Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2015 July

What can enterprises across every sector learn from sporting event security? Start with planning, customer service and teamwork. Also, learn how Wal-Mart is boosting its associates’ emergency preparedness and how to outfit your in-house security officers. Read all of this and more in the July 2015 issue of Security.
  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top

Featured Articles

Back to Top

2015 RSA Conference: Challenge Security Thinking

July 1, 2015

 The theme for RSA 2015 was the title of this article and sound advice in an era fast evolving into a global IoT (Internet of Things) environment. Two (of many) trends discussed at the show highlighted that digital crime has accelerated globally, and the attack surface (read criminal opportunity) of the IoT vastly compounds this growth rate. 


Read More

Finding Force Multipliers for Port Security

zalud-2016-200px.jpg
Bill Zalud
July 1, 2015

Ports – sea, air and land – handle people and cargo. And they need to be secured. Dr. Daniel J. Benny knows the need. At Embry-Riddle Aeronautical University, Dr. Benny now offers a Bachelor of Science degree in aviation security. This program is designed to produce graduates qualified to enter aviation security, intelligence, military, homeland defense and corporate aviation security communities, either as entry-level career professionals or as mid-level managers.


Read More

Minimizing Risks from Contractors and Temporary Employees

zalud-2016-200px.jpg
Bill Zalud
July 1, 2015

Businesses and government agencies see value in using temporary workers, contractors and subcontractors. Nothing could go wrong. Right?

Wrong. Things could go very, very wrong.


Read More

Megapixel Cameras for Business Value

zalud-2016-200px.jpg
Bill Zalud
July 1, 2015

It turns out that the hype about higher and even higher resolution security video is both real and unreal. The drums are now beating about 4K video but, according to end users and the experts, today’s megapixel sweet spot is 2 megapixels. It provides the image clarity, fits into many budgets and can work with most network infrastructures.


Read More

Columns

Back to Top

Finding Career Success Through Self-Assessment

Brennan-2016-200px.jpg
Jerry J. Brennan
Mattice-2016-200px.jpg
Lynn Mattice
July 1, 2015

Have a clear understanding your values, skills and interests; focus on your future profession; set clear goals based on your strengths; know your next step; obtain new learning and skills you will need; and establish a diverse communication network – these steps will increase your chances of career success and job satisfaction.


Read More

Using Continuous Evaluation to Thwart Insider Threats

Bob Liscouski
July 1, 2015

Before November 2009 little attention was paid to the silent threat cultivating inside of the U.S. Army. That all changed when a common U.S. Army officer, Major Nidal Hasan, killed 13 soldiers and injured 30 others during a shooting spree in the morning hours of November 5, 2009, at Fort Hood, Texas. The significance of insider threats has been reiterated with the shooting at the Washington, D.C., Navy Yard, and the intentional crashing of a Germanwings jet into the French Alps.


Read More

Securing the Physical Side of Cybersecurity

Chabinsky-2016-200px.jpg
Steven Chabinsky
July 1, 2015

Mention cybersecurity and immediate thoughts turn to technical controls such as firewalls, endpoint detection and patching systems. While these and other technical controls certainly are necessary, they must work in tandem with administrative and physical controls in order to form a mature risk mitigation program. This month, we will explore some of the physical aspects of cyber risk management, which inherently relies upon on-site security personnel and employee training for proper execution.


Read More

Employee Screening Boosts Security at Miami Airport

diane-2016-200.jpg
Diane Ritchey
July 1, 2015

Over the past few months, airport security hasn’t exactly made good headlines. Except for Miami International Airport. Unlike other airports across the U.S., Miami International Airport screens all employees that enter and exit the secured area of the airport. Miami has four checkpoints for employee screening, seven access gates for inspections of vehicles entering into the airfield, random background checks of employees and a mandatory security awareness class. Last year, the airport confiscated 209 employee ID badges for security violations. The airport has nearly 38,000 employees with ID badges, and 35,000 who have access to restricted areas. I spoke with Lauren Stover, Director of Public Safety and Security at Miami-Dade Aviation Department at the Miami International Airport (MIA) about the proactive stance that she and her team take each day.


Read More

Departments

Back to Top

Americans Are Hackers' Favorite Credit Card Fraud Targets

July 1, 2015

Nearly half of all credit card fraud around the world occurs in the U.S., although Americans account for just a quarter of global card volume, according to a recent Barclays report, which claims that the reason for the disproportionate fraud is that the U.S. still relies on outdated magnetic stripes, which are easy for hackers to replicate or manipulate.


Read More

ASIS 2015: Opportunities for Security Education

July 1, 2015

The ASIS International Annual Seminar and Exhibits has supported the growth of security professionals from vocation to profession. This year’s 61st Annual Seminar and Exhibits – Evolve 2 Advance (ASIS 2015) – will step up the game once again. It will run from September 28 through October 1 at the Anaheim Convention Center in Anaheim, California.


Read More

Small Businesses Get Hit Hardest by Employee Theft

July 1, 2015

Nearly 72 percent of U.S. federal actions involving employee theft in 2014 involved small businesses – organizations with fewer than 500 employees, according to the 2015 Hiscox Embezzlement Watchlist. Within that group, four of every five victim organizations had fewer than 100 employees, and more than half had fewer than 25 employees.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding on screen

This Website Exposed ICE Data — Now, It’s Faced a Cyberattack

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing