Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

What Is Needed To Make A Surveillance SOA?

Bob Cutting
November 1, 2011
Perhaps one of the more overused buzzwords of the last decade is “convergence.” While its origins lie in the foundational achievement of the convergence of networking and routing using a common Internet Protocol (IP), telecommunication companies and cable operators have brought this terminology mainstream to describe the passing of voice, data and digital media, such as video, over some common network infrastructure.
Read More

Leadership, Trust, Key to Workplace Violence Prevention

A Book Review
November 1, 2011
This month, Bill Whitmore, Chairman and CEO of AlliedBarton, will release his book, Potential, Workplace Violence Prevention and Your Organization’s Success. “As business leaders, the safety and security of our employees is critical to our operations,” Whitmore says. “As individuals, the well-being of those to whom we have promised a safe workplace is a great responsibility. And in today’s society, implementing safety initiatives and security programs is only the beginning.
Read More

Guarding’s Successful Business Model

diane-2016-200.jpg
Diane Ritchey
October 11, 2011
Communicate security’s value. Save money. Create business efficiencies. Reduce risk. Gene James did that and more. He saved Jack in the Box $1.9 million dollars.
Read More

Expanding Relationships’ Potential

October 5, 2011
SecurityXchange, held this year in Park City, Utah, has come a long way since it was founded shortly after 9/11. Every year, the event gathers integrators and manufacturers together for targeted meetings focused on relationships, both establishing new ones and building into existing relationships, as well as finding new technology solutions. This year, more than 325 scheduled meetings occurred during the event — in addition to the impromptu meetings over lunch, dinner and drinks.
Read More

Dancing to the Algorithms

zalud-2016-200px.jpg
Bill Zalud
October 1, 2011
It started with fairly simple video motion detection, a certain change in pixels raises an alert. Nowadays, algorithms – basically instances of logic to produce output from given video input – have expanded to cover people, behavior, demographics, traffic patterns, objects, vehicles and virtual perimeters. Video analytics has also evolved beyond security to include myriad business applications that can range from highway traffic management to retail merchandizing.
Read More

When Intelligent Video Turns Business Sensible

zalud-2016-200px.jpg
Bill Zalud
October 1, 2011
Brains or beauty? Both are bundled into many of today’s enterprise-sized security video designs, which intelligently apply technology, smartly migrate from analog to digital and wisely solve challenges both security and business related.
Read More

A Risk Mitigation Strategy in Preventing Workplace Violence

Felix P Nater
October 1, 2011
In most corporate sectors those responsible for providing leadership, guidance, perspective and program management are torn between the corporate realities and the unthinkable damage one catastrophic incident of homicidal violence will have on their personal reputation and the corporate image. I am reminded of The 10 Myths of Workplace Violenceoriginally introduced by Dr. John Baron, PhD, arguing the need to implement basic workplace prevention strategies. Of which the most memorable myths that come to mind are “It won’t happen here” and “Workplace violence is not preventable.” Integrating and Collaborating Resources allows for the sharing of the Workplace Violence Prevention Mission through “strategic intervention.” Why? Because it allows for flexibility in managing the program in organizations, eliminates the stovepipe approach and spreads the program management and commitment throughout the organization.
Read More

Surround Sound

Perimeter solutions deter, detect and delay unauthorized security breaches.
Cindy H. Dubin
October 1, 2011
When the 16-acre campus of the new World Trade Center and Memorial and Museum was being designed, architects were solely focused on building the strongest structure they could. But New York City officials targeted their attention to how to secure the perimeter of what is certain to become a significant attraction, expecting to host more than 250,000 travelers per day when it opens in 2014. Diebold, Inc. will design and implement the security system for the facility, where the World Trade Center Transportation Hub will re-establish the transportation infrastructure and facilities in existence before September 11, 2001, and transform Lower Manhattan into the third largest of the transportation center in the city.
Read More

Video’s Cloudy Future

Steve Russell
October 1, 2011

The surveillance industry has seen a massive amount of innovation in the past decade. New technologies, revised efficiency requirements and an information-centric workforce all continue to demand new approaches. However, in most cases, these innovations – ranging from IP networks and remote access to intelligent search technology – lag several years behind similar advancements in the IT sector.


Read More

Proud To Be Security: How Roles Changed After 9/11

diane-2016-200.jpg
Diane Ritchey
September 1, 2011
On Sept. 11, 2001, Stephen Morrill spoke to the FBI, dealt with the media, executed a crisis management plan, comforted a grieving family and assisted company employees get safely home. And all that was all before the end of the business day.
Read More
Previous 1 2 … 60 61 62 63 64 65 66 67 68 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing