SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Web and social media intelligence transforms security and safety planning

Kevin Wine
Kevin Wine
Contact company
Contact Verint Systems
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Web and social media intelligence enhances security by identifying trends and expediting investigations.
  • Big Data and IoT enable comprehensive data collection, driving risk mitigation and investigation efforts.
  • Online intelligence detects high-risk posts, helping prevent crime and enhance proactive security planning.
Tapping Web and social media sources to locate data streams offers beneficial results including the ability to identify trends and expedite investigations

Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of corporate information or the use of social media for nefarious activities, it’s clear that these once-separate security disciplines are often tied together.

As a result, various organisations seek ways in which they can collaborate and share information to gain greater situational awareness to react faster, smarter and more efficiently. The overall goal is to see the process of security from a single lens to achieve comprehensive risk mitigation efforts.

Stakeholders must detect and neutralise potential threats quickly, as well as seek out new forms of intelligence to be one step ahead of the curve. The growing acceptance of Big Data analysis and the Internet of Things (IoT) enables the collection of relevant data across systems, services, and devices, driving alliances to deter, prevent, and investigate threats and improve safety.

Role of data analysis

Data analysis is the process of examining large data sets to uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful business information to anticipate, respond and take action. The amount and types of structured and unstructured data are growing rapidly, and present new and increasing challenges. Organisations that generate actionable intelligence from collected data points, such as financial organisations, corporate enterprises and government agencies, are better positioned to create value and achieve their strategic objectives.

Organisations that generate
actionable intelligence from
collected data points are better
positioned to create value and
achieve their strategic objectives

Stakeholders are driven by an alignment with risk management, IT and business continuity to provide a comprehensive security strategy that takes into account cyber and physical security and recognises the potentially damaging disruptions if not threats are not controlled. New services, tools, and methods are valuable to help users mitigate risks more effectively. Here is a look at two processes gaining significant interest:

Web and social media intelligence

The Web and social media are of critical importance to security leaders, as these platforms are the gateway to a vast array of information that can help enhance security, investigate breaches, and streamline operations. The process of tapping into Web and social media sources to locate data streams offers beneficial results including the ability to identify trends and expedite investigations. This process helps transform raw information into valuable data by capturing valuable evidence that can be used to mitigate risks, build critical insights, and identify targets.

Everyone is online and therefore, we all leave digital breadcrumbs that can be used to determine our activities online and help determine offline activity as well. In criminal cases, the Web is a valuable tool to collect information about potential criminals from their conversations on social networks and blogs, engagement with news sites, and entrance into the Dark Web. Data derived from these sources allows investigators to pinpoint targets more efficiently.

Web intelligence is realised through a combination of broad searches across the Internet, and locating and opening up hidden sites. Using managed crawlers and socially-engineered avatars, open source intelligence solutions find data that cannot be found in any other way. Investigators can reconstruct social circles, interpret emerging events, and discover persons of interest through customised alerts, behavioural profiles, and geospatial identification that all work cohesively to help achieve actionable intelligence.

In criminal cases, the Web is a valuable tool to collect information about potential criminals from their conversations on social networks
By detecting high-risk posts, and identifying potential threats and targets, organisations can help prevent crime and terrorism before it happens

By detecting high-risk posts, and identifying potential threats and targets, organisations can help prevent crime and terrorism before it happens — resulting in more proactive security planning. Collected data from the Web allows users to gain forensic insight into what occurred during an incident, rebuild the sequence of events, understand the big picture of what caused the event, and how the response was carried out for a better chain of evidence and accountability.

Social media is not only valuable in identifying potential security events or suspects, it is now being used to facilitate greater citizen engagement, empowering the general public to participate in the safety of their communities. This facet of social media intelligence gives authorities the ability to collaborate with the public when situations occur, which can help achieve a greater level of situational awareness through an “eyes on the street” approach. By providing critical information and input, citizens help safety officials carry out evidence-based, targeted public safety interventions in a proactive manner.

Transforming security and safety planning

Linking Web and social media intelligence, cyber security, and physical security together helps transform security and safety planning, and helps create the intersections and correlations of details surrounding a situation to present a unified scenario to the appropriate analysts and operators. By capturing and analysing this data in real-time, leaders gain a visual representation of risks while accessing information related to the most critical events happening at any given time. Not only does this unified process help enable a higher and more proactive level of protection, but it also facilitates a plan of action based on a centralised security operations centre.

There is no doubt that the nature of what threatens the world will continue to change and evolve. It is important that we continue to innovate and enhance countermeasures, expand the ability to share information across channels and find new ways to leverage tools that help drive greater situational awareness. With robust intelligence, stakeholders can respond faster, smarter, and more efficiently to address, or even prevent, future security challenges.

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Security management
  • Security policy
  • Public security
  • Counter terror
  • Cyber security
  • Crime prevention
  • Internet of Things (IoT)
  • Data Security
  • Related links
  • Verint IP cameras
  • Articles by Kevin Wine
  • Related categories
  • Access control systems & kits
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Discover how web and social media intelligence transforms security and safety planning, enhancing threat detection and response capabilities.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec