- Arenas/Stadiums/Leagues /Entertainment
- Construction, Real Estate, Property Management
- Critical Infrastructure: Electric, Gas, Water
- Education: K-12
- Education: University
- Government: Federal, State and Local
- Hospitality & Casinos
- Hospitals & Medical Centers
- Ports: Sea, Land & Air
- Retail/Restaurants/Convenience Stores
- Transportation/Supply Chain/Warehousing
Articles by Claire Meyer
NATO came to Chicago in May 2012, and security officials just can't help themselves talking about how well it went off.
Chicago's long, arduous history with fire has culminated in one of the strictest fire codes in the U.S., but many Second City establishments don't settle for the bare minimum of training and procedure.
It’s important for security professionals to understand their ownership of the facility they protect, and this could be difficult to foster in contracted security officials. However, several Chicago establishments have gone a long way to build that sense in some of the city’s landmark facilities.
The bombing at the Boston marathon may have shaken the nation to its core, but it has strengthened the resolve of security professionals to perform to the best of their abilities, as well as to supplement their own strength through public-private partnerships.
What new innovations were unveiled this year? How will they fit into your business strategy? We walk the show floor so you don't have to -- Get the scoop from Security magazine.
BYOD is a growing sensation in the business world, but the trend often leaves security as an afterthought. Three BYOD experts share their advice and experience on how mobile workers, home offices and BYOD can improve business while still managing data security.
Active shooter protocols, security officer training and top 2013 predictions are the most popular articles this week for SecurityMagazine.com.
A new infographic shows the top malware attacks of the year, as well as how they evolve and change along with the cyber landscape.
Top CISO thought-leaders share their opinions on the threats of the day, as well as the solutions of the hour for cyber security.