Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

What Is Needed To Make A Surveillance SOA?

Bob Cutting
November 1, 2011
Perhaps one of the more overused buzzwords of the last decade is “convergence.” While its origins lie in the foundational achievement of the convergence of networking and routing using a common Internet Protocol (IP), telecommunication companies and cable operators have brought this terminology mainstream to describe the passing of voice, data and digital media, such as video, over some common network infrastructure.
Read More

Leadership, Trust, Key to Workplace Violence Prevention

A Book Review
November 1, 2011
This month, Bill Whitmore, Chairman and CEO of AlliedBarton, will release his book, Potential, Workplace Violence Prevention and Your Organization’s Success. “As business leaders, the safety and security of our employees is critical to our operations,” Whitmore says. “As individuals, the well-being of those to whom we have promised a safe workplace is a great responsibility. And in today’s society, implementing safety initiatives and security programs is only the beginning.
Read More

Guarding’s Successful Business Model

diane-2016-200.jpg
Diane Ritchey
October 11, 2011
Communicate security’s value. Save money. Create business efficiencies. Reduce risk. Gene James did that and more. He saved Jack in the Box $1.9 million dollars.
Read More

Expanding Relationships’ Potential

October 5, 2011
SecurityXchange, held this year in Park City, Utah, has come a long way since it was founded shortly after 9/11. Every year, the event gathers integrators and manufacturers together for targeted meetings focused on relationships, both establishing new ones and building into existing relationships, as well as finding new technology solutions. This year, more than 325 scheduled meetings occurred during the event — in addition to the impromptu meetings over lunch, dinner and drinks.
Read More

Dancing to the Algorithms

zalud-2016-200px.jpg
Bill Zalud
October 1, 2011
It started with fairly simple video motion detection, a certain change in pixels raises an alert. Nowadays, algorithms – basically instances of logic to produce output from given video input – have expanded to cover people, behavior, demographics, traffic patterns, objects, vehicles and virtual perimeters. Video analytics has also evolved beyond security to include myriad business applications that can range from highway traffic management to retail merchandizing.
Read More

When Intelligent Video Turns Business Sensible

zalud-2016-200px.jpg
Bill Zalud
October 1, 2011
Brains or beauty? Both are bundled into many of today’s enterprise-sized security video designs, which intelligently apply technology, smartly migrate from analog to digital and wisely solve challenges both security and business related.
Read More

A Risk Mitigation Strategy in Preventing Workplace Violence

Felix P Nater
October 1, 2011
In most corporate sectors those responsible for providing leadership, guidance, perspective and program management are torn between the corporate realities and the unthinkable damage one catastrophic incident of homicidal violence will have on their personal reputation and the corporate image. I am reminded of The 10 Myths of Workplace Violenceoriginally introduced by Dr. John Baron, PhD, arguing the need to implement basic workplace prevention strategies. Of which the most memorable myths that come to mind are “It won’t happen here” and “Workplace violence is not preventable.” Integrating and Collaborating Resources allows for the sharing of the Workplace Violence Prevention Mission through “strategic intervention.” Why? Because it allows for flexibility in managing the program in organizations, eliminates the stovepipe approach and spreads the program management and commitment throughout the organization.
Read More

Surround Sound

Perimeter solutions deter, detect and delay unauthorized security breaches.
Cindy H. Dubin
October 1, 2011
When the 16-acre campus of the new World Trade Center and Memorial and Museum was being designed, architects were solely focused on building the strongest structure they could. But New York City officials targeted their attention to how to secure the perimeter of what is certain to become a significant attraction, expecting to host more than 250,000 travelers per day when it opens in 2014. Diebold, Inc. will design and implement the security system for the facility, where the World Trade Center Transportation Hub will re-establish the transportation infrastructure and facilities in existence before September 11, 2001, and transform Lower Manhattan into the third largest of the transportation center in the city.
Read More

Video’s Cloudy Future

Steve Russell
October 1, 2011

The surveillance industry has seen a massive amount of innovation in the past decade. New technologies, revised efficiency requirements and an information-centric workforce all continue to demand new approaches. However, in most cases, these innovations – ranging from IP networks and remote access to intelligent search technology – lag several years behind similar advancements in the IT sector.


Read More

Proud To Be Security: How Roles Changed After 9/11

diane-2016-200.jpg
Diane Ritchey
September 1, 2011
On Sept. 11, 2001, Stephen Morrill spoke to the FBI, dealt with the media, executed a crisis management plan, comforted a grieving family and assisted company employees get safely home. And all that was all before the end of the business day.
Read More
Previous 1 2 … 60 61 62 63 64 65 66 67 68 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing