Articles by Bill Zalud

How the Generational Security Gap Affects Security

Despite concerns about technology, clearly Americans still have a hard time unplugging.

I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.


Read More

How Emergency Messaging Aids Access Strategies

Getting the word out, correctly, in time and to the right people, is an important mission for colleges and universities.

Mass notification has become a key element of campus safety and security. John Dellacontrada, assistant vice president of media relations at the University of Buffalo, New York, says he sought a “solution that we could deploy quickly and consistently, one that would work on desktop and mobile devices to get a message broadcast via various ways and that could work with our existing emergency public address system.”


Read More

The Good, the Bad and the ‘Almost’ Catastrophic

These days, it seems it is more what the U.S. Department of Homeland Security doesn’t do than what it does do.

NASA and the U.S. Department of Homeland Security are collaborating on a first-of-its-kind portable radar device to detect the heartbeats and breathing patterns of victims trapped in large piles of rubble resulting from a disaster.


Read More

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More

Adding Value by Adding Functions to Cards and Badges

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.


Read More

Smart Card Solutions to 8 Security Headaches

Keep your head out of the technology razzle-dazzle – focus on furthering your enterprise’s business needs.

 For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle. 


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.