Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

How GTRI Practices Could Protect Schools from Violence

Bernard Scaglione
June 11, 2013
As all security experts know, one of the basic principles utilized in securing buildings or institutions is controlling access onto the property and into building by using basic security measures such as security officers, fencing, bars on windows or electronic access control systems.
Read More

How Business Intelligence Becomes an Eco-Research Tool

Scientists in Australia's Rainforests and California's Beaches Use Business Analysis to Collect Data and Save the Ecosystem
June 3, 2013

As environmental regulations increase, industrialization’s effects stretch further and ecological scientists grasp for new ways to collect vital data, some parties are all reaching for the same thing: business intelligence. 


Read More

Why Global Supply Chains Need Global Shared Security Standards

Peter Kant
May 28, 2013
The attempted bombing of two cargo aircraft in October 2010 via hidden explosives inside printer cartridges illuminated one thing to the air cargo industry – it is not immune to terrorism.
Read More

How Outsourcing Can Increase Badging Efficiency and Reduce Cost

David Finkelstein
May 28, 2013
Security officers often deal with photo ID card issuance as an afterthought, but companies should take advantage of the fact that these cards are the most visible daily reminder of security policy.
Read More

4 Steps to Better Mail Screening and Ricin Detection

James Viscardi
May 28, 2013
Recent incidents of ricin being mailed to the White House and members of Congress are a chilling reminder that the mail system continues to be used by those wishing to do harm.
Read More

Chillicothe High School Gets Excellent Results with Megapixel Surveillance

May 16, 2013

Chillicothe High School, in north-central Missouri, has deployed HD megapixel cameras as part of its new IP video surveillance system.


Read More
Security key pad

How to Converge PSIM and PIAM for Total Situational Awareness

Ajay Jain
May 14, 2013
As companies grow, security becomes both a bigger challenge and a more urgent concern. Companies typically add new security systems as they grow, often resulting in an assortment of disparate systems that lack centralized management.
Read More

Securing Mobile Access in the Age of “Consumerized” IT

Simon Bain
May 14, 2013
As budgets are cut or frozen in today’s stagnant economy, the IT department is under increasing pressure to reduce office costs and effect efficiencies by enabling staff to work away from their desks.
Read More

How to Detect and Thwart Recent Fraud Trends

Internal Controls Improve; Collusion Schemes Increase
May 14, 2013
As fraud controls get stronger, criminal elements start teaming up to beat the system. But, as Jason Lelio points out, collusions schemes get harder and harder when faced with stringent internal controls.
Read More

How Boston’s Hotels Maintained Security after the Marathon Bombings

When Trouble Came to Boston, Training and Partnerships Helped it Rally
Michael J. Soper
May 14, 2013
For many of Boston's hotel security directors, the day started like so many other Marathon Mondays, a calm morning full of excitement and anticipation for the events about to begin in the quaint New England town of Hopkinton, 26.2 miles from the Marathon's finish line in Boston's historic Copley Square.
Read More
Previous 1 2 … 254 255 256 257 258 259 260 261 262 … 278 279 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing