Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

Centralizing Hospital Credential Management at the Touch of a Finger

February 28, 2012
Requiring busy professionals to juggle multiple passwords in their stressful, fast-paced, mission-critical duties is extremely difficult. Enterprise single sign-on (ESSO), in tandem with the security and superior performance of biometric sensors, is essential in healthcare applications where security is a must but where it cannot interfere with critical care technicians.
Read More

What Does Risk Cost Your Business?

Drew Levine
February 14, 2012
One of the most crucial issues for businesses right now is managing risk. After all, risk, if left unchecked, can be a serious drain on budgets and assets. While risk comes in all shapes and sizes, identifying which incidents cause the biggest danger to your company is critical to protecting your business. Let's consider the possible economic ramifications of risk on business operation
Read More

Infinity Screening: Why Background Checks Should Never End

Barry Nixon
Barry Nixon
February 14, 2012

New screening tools are becoming available that will help businesses be informed about their employees as it relates to professional licenses, certifications, driving records, criminal convictions, immigration status, etc. Having this information will help firms make better decisions that will mitigate the risk associated with many employment decisions including promotions, transfers, etc. and whether employees continue to qualify for the position they hold.


Read More

Why You Can’t Afford to Ignore Video Analytics

Chuck Westfall
January 24, 2012
In this age of heightened security, the sheer quantity of video needing to be monitored from cameras observing sensitive locations can be a daunting challenge for security professionals at all levels. Added to this task is the expense and potential fallibility of dedicated personnel hired to scrutinize video displays for extended periods of time.
Read More

Background Checks on College Students: Lessons Learned the Hard Way

David C. Sawyer
January 24, 2012
Sometimes tragedy creates change for the better –a sad reality that is being illustrated on campuses across the country as an increasing number of colleges mandate background screenings for students, particularly those enrolled in health science programs.
Read More

How to Hire a Leader: Six Common Screening Mistakes

Rob Pickell
January 24, 2012
While employment screening is standard operating procedure for many companies today, some organizations haven’t revisited their policies in some time. Meanwhile, regulatory requirements and best practices have changed. As a result, many organizations unknowingly make common mistakes in employment background screening that can result in undue risks and security gaps.
Read More

Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

Karen Krivaa
January 10, 2012
The rate at which many technologies are evolving is astounding. Just think what today’s smartphone can do, how email and the Internet have changed our work lives, or how the fax machine — though useful — is now considered outdated. This rapid evolution brings us many new opportunities; it also raises the challenge of what to do with systems, technology and equipment that are still functional, but no longer as effective. Security and surveillance markets in particular are affected by these exponential advancements.
Read More

How to Provide Usable Evidence that Stands Up in Court

Mark S. Wilson Fred Zagurski
January 10, 2012
When all is said and done, there are three variables in providing the type of recordings that the courts want.
Read More

Tracking Your Company’s Employees in 2012

Three Top Challenges to Tracking Travelers Globally
John G. Rendeiro
January 10, 2012
The Arab spring along with the Japan crisis, and most recently, the floods in Thailand, have brought the topic of tracking travelers to the forefront for many security professionals but, even more importantly, so have the challenges in doing so. Here are three main challenges that continue to exist with tracking travelers globally today.
Read More

5 Factors for Creating a Hardened Vehicular Perimeter Security System

David Dickinson
December 13, 2011
Most everyone understands keeping military bases, embassies, courts, nuclear plants and other hard targets safe from terrorists. However, today, we must also keep retail shoppers safe, shield structures from accidental or intentional automobile crashes, protect hotel patrons from suicide car bombers, and keep employees and visitors from vehicle-based harm. From pedestrian-filled farmers markets and universities to new and used car lots, a wide variety of organizations find peace of mind through the use of barriers, bollards, barricades and crash gates for vehicle-based physical access control at the perimeter. For those areas where a vehicle will never enter, fixed bollards and barriers are the norm. However, at entrances, barriers that go up and down are needed to let authorized vehicles through.
Read More
Previous 1 2 … 256 257 258 259 260 261 262 263 264 … 273 274 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing