Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Columns » Security Talk Column

Security Talk Column
Security Talk Column RSS Feed RSS

Tailgating: A Common Courtesy and a Common Risk

diane-2016-200.jpg
Diane Ritchey
January 7, 2015

 Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations and common courtesy is that they open your building to undocumented and unauthorized entry by individuals who could intend harm to your property and employees.  


Read More

Using Smartphone-Based Access Control to Keep Students Happy

diane-2016-200.jpg
Diane Ritchey
December 1, 2014

 Vanderbilt University has earned many distinctions, including Princeton Review’s top ranking for colleges with the happiest students. The school’s latest endeavor is taking the plunge and going mobile with access control.  


Read More

Closing Cybersecurity Gaps

diane-2016-200.jpg
Diane Ritchey
November 1, 2014

 There is a common plot line that underlies most of the breach stories in the news. Software written by bad guys gets into places on the corporate network where it shouldn’t be. It looks around, finds vulnerable systems, grabs valuable data and transmits it off the network. The term most commonly used to describe this behavior is Advanced Persistent Threat (APT).   


Read More

College Finds Security Awareness Success with Creativity, Videos

diane-2016-200.jpg
Diane Ritchey
October 1, 2014

Training videos can be both effective and fun if you have some imagination and are open to a different approach. The safety and security video that Kishwaukee College in Malta, Illinois, recently developed proves that point. 


Read More

Why You Need Tactical Medical Training

Imagine being at ground zero for the Boston Marathon bombing.
diane-2016-200.jpg
Diane Ritchey
September 1, 2014

Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.


Read More

Creating a Robust Communications System for the 9/11 Memorial

Security at the World Trade Center may be under fire after a few high-profile breaches, but security at the September 11 Memorial Museum is on high alert.
diane-2016-200.jpg
Diane Ritchey
August 1, 2014

To have a successful security design and installation, it is critical to get all security stakeholders in the same room and to establish requirements and goals early. It is important for those goals to relayed to other members of a design team so that all of the needed support services and integration can be vetted.


Read More

Why Customized Cybersecurity Training is Essential

If you asked your employees to define “cybersecurity,” what would they say?
July 1, 2014

By screening a provider for these qualities, you’ll accomplish much more than a manager who simply wants to “check the box” and get it over with. You’ll walk away knowing participants are getting the training that’s right for them, not an endless sea of faceless masses.


Read More

Are Productivity Apps More Harm than Good?

According to the website “Tech Cocktail,” there are some “awesome apps” out there to make employees more productive at work.
diane-2016-200.jpg
Diane Ritchey
May 1, 2014

Banning specific cloud applications is bound to fail. Maintaining a blacklist of cloud applications is ineffective, at best.


Read More

Testing Wireless Security Awareness at RSA

In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014

Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More
Previous 1 2 … 8 9 10 11 12 13 14 15 16 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing