Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Background Checks on College Students: Lessons Learned the Hard Way

David C. Sawyer
January 24, 2012
Sometimes tragedy creates change for the better –a sad reality that is being illustrated on campuses across the country as an increasing number of colleges mandate background screenings for students, particularly those enrolled in health science programs.
Read More

How to Hire a Leader: Six Common Screening Mistakes

Rob Pickell
January 24, 2012
While employment screening is standard operating procedure for many companies today, some organizations haven’t revisited their policies in some time. Meanwhile, regulatory requirements and best practices have changed. As a result, many organizations unknowingly make common mistakes in employment background screening that can result in undue risks and security gaps.
Read More

Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

Karen Krivaa
January 10, 2012
The rate at which many technologies are evolving is astounding. Just think what today’s smartphone can do, how email and the Internet have changed our work lives, or how the fax machine — though useful — is now considered outdated. This rapid evolution brings us many new opportunities; it also raises the challenge of what to do with systems, technology and equipment that are still functional, but no longer as effective. Security and surveillance markets in particular are affected by these exponential advancements.
Read More

How to Provide Usable Evidence that Stands Up in Court

Mark S. Wilson Fred Zagurski
January 10, 2012
When all is said and done, there are three variables in providing the type of recordings that the courts want.
Read More

Tracking Your Company’s Employees in 2012

Three Top Challenges to Tracking Travelers Globally
John G. Rendeiro
January 10, 2012
The Arab spring along with the Japan crisis, and most recently, the floods in Thailand, have brought the topic of tracking travelers to the forefront for many security professionals but, even more importantly, so have the challenges in doing so. Here are three main challenges that continue to exist with tracking travelers globally today.
Read More

5 Factors for Creating a Hardened Vehicular Perimeter Security System

David Dickinson
December 13, 2011
Most everyone understands keeping military bases, embassies, courts, nuclear plants and other hard targets safe from terrorists. However, today, we must also keep retail shoppers safe, shield structures from accidental or intentional automobile crashes, protect hotel patrons from suicide car bombers, and keep employees and visitors from vehicle-based harm. From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of organizations find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter. For those areas where a vehicle will never enter, fixed bollards and barriers are the norm. However, at entrances, barriers that go up and down are needed to let authorized vehicles through.
Read More

How to Get Accurate Thermal Analytics at Mainstream Prices

John Romanowich
December 13, 2011
Achieving effective security over perimeters and outdoor areas often comes down to detection accuracy and solution cost. While there are a number of options available for perimeter security, thermal video analytic cameras have become a strong contender for best-of-breed in this arena.
Read More

The Top 5 Considerations of IP and Trade Secret Theft Investigations

Jim Scarazzo Veeral Gosalia
December 13, 2011
The biggest threat to a company's intellectual property doesn't come from the outside; it comes from within. According to a recent study, the U.S. Chamber of Commerce estimates that 75% of employees steal from the workplace.
Read More

Fighting Crime With Flower Power

Harry Erickson
November 22, 2011
Sure, most parts of the U.S. may be headed for a long winter, but spring will eventually come! And with it comes an opportunity to fight crime.
Read More

Flash Mob Crimes: Twitter That!

Joshua Sheppard Dean C. Alexander
November 22, 2011
An emerging methodology with technological roots – flash mobs – enables individuals using social networking sites (e.g., Facebook.com, Twitter.com, or Meetup.com), instant messaging and email to gather at a particular location, date and time and carry out legal or criminal activities (e.g., sabotage, robberies, and beatings).
Read More
Previous 1 2 … 261 262 263 264 265 266 267 268 269 … 277 278 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing