Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Bill Zalud

Articles by Bill Zalud

Card Printers Catch Up to ID Tech Advances

zalud-2016-200px.jpg
Bill Zalud
January 1, 2009
Anti-counterfeiting has emerged as a more important feature in card printers. Shown is a new Magicard card output called HoloKote, which features a choice of four watermark designs selected via
Read More

What’s In Your Playbook?

zalud-2016-200px.jpg
Bill Zalud
January 1, 2009
Chuck Collins of the Cheesecake Factory depends on the ball carrier, his service provider, when it comes to Web-based monitoring and reporting.Chuck Collins of Cheesecake Factory can access all reports
Read More

Clusters, Clouds and the Future of Storage

zalud-2016-200px.jpg
Bill Zalud
January 1, 2009
It’s in the clouds. For example, Cloudbank appliances from Pivot3 are the hardware platform for the its serverless computing product line. Each Cloudbank includes additional CPU, RAM, and network resources
Read More

Zalud Report: The Art of Theft

zalud-2016-200px.jpg
Bill Zalud
December 1, 2008
Museum security is a delicate balance between many visitors and a lot of expensive and rare artifacts. Security uses officers knowledgeable to customer service and specific displays, protection technologies as
Read More

Is Security Video Scary and Intrusive?

zalud-2016-200px.jpg
Bill Zalud
November 1, 2008
Don’t talk to Charles Hill about privacy and security video.     A Chicago homeowner, Hill has had his fill of vandals and gang bangers spray-painting his property and breaking nearly
Read More

Video Marches Around the Perimeter

zalud-2016-200px.jpg
Bill Zalud
November 1, 2008
At the edge” camera decision-making, less expensive cameras, video motion detection, IP and wireless applications all come together to let security leaders implement security video as a perimeter protection solution.
Read More

Emergencies Call for More

zalud-2016-200px.jpg
Bill Zalud
November 1, 2008
With increasing emphasis on getting emergency messages out to identified populations as well as allowing people to call for help more quickly and easily, the emergency telephone has suddenly taken
Read More

Protecting the Most Important Network

zalud-2016-200px.jpg
Bill Zalud
October 8, 2008
Protecting networked information means that biometrics can be embedded in thumb drives.For the City of London Police, information leakage isn’t just business critical, it is a matter of life
Read More

Images Are Really Information

zalud-2016-200px.jpg
Bill Zalud
October 8, 2008
Ken Amos, director of loss prevention at Walgreens, knows what Kevin Long, David Fowler and Karen Seinfeld are talking about.Amos, who works for the largest provider of retail prescriptions in
Read More

Synergy: Focusing Outside

zalud-2016-200px.jpg
Bill Zalud
October 8, 2008
Target & Blue and its Safe City project is a granddaddy of public-private projects and involves about a score of states, a diversity of technologies and even security industry partners.
Read More
Previous 1 2 … 16 17 18 19 20 21 22 23 24 … 41 42 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing