Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Web Exclusive Stories

Web Exclusive Stories
Web Exclusive Stories RSS Feed RSS

ASIS 2011 Boasts Robust Showcase of New Products and Services

August 8, 2011

Outside of the classrooms and general sessions, the ASIS 2011 exhibit floor will be abuzz with activity around some of the most innovative security products and services the industry has to offer. The challenge for many will be in navigating the more than 700 exhibits across 230,000+ square feet to find the best solutions. 


Read More

5 Ways to Safely Destroy a Hard Drive

Responsible Hard-Drive Destruction — Let’s Get Real
Andrew Kelleher
July 26, 2011
It’s no secret that our computer hard drives contain a lot of things we’d rather keep secret. Because the information security field is my home turf, I’m troubled by some of the loose talk I hear about how to destroy used drives. There is a whole lot of bad advice online, especially.
Read More

Video Quality in Live and Recorded Environments

Why your intuition on the best choice may lead you astray
Charles Foley
July 26, 2011
There are a number of aspects of 'conventional wisdom' in the realm of physical security that just don't add up, that smack of having their origins in "the salesman made me do it," which under close scrutiny turn out to be absolutely backwards or even dangerous.
Read More

Want Voice? Better Have $$$

In-building mass notification without fire alarm upgrade headaches
Timothy Means
July 12, 2011
Remember back when we were kids and heard the fire alarm bell in school? On cue, we lined up in an orderly manner and dutifully marched out of the classroom single file, no talking, and keep your hands to yourself. The super loud fire alarm bell and the discipline of the fire drill was all that we needed to know to be safe. How times have changed!
Read More

The Multi-Layered Approach: 4 Ways to Secure Your IT Assets

Stephen Midgley
July 12, 2011
When it comes to preventing the loss and theft of mobile assets within the enterprise, there is no one-stop-shop security solution. However, the need has never been greater as mobile devices become more prevalent and hold more sensitive data.
Read More

The Challenge of Multiples: How to Manage Physical Security Information in a Multi-Building Campus

Gadi Piran
July 12, 2011
Multi-building campuses such as universities, research facilities, convention centers, hospitals and others face unique problems in implementing a total physical security solution.
Read More

AlliedBarton’s Security Program Strengthens Message that Public Transportation is Safe

July 11, 2011

The Santa Clara Valley Transportation Authority in California provides public transportation for more than 140,000 passengers a day. The VTA has approximately 1,700 employees supporting three bus divisions and a light rail division. The transportation system consists of about 600 low-floor buses that service 326 square miles of urbanized area daily and a light rail system which operates more than 100 low-floor light rail vehicles across 42.2 miles of rail.


Read More

Screening Employees and Contractors Crucial in Reducing Workplace Violence

William Tate
June 28, 2011
A Society for Human Resource Management (SHRM) workplace violence survey found that more than 50% of the respondents were concerned that workplace violence might occur at their organization. According to the Bureau of Labor Statistics, an average of 564 work-related homicides occurred each year in the United States from 2004 to 2008.
Read More

Observe and Report: Does it Work?

Brownyard headshot
Tory Brownyard
Steve Buckley
June 28, 2011
“Observe and report” security officers have gained popularity with private security firms over the past five years. These officers, when faced with danger or a need for physical intervention, are supposed to radio the police or authorities trained to handle dangerous situations. They do not intervene.
Read More

Standards: The Realities of a True Best of Breed Approach

Jonas Andersson
June 14, 2011

The ability to design and install a truly comprehensive, long-term security solution for your organization depends on the technology of more than one manufacturer. 


Read More
Previous 1 2 … 262 263 264 265 266 267 268 269 270 … 275 276 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing