Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Bill Zalud

Articles by Bill Zalud

Training Wheels: From New Tech to Old-Fashion Service

zalud-2016-200px.jpg
Bill Zalud
January 1, 2011
With the increasing introduction of more powerful security systems, is ease of use easy to believe?
Read More

‘Mega’ Hit? More than More Pixels

zalud-2016-200px.jpg
Bill Zalud
January 1, 2011
Bigger isn’t always better and less can beat more. Important keys to the video kingdom now include aspect ratio, actual resolution, frame rate and color rendition. Standards are essential except when they are not.
Read More

Vital Assignment – Keeping the Essentials Going

zalud-2016-200px.jpg
Bill Zalud
January 1, 2011
It was electricity, gas, oil and water back then. But when Congress passed and President George Bush signed the USA Patriot Act of 2001, those and a lot other sectors got bundled into critical infrastructures and suddenly inherited a more intense security profile.
Read More

One Door at a Time

zalud-2016-200px.jpg
Bill Zalud
November 29, 2010
Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time.
Read More

Picturing Next Year’s Video Advances Now

zalud-2016-200px.jpg
Bill Zalud
November 29, 2010
Stow the crystal ball. What rolled out in Dallas at the ASIS International event earlier this fall or even at the spring International Security Conference in Las Vegas may indicate what will be specified next year. But, as in the past with security video and its camcorder chip origins, what’s happening with consumer electronics, computer gaming, homeland security and at the futures conferences of the National Association of Broadcasters may point to more developments.
Read More

Privacy 3.0: Leave Me Alone Goes Away

zalud-2016-200px.jpg
Bill Zalud
November 29, 2010
There was a time when people defined privacy as the right to be left alone, spurred by Supreme Court Justices way back when who saw the need to protect from the intrusion of instant cameras, of all things. Then there was a 2.0 definition that required a person to show harm of a so-called privacy violation in such areas as intrusion upon seclusion, appropriate of name or likeness, publicity given to private life, and publicity placing a person in a false light.
Read More

Beyond Prox, RFID Goes Viral

zalud-2016-200px.jpg
Bill Zalud
November 29, 2010
A prox card is a card is a card unless you do more things with it. And that’s what is happening as radio frequency identification (RFID) in its many increasingly powerful forms becomes a diverse security and business tool to apply to people, vehicles, assets and even processes. Active or passive, more or less intelligent, contact or contactless, with ranges from inches to feet, RFID is suddenly the super solution.
Read More

Temporary but Permanent Security Headache

zalud-2016-200px.jpg
Bill Zalud
November 1, 2010
Temp workers and independent contractors from overseas can be a security and regulatory challenge. One private sector proposal: Advocate Helen Krieble explains the Red Card Solution, a free-market background screening
Read More

Is Green Golden?

zalud-2016-200px.jpg
Bill Zalud
November 1, 2010
Some businesses and consumers are not on board the green bus with the U.S. the most cynical.Look at the bottom of a few emails these days. After the signature and
Read More

Higher Level Credentials Leave Footprint on Card Printers

zalud-2016-200px.jpg
Bill Zalud
October 1, 2010
Enterprise card solutions can enable myriad business applications. One example: Identity cards allow Italians to share and use publicly available bicycles.In enterprise-wide identification card access systems, which came first –
Read More
Previous 1 2 … 10 11 12 13 14 15 16 17 18 … 41 42 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing