Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

One-Third of Event-Goers Fear for their Safety

Michael Quinton
July 23, 2013
An Institution of Occupational Safety and Health (IOSH) poll found more than one in ten people have been hurt at a large sporting or music event in the last five years, while a third of people have experienced a crowd surge.
Read More

Dutch Housing Corporation Relies on Advanced Surveillance for Enhanced Security

July 17, 2013

Rotterdam has long been one of the most dangerous cities in the Netherlands, but the Woonstad Rotterdam Housing Corporation seeks to protect its residents and its investment with advanced surveillance. 


Read More

The Intersection of Hope and Security: Tuscaloosa’s Multi-Layer Surveillance Initiative

July 9, 2013
In 1991, the U.S. Congress established a federal program to develop and test Intelligent Transportation Systems (ITS) and promote their implementation.
Read More

Why Ethical Hacking is the New Face of Cyber Security

Andrew Whitaker
July 9, 2013
The job interview was going well when the young man made a confession: his printer was broken.
Read More

How Low Retention Costs Enterprises

Paul Hughes
July 9, 2013
In at least one way the security industry mirrors the fast food business – the employee turnover rate is nearly 400 percent annually in both lines of work.
Read More

Why Two-Factor Authentication is a Statistical Necessity

Greg Sarrail
June 25, 2013
To minimize risk, two-factor authentication has become a necessity and is now generally being adopted. Two-factor authentication is the combination of two out of the three possible methods (something you know, something you have, something you are).
Read More

How Cloud-Hosted Video Can Benefit the SME and Enterprise Businesses

Jay Krone
June 25, 2013
Storage has never been more important to businesses of all sizes and shapes than it is today.
Read More

19th Century Courthouse Goes Digital with Cloud-Based Access Control

June 20, 2013

The Old Lake County Courthouse (or "The Grand Old Lady") was erected in 1878, but recent renovations led to the space's use as retail and offices, as well as a functioning courtroom, all operating with standard locks and keys. This is where the problems began.


Read More

Surveillance, Evacuation Solutions Enhance Milan's New Driverless Metro

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.
June 17, 2013

Italy's longest metro system now combines video surveillance and public-address communication to manage evacuation measures.


Read More

How to Sort through Big Data for Threat Detection

Vince Walden
June 11, 2013
In the age of Big Data where volume, velocity and variety of data is increasing complexity both internally and externally, integrating new data sources is bringing organizations tremendous opportunities to mitigate threats in new, innovative ways.
Read More
Previous 1 2 … 248 249 250 251 252 253 254 255 256 … 273 274 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing