Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Enterprise Services

Security Enterprise Services
Security Enterprise Services RSS Feed RSS

10 Things to Do Before You Order Public Records

November 8, 2011
To avoid any major misunderstanding about expectations, you should be clear at the outset of what you expect a record retriever to do for you. Below are ten critical aspects of a search that we think are essential to review before you place an order with a public record retriever.
Read More

Counterfeiting in a Bad Economy: The Threats Remain but the Targets Change

Adam Scheer
November 8, 2011
While counterfeiting may not be the “world’s oldest profession,” given its ancient roots and its ubiquity across geographic and cultural boundaries (counterfeit coins were as common in Roman times as Canal Street knock-offs are today), it clearly deserves a place as one of the humanity’s most persistent paths in pursuit of illicit profits. But just because counterfeiting is enduring does not mean that it is unchanging; many of the same macroeconomic drivers, fashion trends and new technologies that inform our preferences at the shopping mall also drive the behavior of the astute counterfeiter. So as the newspaper headlines continue tell us that bad economic times may stay with us for a while, it is worth considering how a challenging economic environment can impact the behavior of the counterfeiter and what brand owners can and should do to fight this threat.
Read More

B.C. to Allow Workers' Comp for Harassment on Job

November 4, 2011

B.C. residents who suffer from post-traumatic stress or are victims of ongoing harassment, violence or bullying in the workplace, will be able to claim workers' compensation under proposed new legislation.


Read More

What Is Needed To Make A Surveillance SOA?

Bob Cutting
November 1, 2011
Perhaps one of the more overused buzzwords of the last decade is “convergence.” While its origins lie in the foundational achievement of the convergence of networking and routing using a common Internet Protocol (IP), telecommunication companies and cable operators have brought this terminology mainstream to describe the passing of voice, data and digital media, such as video, over some common network infrastructure.
Read More

Leadership, Trust, Key to Workplace Violence Prevention

A Book Review
November 1, 2011
This month, Bill Whitmore, Chairman and CEO of AlliedBarton, will release his book, Potential, Workplace Violence Prevention and Your Organization’s Success. “As business leaders, the safety and security of our employees is critical to our operations,” Whitmore says. “As individuals, the well-being of those to whom we have promised a safe workplace is a great responsibility. And in today’s society, implementing safety initiatives and security programs is only the beginning.
Read More
Advancing Security and Well Being Through Localized Efforts

How to More Efficiently and Cost-Effectively Streamline the Programs within FEMA

Joe Wilson
October 25, 2011
The U.S. House of Representatives Subcommittee on Economic Development, Public Buildings, and Emergency Management recently held a hearing in response to newly introduced federal legislation (H.R. 2903 and H.R. 2904). This legislation would set the stage for congress to reauthorize the Federal Emergency Management Agency (FEMA) and two of its expiring programs, while establishing a clear framework for the modernization of its public alerts and warning systems.
Read More

Advancing the University of Colorado Hospital’s Security Program

October 18, 2011
The University of Colorado Hospital, located east of Denver in Aurora, CO, is one of the leading hospitals in the nation. In 2011, UCH was ranked as the best hospital in the Denver metropolitan area and in the top 10 nationally for Best Medical Schools: Primary Care by US News and World Report.
Read More

Guarding’s Successful Business Model

diane-2016-200.jpg
Diane Ritchey
October 11, 2011
Communicate security’s value. Save money. Create business efficiencies. Reduce risk. Gene James did that and more. He saved Jack in the Box $1.9 million dollars.
Read More

Expanding Relationships’ Potential

October 5, 2011
SecurityXchange, held this year in Park City, Utah, has come a long way since it was founded shortly after 9/11. Every year, the event gathers integrators and manufacturers together for targeted meetings focused on relationships, both establishing new ones and building into existing relationships, as well as finding new technology solutions. This year, more than 325 scheduled meetings occurred during the event — in addition to the impromptu meetings over lunch, dinner and drinks.
Read More

5 Ways Security Should ‘Go Green’

Bill Taylor
September 27, 2011
Protection is a core mission of the security department, whether protecting facilities, people or assets. Now it's time for security to embrace an additional protection mission and to incorporate it into every aspect of security operations. Let's look at how the security department can help to protect the environment.
Read More
Previous 1 2 … 359 360 361 362 363 364 365 366 367 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing