Articles by Bill Zalud

How the Generational Security Gap Affects Security

Despite concerns about technology, clearly Americans still have a hard time unplugging.
December 1, 2013

I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.


Read More

How Mesh Networks Form the Backbone of Smart Cities

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.
December 1, 2013

Overall, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways.


Read More

How Emergency Messaging Aids Access Strategies

Getting the word out, correctly, in time and to the right people, is an important mission for colleges and universities.
December 1, 2013

Mass notification has become a key element of campus safety and security. John Dellacontrada, assistant vice president of media relations at the University of Buffalo, New York, says he sought a “solution that we could deploy quickly and consistently, one that would work on desktop and mobile devices to get a message broadcast via various ways and that could work with our existing emergency public address system.”


Read More

The Good, the Bad and the ‘Almost’ Catastrophic

These days, it seems it is more what the U.S. Department of Homeland Security doesn’t do than what it does do.
November 5, 2013

NASA and the U.S. Department of Homeland Security are collaborating on a first-of-its-kind portable radar device to detect the heartbeats and breathing patterns of victims trapped in large piles of rubble resulting from a disaster.


Read More

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
November 5, 2013

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.
November 5, 2013

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More

Adding Value by Adding Functions to Cards and Badges

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.
October 1, 2013

More is never less when it comes to enhancing an enterprise security access control system with features that complement both security and business goals.


Read More

Concerns of Fed Phone, Internet Surveillance Lead to Privacy Discussion

The NSA’s data collection has proven troubling, and many Americans’ privacy concerns grow.
September 1, 2013

In a New York Times/CBS NewsPoll, a week after the Boston Marathon attack, which was unraveled after the release of video footage of the two suspects flushed them out of hiding, 78 percent of people said surveillance cameras were a good idea.


Read More

Smart Card Solutions to 8 Security Headaches

Keep your head out of the technology razzle-dazzle – focus on furthering your enterprise’s business needs.
September 1, 2013

 For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle. 


Read More

Measuring the Next Step in IP-Based Access Control

IP-based access calls for strategies involving diverse stakeholders and beyond-security applications.
September 1, 2013

 Wireless. At the edge. Firmware. Multi-technology readers. Near field communication (NFC). In the cloud. Leveraging the network. Scalability. Video integration. Seamless analytics. 


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

THE MAGAZINE

Security Magazine

April 2014

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Table Of Contents Subscribe

Background Checks

Who conducts background checks on new employees and contractors in your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13