Security Magazine

Security December 2014 issue cover

View Archived Issues

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Standardizing Security Personnel for Better Quality of Care

 Healthcare security is changing. As more and more hospitals form or join health systems or implement the Affordable Care Act, the standardization of security officer services has many advantages. The need for greater value from service providers, more efficient programs, consistent protocols for staff and patients and an increasing focus on both safety and security are positioning standardization of security services as a critical solution for health systems. 


Read More

12th Annual Top Guarding Firms Listing

Check out the top guarding firms in this year's listing.


Read More

Wage War: The Fight Over Security Officers' On-Call Compensation

What do famous TV surgeon Marcus Welby and Tim Mendiola, a real-life security officer, have in common? Beyond their different and equally essential tasks, both are on-call when not with a patient or patrolling a site.


Read More

Addressing Corporate Espionage in the 21st Century

The 21st Century is often referred to as the information age; the developing global marketplace has contributed to the entrance of new cultures and economies into the competitive global economy.  Due to globally available infrastructure and the development of global telecommunication/computing capabilities, it has enabled individuals, companies and countries to compete globally on a level playing field with traditional Western powers even from some of the most remote parts of the world.  Unfortunately this has also created conditions in which the threat of corporate espionage has been rapidly proliferating due to the ease threat actors can ply their trade both through physical and virtual actions against U.S. corporations.


Read More

Helping Security Officers Improve Incident Reporting

 Commissionaires is a private, not-for-profit organization that has been protecting people and property for more than 86 years. As one of Canada’s top security organizations, it employs more than 20,000 people across the country and holds the highest retention rate in the industry. Its workforce consists of a well-trained, diverse team of individuals from all walks of life, including but not limited to, former Canadian Forces and RCMP personnel.   


Read More

Security Officers or Video Surveillance: Your Best Option

It just takes a walk through the exhibit hall at any security convention to see the technological advances and growth of video monitoring technology. From thermal imaging and panoramic technology to enterprise surveillance systems, video monitoring becomes more and more sophisticated every year. Today’s systems incorporate “smart” cameras, boast internal storage and embedded analytics, and can stream to virtually any mobile device.  

Read More

How to Stay in Control of Control Systems

Traditional network security risk management techniques are often inadequate to meet the specialized needs of enterprises' control systems. The good news is that a host of free resources exists to cover this important field of security, risk management, compliance and operational continuity. 


Read More

Using Smartphone-Based Access Control to Keep Students Happy

 Vanderbilt University has earned many distinctions, including Princeton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.  


Read More

How the Internet of Things Impacts Surveillance

If the revelations by Edward Snowden proved anything, it is that the U.S., its allies and its enemies possess tremendous capabilities to know as much about individuals, groups, companies, and virtually any other entity, as they want. While Snowden’s revelations give specific insight to U.S. capabilities, many of the same technologies our intelligence apparatus use are either commercially available or within the ability of nations or non-state actors to acquire on their own. 


Read More

How Much Do Certifications Help Your Career?

 Afew years ago we published an article on security related certifications that were being marketed as a means to advance your career. At that time there were a relatively small number of certifications that we were seeing listed on resumes. Today, we are still routinely asked which certifications are needed for career advancement or which ones are being requested by hiring managers. Frankly, unless the role has a specific requirement that connects to one of the more technical certifications, for the most part, the hiring authorities are not demanding them.  


Read More

As Risks Expand, So Does Security's Responsibility

Somewhere in the planning of the Security 500 Conference, I realized it would not be possible to turn the long list of security’s responsibilities from this year’s benchmark study into a readable slide. Nor was it prudent to punish our attendees with multiple lists of unmemorable threats and vulnerabilities. With more than 50 unique items in play; from managing investigations (97 percent) to overseeing insurance (15 percent); the business executives that manage risk and security for their enterprises all expressed this common theme:

         


Read More

Stun-Gun-Armed Officers Result in Workplace Violence Drop in Hospitals

 Approximately 11,370 healthcare and social assistance workers were the victims of workplace violence assaults in 2010 – a 13-percent increase over such assaults in 2009, and many more incidents likely go unreported, according to the Bureau of Labor Statistics.  


Read More

68% of Healthcare Data Breaches Due to Device Loss

Over the past three years, most healthcare data breaches were the result of lost or stolen devices, not hacking (only 23 percent). For records breached, 76 percent were the result of a loss or theft. 


Read More

55% of Americans Fear Social Security Number Theft in 2015

 Sixty-one percent of Americans believethat their data is not secure, according to a survey from PKWARE. Theft of financial and identity information causes the most concern among respondents, with the leading data at risk cited as Social Security numbers and banking information, including credit cards.  


Read More

Improves Decision-Making and Response Time

 Modeled after the “battlefield awareness” concept developed by military operations, this tablet app is designed for ease of use, speed of information-sharing and real-time response in the field.  


Read More

Utilizes Wireless Mesh Network for Fire Detection

 To protect challenging applications and high-cost installations, as well as enterprises in expanding facilities, this system uses a Class A mesh network, where every device acts as a repeater with redundant path communication.  


Read More

Provides Higher Recording Performance, Reliability and Capability

 This line of hybrid and IP camera recorders offer new options to create a performance-optimized solution for demanding, enterprise-scale applications.  


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.