Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Physical

Physical
Physical RSS Feed RSS

As business reopen - how can security leaders prepare for onboarding and hiring of new and old security talent

Preparing to reopen - Rethinking hiring and onboarding

TimLozier
Tim Lozier
May 27, 2021

As the light at the end of the tunnel becomes brighter, rethinking the hiring and onboarding process for security talent can be the difference between recovering out-of-work employees, getting them up to speed, and enduring unnecessary difficulties.


Read More
Amherst College considering armed police officers to be abolished

Amherst College hires consultants to determine whether armed police officers should be removed from campus

May 26, 2021
In an effort to reevaluate campus safety, the college is hiring a third-party to study security and safety needs of the campus community.
Read More
Genetec ALPR solution being used at University of Arizona for COVID-19 vaccination roll out

University of Arizona uses ALPR technology for vaccine roll-out

May 26, 2021

The University of Arizona vaccination site is using ALPR technology to help track vehicles into and out of the POD as well as identify issues in distribution and efficiency.


Read More
Reimagine the corporate security team

Reimagine the corporate security structure

James Blake
James Blake
May 26, 2021

The threat landscape that organizations are facing is changing rapidly. Increasingly, senior leadership of multinational companies will have to think about the impact of an array of physical, cyber and digital risks to their organizations. To mitigate risk within the enterprise, there should be a renewed emphasis on how to restructure corporate security teams and how to reframe them within corporate structure. Here are some practical considerations.

 


Read More
Trafficking and child exploitation training for Securitas security officers

Securitas North America partners with National Center for Missing & Exploited Children to provide extra training

May 25, 2021

The nonprofit National Center for Missing & Exploited Children (NCMEC) will provide focused training on missing and exploited children, correct reporting, and signs of trafficking to more than 100,000 security officers.


Read More
Perimeter protection FLIR

Determining the right combination of visible and thermal imaging for perimeter security

Kai Moncino
Kai Moncino
May 25, 2021

Two common options for surveillance and perimeter protection are visible cameras with near infrared illumination capabilities and thermal imaging cameras—both are optimal for distinct situations. However, optimal lighting isn’t always available or guaranteed, especially when a scenario calls for 24-hour awareness for security applications, including outdoor, remote, or rural locations, or if there is need to see beyond the fence line to identify and react to incoming threats. 


Read More
cctv-security-camera freepik

Five areas where centralized security systems are making urban centers safer

A centralized deployment reduces costs and is easier to use, giving public officials better tools for protecting their citizens.
Bill Brennan
Bill Brennan
May 25, 2021

Breakthroughs in artificial intelligence (AI) and other digital technology, including faster, more affordable bandwidth, are revolutionizing the ways cities conduct surveillance and provide security. Major cities throughout the U.S. are utilizing turnkey systems that integrate video footage, access management, traffic monitoring and body-worn cameras into central high-speed networks. 


Read More
Infant protection technology for healthcare security

Infant protection: Advanced technology can ease the burden on healthcare security personnel

May 25, 2021
Each year, National Missing Children’s Day draws attention to the importance of developing greater protection for vulnerable children. Since more than 40 percent of all infant abductions occur in hospitals, it is crucial for security officers and directors to continue augmenting safety protocols and systems to protect newborns and their parents.
Read More
Frank Figliuzzi talks on security insider risk and brand reputation

Spend 60 minutes learning to protect your corporate brand & reputation in the digital age

May 25, 2021

On June 22, 2021 at 1 pm Eastern, Former Assistant Director, FBI Counterintelligence as well as corporate security executive Frank Figliuzzi, will spend 60 minutes talking about protecting the corporate brand and reputation in the digital age.


Read More
forensic science can detect class a drug use from a fingerprint

Fingerprint technology can detect cocaine use

May 24, 2021

A team of researchers have identified a way to detect whether a person has touched or ingested cocaine using high-resolution mass spectrometry.


Read More
Previous 1 2 … 189 190 191 192 193 194 195 196 197 … 320 321 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing