Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

The Future of DHS Partnerships with Frank Taylor

In its recent Quadrennial Homeland Security Review, the Department of Homeland Security outlined its strategies for becoming a more integrated and agile agency
diane-2016-200.jpg
Diane Ritchey
August 1, 2014

Ultimately, with a public-private partnership, what you put in is what you get out, says Wesley Bull, Senior Director/Head of Global Protective Services at NVIDIA, a company that invented the GPU – the engine of modern visual computing.


Read More

Sneak Peek: ASIS 2014 Security Technology

Take a look at the product preview for ASIS 2014.
Claire Meyer
August 1, 2014

Take a look at products from Honeywell, Axis Communications, HID Global and more.


Read More

Special Report: Cyber Risk and Security

The word of the year, so far, with regards to cybersecurity, seems to be “data breach.”
diane-2016-200.jpg
Diane Ritchey
August 1, 2014

When asked specifically about the underlying technologies of a credit or debit card, Americans responded favorably, with 69 percent stating that EMV chip cards are making their debit and credit card transactions more secure, with only five percent feeling chip cards make their transactions less secure.


Read More

Securing Parking Lots with Infrastructure and Lighting

More than 110,000 property crimes occurred every year in commercial parking lots and garages between 2004 and 2008, according to the Bureau of Justice Statistics.
Claire Meyer
August 1, 2014

The key to gaining the full benefits of your security system is getting in early, Moreno says. If security can introduce plans for parking security technology before construction starts on a structure, the department can save up to 40 percent on infrastructure.


Read More

Boosting Detection with Video Analytics

Can a high-tech, high-cost video surveillance system be wasted on its monitors?
August 1, 2014

According to Royce Jeffries, the VP of Security Risk Management for Cornhusker Bank, the area had been affected by “lane gang crimes” – thieves break into vehicles or homes to take wallets and checkbooks. Then they drive to the bank with a check and the account holder’s ID, go to the furthest drive-through lane, often in disguise, and try to cash checks.


Read More

Investigating Beyond FBI Fingerprinting

Massachusetts, the state recently started requiring FBI fingerprint-based criminal background searches for teachers and other school employees.
David C. Sawyer
August 1, 2014

The extent to which each state reports records to the FBI varies widely. The federal government acknowledges that it’s possible to obtain more accurate information from professional background screeners.


Read More

How Federal Background Checks Are Changing

The Snowden leaks, the Navy Yard shooting, and recent evidence that the U.S. Office of Personnel Management’s primary background check contractor all have forced the federal government to look at changing the way it does background checks.
Sarah Ludwig
August 1, 2014

The report from June 4, 2014, stated that one USIS employee turned in more than 15,000 investigations in one month, translating to about 21 screens every hour of every day during that month, which has raised red flags.


Read More

Balancing Security and the Fan Experience in Sports Security

Entertaining the public is a unique animal.
diane-2016-200.jpg
Diane Ritchey
July 1, 2014

All major sporting event organizers face great challenges in the development and enhancement of effective emergency management capabilities.


Read More

Maintaining Awareness with Day/Night Cameras

River Islands has been advertised as the ideal place to raise a family because of extensive surveillance technology, security checkpoints and other policing strategies.
diane-2016-200.jpg
Diane Ritchey
July 1, 2014

Violent crime has either steadily declined or increased, depending upon the part of the country, although consistent budget cuts are one reason that lawmakers in some municipalities have been forced to hire fewer police officers when new camera equipment will do.


Read More

Adapting Surveillance and Video Analytics for High-Stakes Ports

Surveillance and ports seem to go hand in hand
Claire Meyer
July 1, 2014

According to Greg DeCanio, the Chief of Law Enforcement at LIMA, the new video management system provides airport security personnel with “the ability to access video at our computers, making us more efficient and letting us monitor activity for security and law enforcement purposes at the touch of a button.”


Read More
Previous 1 2 … 39 40 41 42 43 44 45 46 47 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing