Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

John Dailey: Life Happens Here

Mark McCourt
November 1, 2014

 And Duke’s security team assures it. “Thinking about the higher education and healthcare facilities at Duke, it is amazing what occurs on a given day. Students learn something that will change their life. Another person’s life will be saved at the hospital. A researcher will make a discovery that changes quality of life for others. There may be a wedding in the chapel. There is a high likelihood Duke will compete for or win a national sports championship. And we have celebrity speakers and lecturers visiting frequently. This is a very rewarding, exciting and dynamic environment,” Chief Dailey explains.  


Read More

Gregory Halvacs: Protecting the Last Mile

Claire Meyer
November 1, 2014

The nature of providing health care services is changing, particularly as the focus shifts from hospital-based care to providing care in more cost-effective settings. The introduction of the Affordable Care Act and other key drivers are making it increasing important for health care providers, and their supply companies, to reduce costs for customers and patients, says Greg Halvacs, the Chief Security Officer and Senior Vice President for Global Security, Flight Operations and Global Real Estate at Cardinal Health, a health care services company based in Dublin, Ohio.


Read More

How Technology Helps Mitigate Risk at Sporting Events

Sarah Ludwig
October 1, 2014

Out of sheer necessity, sports security has been evolving rapidly since the Boston Marathon bombing, and most sports security professionals refer to that particular event as a turning point. Metal detectors have become commonplace in major league stadiums, new security policies have been formed, and even tailgating was banned at this year’s Super Bowl.


Read More

Upgrading Security by Migrating from Keys to Cards, Apps and More

Sarah Ludwig
October 1, 2014

Imagine the day when you can check-in and choose your hotel room using your mobile phone. You may soon be able to do that at Hilton hotels, as the chain says it will offer digital check-in and room selection at 11 of its brands, across more than 4,000 properties.


Read More

Intelligent Video for Intelligent Enterprise Security

diane-2016-200.jpg
Diane Ritchey
October 1, 2014

What makes video intelligent? For MARTA, Atlanta’s rapid transit authority, it’s having an intelligence-based analytics solution that teaches itself to recognize and alert on unexpected patterns within massive volumes of data, continues its rapid growth in the mass transit industry as more agencies choose to implement the award-winning behavioral recognition software as part of their public safety initiatives.


Read More

Counting Up PSIM Benefits for the Business

diane-2016-200.jpg
Diane Ritchey
October 1, 2014

 It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.  


Read More

Supply Chain Management Best Practices for 2014 and Beyond

diane-2016-200.jpg
Diane Ritchey
October 1, 2014

 In August, Ryder System Inc. received recognition as a “2014 Great Supply Chain Partner” for the 12th consecutive year. The 12th Annual List was  the result of a six-month online poll in which supply chain professionals were asked to nominate vendors and service providers whose solutions have made a significant impact on their company’s efficiency, customer service and overall supply chain performance.  


Read More

The Most Influential People in Security 2014

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.
diane-2016-200.jpg
Diane Ritchey
September 1, 2014

This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.


Read More

Mitigating Workplace Violence Risks with Awareness, Deescalation

Workplace violence incidents happen every day, in every industry, and statistics show reports that these events are on the rise.
Sarah Ludwig
September 1, 2014

Depending on the environment you’re in, physical safeguards such as desks, railings and panic buttons can be helpful deterrents. “You don’t want to make it look like a prison, but at the same time, you can make minor modifications that help protect.


Read More

4 Challenges to Address in Corporate Cyber War

We are fighting a cyber war and need to take proactive steps to protect ourselves and our companies as the virtual bullets fly.
David Elfering Ron Woerner
September 1, 2014

Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.


Read More
Previous 1 2 … 37 38 39 40 41 42 43 44 45 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing