Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

The True Cost & Consequences of Vacant Properties

John O'Leary
March 1, 2012
As the nation continues to recover from the worst economic crisis in recent memory, security executives across America are dealing with the difficult consequences of the fallout. Among the greatest contributors to the harsh realities that so many companies face is the growing number of vacant properties, or “dark” locations.
Read More

Top Security Guarding Companies Report 2012

Security Officers: A Matter of Values
zalud-2016-200px.jpg
Bill Zalud
February 1, 2012
Larry McEvoy really digs his job. His firm, CONSOL Energy, a leading diversified energy company, helps generate two-thirds of the nation’s power supply, responsible for mining more high-quality bituminous coal than any other U.S. producer as well as the largest gas producer in Appalachia.
Read More

The Joint Venture and Security’s Role

Jill Knesek
February 1, 2012
Back in October, I was speaking as part of a panel discussion when someone asked about the role security issues should play when an organization is entering into a joint venture. It’s an interesting question and an area where I’ve had some experience.
Read More

Megapixels Can Business-Dazzle, Too

February 1, 2012
So what if Jose Ruano and Steve Weatherly were “blown away,” in Weatherly’s own words, by megapixel cameras. But that wasn’t really justification for a hard-nosed business decision when it came to a next generation of security video technology at the University of Miami, located in Coral Gables in south Florida.
Read More

Beyond the Box: Security That Works

diane-2016-200.jpg
Diane Ritchey
January 3, 2012
What do a global news and information company, a large utility, a Fortune 500 electronic commerce and payment processing provider, a diverse hospital and a local government have in common?
Read More

Social Media, Mobility and the Future of Security Convergence

January 3, 2012
It is hard to imagine any market sector today that is not impacted by the “Big Three” emerging technologies: Social Media, Mobility and Cloud Computing. The holiday shopping season saw “Cyber Monday” come out of nowhere to replace “Black Friday” as a traditional benchmark for consumer spending. New media and technology are being rapidly indoctrinated into our culture.
Read More

Breaking Boundaries: New Directions in Visual Data

Part 3 of 3-Part Series
Steve Russell
January 3, 2012
As the digital transformation of video has progressed, we’ve seen the same sorts of innovations in video that we’ve seen over the years in other realms of information technology. First came video analytics – a market segment that’s still seeing new and smarter software packages emerge every quarter. Then came innovations in storage, with virtualized servers and cloud storage, which have opened up new ways to reduce storage needs and optimize capacity.
Read More

Overcast but Clearing as the Cloud Comes to Security

zalud-2016-200px.jpg
Bill Zalud
January 3, 2012
Already the darling of a growing number of enterprise information executives, going into the cloud has come to their security brethren, bringing the same business advantages but also, not surprisingly, the same risks.
Read More

Under Analysis, Making Business Sense of It All

zalud-2016-200px.jpg
Bill Zalud
January 3, 2012
The Lexus came out squeaky clean. Then came the Chevy, the Buick, the Honda, and more. Autobell, founded in Charlotte, NC, in 1969 by Charles Howard, is now the biggest car wash chain in the southeast. From the beginning, Howard showcased the latest in car wash equipment technology with a focus on the environment and the community.
Read More

Security in 2012: When Better Isn't Good Enough

diane-2016-200.jpg
Diane Ritchey
December 1, 2011
As a general rule, forecasting is a bit of guessing. Even economists, whose job it is to make sense of hardcore data and then give solid analysis, often are reduced to intelligent guessing. But security leaders know better. They know what they’ll likely face in 2012, namely terrorism, workplace violence, fraud, cybercrime, regulatory compliance, natural disasters, theft, intellectual property, brand protection, budget concerns and more – the same trends identified in Security magazine’s 2011 Security 500 report.
Read More
Previous 1 2 … 58 59 60 61 62 63 64 65 66 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing