Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Authors » Bill Zalud

Articles by Bill Zalud

Red cloud service

Choosing Your Business’s Best Cloud Solution

zalud-2016-200px.jpg
Bill Zalud
December 1, 2012
Security, at least its electronic brothers and sisters, has been in the cloud since the beginning.
Read More
University of Kansas shop

Using Asset Tracking for Security and Business

zalud-2016-200px.jpg
Bill Zalud
December 1, 2012
The bottom line may be Wrangler Jeans. Just as security and business applications are blending together through technology, asset tracking, especially in retail, is fitting into enterprises as snug as a pair of blue jeans.
Read More
Bomb squad

Authorities Team Up for Dirty Bomb Responses

zalud-2016-200px.jpg
Bill Zalud
November 1, 2012
There is a dirty bomb music video. There are at least three dirty bomb movies. But, when it comes to reality, such weapons are fairly easy to assemble and activate.
Read More
Power lines

Managing Choice and Chance in Surveillance Storage

zalud-2016-200px.jpg
Bill Zalud
November 1, 2012
These days, when it comes to storage of video, it’s choice – not chance – that determines security’s success at meeting its mission with use of technology. This is true for enterprise security leaders at the biggest organizations, where large numbers of cameras create ingest, frame rate, image quality and physical storage cost challenges.
Read More
Western Washington University

Gaining a Wider Mass Notification Reach

zalud-2016-200px.jpg
Bill Zalud
November 1, 2012
There are numerous ways to skin the mass notification cat, according to numerous enterprise security leaders. Mass notification is a step up from emergency communications and comprises numerous ways to get the word out to the appropriate people inside and outside buildings as well as through computer networks and mobile devices.
Read More
Bully poster

Managing the Threat of Firearms in Schools

zalud-2016-200px.jpg
Bill Zalud
October 1, 2012
I walked every day with a best friend to Wilson grammar school. And, if memory serves me, the most dangerous things in my school life back then were the too-warm cartons of milk and Miss Hildenbrandt, armed with her fiendish ruler.
Read More
ATM machines

Going Beyond Traditional Biometrics for Integrated Solutions

zalud-2016-200px.jpg
Bill Zalud
October 1, 2012
Attention enterprise security leaders: Biometrics, including face and voice recognition, are not only getting better but better integrated with other security technologies and mobile devices to provide higher security, more convenience or both.
Read More
Guardhouse

Protecting Campus Gateways with Guardhouses

zalud-2016-200px.jpg
Bill Zalud
October 1, 2012
Phillip Riordan, vice president for student life at Lynn University, Boca Raton, Fla., has added a third gatehouse recently to provide access control to his campus. But he knows that the guardhouses are more than modular buildings.
Read More
Man in front of security monitors

Applying Business Focus to Government Security

zalud-2016-200px.jpg
Bill Zalud
September 4, 2012
Jim Frankild sought out technology to improve his situational awareness. Timothy Phelps wanted security video for judge-pleasing evidence. Wes Hill created a unique metropolitan area network. J.B. Van Hollen rolled out a crime alerting system. In Chicago, at the NATO Summit earlier this year, one of the world’s most sophisticated integrated security systems bridged myriad transportation, school, street and even home cameras to safety contain protesters. And Bryant Garrett finally turned in his VCRs for state-of-art technology. Then there is Ken Deck, who had to concentrate on protecting a vulnerable perimeter.
Read More
Security forces responding

Nuclear Facility’s Security Breach Draws Attention, Concern

zalud-2016-200px.jpg
Bill Zalud
September 4, 2012
It was about 4:30 a.m. in Oak Ridge, Tenn., when sensors on the perimeter intrusion detection and assessment system alarmed. There was an unauthorized entry into a high-security, protected area. A well-trained and heavily armed guard force responded.
Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 … 41 42 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing