wiki and the New Lingo of Security

By Steve Hunt
October 8, 2008


Twitter is Collaboration Software

Meanwhile, your blackberry, phone and laptop have all become tools you use to do security better.

   
That’s what I mean. Things like browsers and search engines like Google and Chrome, collaboration software like Wiki and Twitter, are becoming the tools we use to make faster and more informed decisions.

   
Two years ago, I wrote a security industry trends piece called Guards, Guns, Gates and Google (Security Magazine, June 5, 2006) predicting this data orientation. I explained how security is information built around information technology, so you can be sure that our customers – the business unit managers and senior executives of our organizations – will want to see it, use it and critique it. Like you, your superiors and customers Google (yes, this is now a noun and a verb) information all the time. They want the most relevant information, quickly and instantly accessible – simple reports that prioritize the information of security and suggest remediation. Modifications in personal privileges will follow the IT model of self-service – individuals will use a secure transaction on the network or over the Internet to change their privileges to certain doors or buildings. Business managers, marketing managers, partners throughout the supply chain and the foreman at the loading dock all want instant access to some video images forwarded to their phones or handhelds to help them ensure supply, anticipate demand, avoid loss and increase productivity and profit.

   
Google is an important tool and concept, but there’s more. Google means easy access to all data. Real value comes from collaboration. And the “Google” of collaboration, sharing and connectedness is a new thing called Twitter.

   
Twitter is one of those Web 2.0 applications that sound completely ridiculous when you first hear of it, but after you start using it, you wonder how you lived without it. [I said the same thing about TiVo.]

   
With Twitter, you simply create a short mini-conversation which answers only one question: What are you doing now? That’s it. I type up to 140 characters explaining what I’m doing now: “Writing a column post on how Twitter affects the security industry”

   
I “follow” other people whom I respect or like and watch what they are doing now.

   
The other week I wrote this Tweet: Planning a trip to Boston and wondering who else to visit.

   
A couple of my Followers Tweeted back saying

   
“Call my friend at the transit authority. Here’s the email address…” and “Be sure to use the water taxi from downtown to Logan, it's much faster."

   
In a million years I never would have thought to ask that particular person whom I should see in Boston. And the Water taxi from downtown was actually a big time saver. Go Twitter!

   
Now I get useful responses to my tweets when I’m evaluating this surveillance camera, or critiquing that vendor or posting a new article.

   
So what are you waiting for? Taste the future of the security industry. Get involved in the future of collaboration and sharing. And “Follow Me” on Twitter. www.twitter.com/steve_hunt  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is founder of the Chicago-based research firm, 4A International, www.4ai.com. Contact him at info@4ai.com or visit his blog, www.SecurityDreamer.com.

SecurityDreamer is growing up fast. Since lauching Security- Dreamer in November 2006, readership has steadily grown. According to Hunt, he has recently added a daily email with recent updates. The site will soon feature more IT and IT security content -- especially information that relates to collaboration and communication across the lines of physical and homeland security with IT.

SecurityDreamer will host forums, or discussion boards, for topics like intelligent video, PSIM, security management best practices, endpoint security, FIPS 201 and needed technology standards.  Watch for a Wiki, too.  We are even going to list more than a hundred vendors and invite your comments on each.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Are You Us? Or Are You Them?

    See More
  • First Convergence Casualty

    See More
  • Knock It Off!

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing