Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

Refocusing Security from Terrorism Detection to Criminal Activity

Dick Pirozzolo
October 1, 2012
In the decade after 9/11, antiterrorist training and strategies have focused on combating the threat from without – al Qaeda and Muslim extremism, with the bulk of our human and technology resources going into public transportation facilities.
Read More

Protecting Campus Gateways with Guardhouses

zalud-2016-200px.jpg
Bill Zalud
October 1, 2012
Phillip Riordan, vice president for student life at Lynn University, Boca Raton, Fla., has added a third gatehouse recently to provide access control to his campus. But he knows that the guardhouses are more than modular buildings.
Read More

How to Hire the Right Security Integrator

October 1, 2012
Security integrators play an interesting and integral role in the security industry – they are part salesman, part customer service agent, part repairman, engineer, consultant… the list could continue. So with all of these competing roles, how do you, as a security executive, sort through the options to find a security integrator who will work with you in the long-term, not just plug in the cameras and walk away?
Read More

Managing Risk on the Global Stage

diane-2016-200.jpg
Diane Ritchey
September 4, 2012
Bart Szafnicki follows the news every day. Mainly, it’s because his colleagues will be racing towards the action to break or report on a story. Szafnicki is Vice President Corporate Security for Turner Broadcasting System, Inc. (TBS, Inc.), which has brands and businesses all over the world, including CNN.
Read More

Mesh Networks Multiply Security Resources in Cities, Communities

September 4, 2012
How far does one camera feed go – to a dispatcher or monitoring station? What if it could go to every security vehicle in an organization – giving security personnel minute-by-minute updates on what’s happening and where their services are most needed? With wireless mesh, it can, and more.
Read More

Applying Business Focus to Government Security

zalud-2016-200px.jpg
Bill Zalud
September 4, 2012
Jim Frankild sought out technology to improve his situational awareness. Timothy Phelps wanted security video for judge-pleasing evidence. Wes Hill created a unique metropolitan area network. J.B. Van Hollen rolled out a crime alerting system. In Chicago, at the NATO Summit earlier this year, one of the world’s most sophisticated integrated security systems bridged myriad transportation, school, street and even home cameras to safety contain protesters. And Bryant Garrett finally turned in his VCRs for state-of-art technology. Then there is Ken Deck, who had to concentrate on protecting a vulnerable perimeter.
Read More

Making Sense of Business Travel Security Awareness

Peter Crittenden
September 4, 2012
“Forewarned, forearmed; to be prepared is half the victory.” - Miguel de Cervantes When unexpected security situations arise with travelers abroad, there is a marked difference in response between trained individuals and those who are untrained. When facing security or safety challenges, the trained traveler or expatriate responds in accordance with what they have been taught and learned; they have protocols and pre-briefed responses as threats present themselves.
Read More

How Video Analytics, Big Data Impact Retail Security

zalud-2016-200px.jpg
Bill Zalud
September 4, 2012
For some retail enterprises, Big Data can include smaller steps such as the integration of security video into a sprawling mall of information. Another pet from the information technology arena, Big Data is a loosely-defined term describing data sets so large and complex that they become awkward to work with using traditional database management tools.
Read More

Surveillance in Schools Promotes Safety, Understanding

September 4, 2012
When voters in the Longview Independent School District (ISD) in east Texas approved a $266.8 million bond issue in 2008, it paved the way for construction of seven new elementary schools, three new middle schools and a complete renovation of Longview High School. Recognizing the critical need for a secure environment for students, staff and school visitors, the bond also provided funding for a new, district-wide video surveillance system.
Read More

Sport Security Conference Debates Active Shooter, Weather Protocol

September 4, 2012
Aurora, Colorado. Penn State. The Indiana State Fair. These recent tragedies were clearly driving the agendas of speakers and attendees at the 2012 National Sports Safety and Security Conference and Exhibition in New Orleans early last month. The conference, hosted by the National Center for Spectator Sports Safety and Security (NCS4), tailored its speaker lineup around some of these recent issues – active shooter protocol, sexual misconduct policy and weather risk mitigation.
Read More
Previous 1 2 … 53 54 55 56 57 58 59 60 61 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing