Twitter is fast becoming an essential tool in the workplace, delivering a breadth of useful information for the time-poor IT professional.
For our IT security list we've tried to pick out the individuals and organisations who either make the news or provide the kind of insight into breaking stories and running issues that could prove invaluable to the IT manager and information security chief.
Graham Cluley, senior technology consultant, Sophos @gcluley
No Twitter security list would be complete without Graham Cluley. A prolific user of the micro-blogging service, Cluley points to the regularly updated Sophos Naked Security blog as well as any other tidbits of interest.
Luis Corrons, technical director, Panda Security @Luis_corrons
Spain-based Luis tweets all the latest happenings from Panda Security's PandaLabs research team, so expect links to the firm's blog as well as anything too recent to have been posted there. A well respected figure in the information security industry.
Mikko Hyppönen, chief research officer, F-Secure @mikkohypponen
Mikko is a tweeter in the same mould as Luis Corrons and Graham Cluley in that he cuts his teeth daily researching the latest threats in the big bad cyber world. Expect tweets of a wide ranging and frequently technical bent, highlighting cutting edge research from across the globe.
Dave Marcus, director of security research, McAfee Labs @DaveMarcus
Dave Marcus is a prolific tweeter on all aspects of cyber security, pointing to interesting McAfee threat research material and interviews, as well as engaging frequently with his followers in thought-provoking debate.
E J Hilbert, president, anti-fraud firm Online Intelligence @ejhilbert
Given his background as an ex-FBI special agent specialising in cyber crime and counter intelligence, it comes as no surprise that E J Hilbert's tweets focus mainly on the latest scams and cyber attacks. Follow him for a fascinating insight into the mind of the law enforcers tasked with taking down the bad guys.
Bruce Schneier, chief security technology officer, BT @schneierblog
World famous cryptographer Schneier might not be everyone's cup of tea, but his regular Twitter updates usefully point back to a popular blog from the man himself. Covering a wide range of security topics, the posts include musings from Schneier himself, interesting articles he's spotted and some frequently entertaining debates via the comment section.
Aaron Portnoy, manager, security research team, TippingPoint Technologies @aaronportnoy
If you're interested in the latest secure coding practices, and in particular TippingPoint's Zero Day Initiative for uncovering new vulnerabilites, Portnoy is the tweeter for you. Mixing the latest news from TippingPoint and his daily work in the labs with anything of wider interest, he is also a highly accessible tweeter keen to engage with the security community.
Stewart Room, partner, Field Fisher Waterhouse @stewartroom
An expert in data security and protection with many years' experience, Stewart Room reacts several times a day to the latest news, from EU data breach notification laws to the latest in the phone hacking scandal. If you want to keep abreast of developments in data protection, follow Stewart Room.
SANS Internet Storm Center @sans_isc
This is the Twitter account for the internet security monitoring and alert arm of the well-respected research and training organisation responsible for the SANS Top 25 most dangerous software flaws. It features almost daily updates, mainly linking to the ISC's Diary web page where you can find out more on the latest breaking threats.
US Computer Emergency Readiness Team @uscert_gov
A stream of regular updates from the Department of Homeland Security body tasked with co-ordinating the defence of the US. Following US-CERT will keep the information security professional up to speed with the latest essential security advisories and patching information.
Coming up tomorrow, we've got the Top 10 tech product update feeds on Twitter, and you can read all the previous entries for the Top 100 Technology Tweeters on the V3 site.
These lists aren't in a particular order, but at the end of the series we'll be revealing the top 10 of the top 10s, so please comment below or email us to let us know who your favourites are, and we can add your votes to the count.
And don't forget to follow the whole V3 team on Twitter with this handy list of all our journalists.
Facebook and CVs. What could possibly go wrong?
OnePlus volte face will also enable users to opt-out of company's device data collection practice
Dorsey promises "more aggressive stance" on rules and enforcement
A team of US researchers have confirmed that an exploit can hack into any WPA-2 wireless network, but details are slim