Articles by Bill Zalud

The CSO, CFO Tally: Bean Counting Is Out

June 1, 2012
Except for Troy Alstead, chief financial officer for Starbucks. But more about him later. It is more important to see how the CFO role has evolved and how it matches and mirrors others such as security. The CFO is more visible and influential. Many are able and expected to build strong relationships, across and beyond the company to be strategic business partners.
Read More

Interest Paid with Bank, Retail Security

June 1, 2012
For Pat Cooper, location makes a difference. Mobility is the key for Kevin Mykle. Andrew Roberts needed to overcome an old, cumbersome and unreliable system that produced very poor image quality.
Read More

Squeeze Play – Wonders and Dangers of H.264

June 1, 2012
For Chris Hugman, it is both simple and complex. “You can better manage bandwidth. You can store security video more efficiently,” he says. But with any tech advance, complexities – some hidden while others are more visible – can make or break an installation.
Read More

The Other Edge of Tracking People

May 1, 2012

For cell phone users, and that includes most everyone these days, there are myriad choices in plans beyond the hundreds of phones themselves. Anytime minutes. Off-peak minutes. Domestic roaming charges. International roaming charges. Minutes overage fees. Text messaging plans. Data plans. Limits and slowdowns on data plans.

Read More

Another Evolution?

Will Smart Card Trump Prox?
May 1, 2012
Smart cards, like other steps along technology’s ever-evolving pathway, biometrics and megapixel cameras to name two others, share ingrained challenges. New stuff is often more expensive than existing stuff. Bring something new in and, often, you have to upgrade other gear that is part of the total system to make it all work together. Then there are design, installation, maintenance and training costs as something new comes through the door.
Read More

Trail Mix: Five Good Ways to Track People

May 1, 2012
Melissa Maddox has a lot of visitors, a lot of very important visitors, who stop in to view their very expensive assets in a very expansive facility.
Read More

Harnessing the Brain for Security’s Good

April 1, 2012
Don’t be afraid. This is all about habits. And it is a twin spin from an MIT lab and a self-help professor at Utah State University, a seemingly deadly combination, but which may hold the key to how to sell security to the boss and employees, how to balance values and principals professionally and personally as well as how to sell Febreze at Walmart, if you want.
Read More

Hazardous Duty: Cleaning Up a Camera’s Act

April 1, 2012
Neither snow, nor rain, nor heat, nor gloom of night stays these courageous couriers from the swift completion of their appointed rounds.
Read More

The Perfect Host? It’s a Matter of Choice

April 1, 2012
No doubt, too many choices can lead to confusion. Still, and obviously, the ubiquitous Web and mobile devices, to a lesser extent, have spurred hosted and managed services, remote intelligent monitoring, software-as-a-service and in-the-cloud solutions that impact access control, security video, mass notification and even security guarding.
Read More

How Mom’s Vaporub Created E-mail Spam

March 5, 2012
It was, in its time, a soothing miracle cure or a humiliating school day when I smelled like an over mentholated pine forest. But it’s also an example of a domino falling, which can lead to surprising places, both good and bad. There are domino effect examples throughout the security field, too.
Read More



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+