Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

2012 Security 500 Rankings

November 1, 2012
The purpose of the Security 500 is to create a reliable database to measure your organization versus others and create a benchmarking program among security organizations. The results will enable you to answer the question, “Where Do I Stand?” as a basis of an ongoing peer review process.
Read More

2012 Security 500 Analysis

November 1, 2012
The purpose of the Security 500 is to create a reliable database to measure your organization versus others and create a benchmarking program among security organizations. The results will enable you to answer the question, “Where Do I Stand?” as a basis of an ongoing peer review process
Read More

Securing Changing Perimeters at the Waterfront

November 1, 2012
When Daniel Casillo swam from his sinking jet ski in New York’s Jamaica Bay last August, he had no idea he was going to be at the center of a huge perimeter security breach.
Read More

Managing Choice and Chance in Surveillance Storage

zalud-2016-200px.jpg
Bill Zalud
November 1, 2012
These days, when it comes to storage of video, it’s choice – not chance – that determines security’s success at meeting its mission with use of technology. This is true for enterprise security leaders at the biggest organizations, where large numbers of cameras create ingest, frame rate, image quality and physical storage cost challenges.
Read More

Gaining a Wider Mass Notification Reach

zalud-2016-200px.jpg
Bill Zalud
November 1, 2012
There are numerous ways to skin the mass notification cat, according to numerous enterprise security leaders. Mass notification is a step up from emergency communications and comprises numerous ways to get the word out to the appropriate people inside and outside buildings as well as through computer networks and mobile devices.
Read More

Cutting Costs with Green Security Measures

November 1, 2012
It’s Easy Being Green,” “Got Green?,” “Green Saves the Planet”— Ecologically-friendly products have come a long way since the early 2000s, when every other newspaper headline touted the novelty of the movement by quoting Kermit the Frog.
Read More

2012 Security 500 Alphabetical

November 1, 2012
Welcome to the seventh annual Security 500 Survey, Benchmark and Trends report, recognizing both our profession’s best security leaders and their outstanding organizations as well as identifying the biggest challenges and targets for where billions of dollars will be invested to manage enterprise risk and improve security.
Read More

How Cloud Computing Changes Risk Management

diane-2016-200.jpg
Diane Ritchey
October 1, 2012

It wasn’t long ago that “cloud computing” was a marketing term being thrown around. And now? There’s been a marked shift towards cloud-based services. Research firm Gartner recently predicted that the market will grow 19.6 percent to $109 billion by the end of this year.


Read More

The Security 500 Webinar

What are the Top 10 Trends Driving Enterprise Security?
October 1, 2012
What are the Top 10 Trends Driving Enterprise Security? Join Mark McCourt, Publisher of Security Magazine, as he delves into the 2012 Security 500 survey! This survey identifies the critical issues leading security executives are focusing on at their organizations.
Read More

Going Beyond Traditional Biometrics for Integrated Solutions

zalud-2016-200px.jpg
Bill Zalud
October 1, 2012
Attention enterprise security leaders: Biometrics, including face and voice recognition, are not only getting better but better integrated with other security technologies and mobile devices to provide higher security, more convenience or both.
Read More
Previous 1 2 … 52 53 54 55 56 57 58 59 60 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing