Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Gimme Shelter

Kurt Roeper
September 14, 2010
Working in the field of code development is akin to planting redwood trees – it takes a long time to see results, but success leaves a lasting footprint. In May,
Read More

Are your Organization’s Donation’s Secure?

J. Dax Hansen
September 14, 2010
Mobile donations are not new. But the unprecedented success of recent mobile fundraising efforts, such as the Red Cross Haiti earthquake mobile fundraising campaign that raised over $32 million, has
Read More

Workplace Violation and the Panic Button

Johnny Lee
September 14, 2010
It was early afternoon in Boston when an off-duty security guard heard screaming in a clinic he was visiting in New England. Immediately responding, he found a man, Jay Carciero,
Read More

Migrating to IP-Based Physical Security in the Data Center

August 24, 2010
Data centers are no longer just resources to improve processes and productivity, but are becoming vast repositories of sensitive personal, enterprise and government information that dramatically impact how people interact
Read More

Technology for Securing a “Seat” at the Executive Table

Robert Beliles
August 24, 2010
While Internet Protocol (IP)-based security systems have broken down the silos between surveillance, access control, and intrusion detection, Security (e.g. facility / physical security) largely remains isolated from the rest
Read More

Advice to School Administrators: Don’t Let Security Drown in a Flood of Financial Woes

Jeff Floreno
August 10, 2010
Sometimes it seems like this recession will last forever. Month after month, consumers and businesses continue to hold their breath, “making do” with old resources and returning time and time
Read More

It’s Time for CSOs to Spread the Word on Workplace Violence Prevention: If You See Something, Say Something

Mimi Lanfranchi
August 10, 2010
According to Northwestern National Life, one-fourth of employees view their jobs as the leading stressor in their lives. While OSHA reports that work-related homicides have fallen 52% since 1994 to
Read More

Incorporating The Human Element Into Security Systems

Drew Levine
July 27, 2010
Technology is changing the practice of security but still hasn't diminished the importance of the human element. Technologies such as video surveillance, access control, video analytics and command and control
Read More

Protecting Tourist Sites: What Sightseers Don’t See

Bill Farrar
July 13, 2010
On May 1, 2010, an attempt was made to detonate a car bomb in New York’s Times Square during early evening hours when thousands of theatergoers and tourists were visiting.
Read More

Keith Still, Leonard Bonacci and Other Sports Security Professionals to Speak at NCS4 Conference in August

June 22, 2010
The National Center for Spectator Sports Safety & Security announced several more speakers for its annual conference, to be held August 2-4 in New Orleans. Professor G. Keith Still will speak
Read More
Previous 1 2 … 265 266 267 268 269 270 271 272 273 274 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing