This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Authors » Diane Ritchey

Articles by Diane Ritchey

Sports Security

Balancing Security and the Fan Experience in Sports Security

Entertaining the public is a unique animal.
Diane 2016 200
Diane Ritchey
July 1, 2014

All major sporting event organizers face great challenges in the development and enhancement of effective emergency management capabilities.


Read More
Day/Night Cameras

Maintaining Awareness with Day/Night Cameras

River Islands has been advertised as the ideal place to raise a family because of extensive surveillance technology, security checkpoints and other policing strategies.
Diane 2016 200
Diane Ritchey
July 1, 2014

Violent crime has either steadily declined or increased, depending upon the part of the country, although consistent budget cuts are one reason that lawmakers in some municipalities have been forced to hire fewer police officers when new camera equipment will do.


Read More
Cut the Cord

Tracking Employees On-the-Go with Smartphone Apps

More than a quarter of U.S. households have ditched their landline phones and gone 100-percent mobile
Diane 2016 200
Diane Ritchey
July 1, 2014

The youngest households are abandoning landlines in droves. About two-thirds of households led by people ages 15 to 29 relied only on cellphones in 2011, compared with 28 percent for the broader population.


Read More
Security Branding

2014 Security Leadership Issue: Building Security's Brand for Better Buy-in

In a wired world that is also full of risk, an enterprise’s reputation can be destroyed in hours.
Diane 2016 200
Diane Ritchey
June 1, 2014

We share threat information throughout all areas of the organization, we coordinate response events, mitigating controls and we also report to our executive staff and regulatory group on incidents and events. My organization was formed to reduce reputational, financial, operational, and compliance related risks.”


Read More
Wried or Wireless?

Adopting Wireless Video to Tackle Covert Surveillance Operations

Crime and vandalism are down with wireless video.
Diane 2016 200
Diane Ritchey
June 1, 2014

The results have been amazing: over the course of six months, more than 100 arrests have been made for outstanding warrants, gun violations, underage drinking, drug possession and robbery. Crime and vandalism are down; hikers and bikers feel safe again visiting the area.


Read More
Viakoo

How to Make Unreliable Video Reliable

At any given time, 30 percent of an IP video network does not work properly.
Diane 2016 200
Diane Ritchey
June 1, 2014

Viakoo detects and alerts customers to anything that threatens, degrades or stops a video stream from the camera across the network to the recording disks; every 20- minutes. It also points to the probable cause and what corrective action should be taken


Read More
Security Talent Gap

Why the Security Talent Gap Is the Next Big Crisis

The next national security crisis may be a lack of ability to mitigate or respond to such an attack because frankly, there’s no one available to mitigate the attack or respond to it.
Diane 2016 200
Diane Ritchey
May 1, 2014

The battle means that companies might be in danger of losing simply because they lack the manpower to deal with it. The battle means that companies looking for more security staff aren’t going to find them – they’re going to have to create them.


Read More
Security Talk

Are Productivity Apps More Harm than Good?

According to the website “Tech Cocktail,” there are some “awesome apps” out there to make employees more productive at work.
Diane 2016 200
Diane Ritchey
May 1, 2014

Banning specific cloud applications is bound to fail. Maintaining a blacklist of cloud applications is ineffective, at best.


Read More
Perimeter security

How to Protect an Ever-Expanding Perimeter

Four New York-area men were arrested after a BASE jumping stunt from atop One World Trade Center.
Diane 2016 200
Diane Ritchey
May 1, 2014

The museum’s exhibits guide visitors along an interactive walk that reveals the unique influences and challenges that shaped George Bush’s life and presidency. Visitors can explore and learn about the most important events of the 20th century, from World War II through the Persian Gulf War.


Read More
Tornado Alley

Managing Mass Communication in Tornado Alley

Tornado Alley is a colloquial term for the area of the United States where tornadoes are most frequent.
Diane 2016 200
Diane Ritchey
May 1, 2014

That’s where mass notification systems come into play, as well, as is the case with MillerCoors’ Fort Worth, Texas, brewery, which is located in Tornado Alley and sees about 25 tornadoes each year. The brewery employs 105 employees spread across 150 acres, and it brews 9 million barrels a year. It houses an on-site refrigeration system with 150,000 pounds of ammonia to assist with the brewing process.


Read More
Previous 1 2 … 14 15 16 17 18 19 20 21 22 … 30 31 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

Empty conference room

Cyber risk is a business risk

CT scanner

Cybersecurity threats to medical devices are a growing concern

map of US with lights over major cities

Security leaders share thoughts on Biden's cyber strategy announcement

laptop phone.jpg

31% of organizations had users fall for phishing attack

Ferrari-Interior.jpg

Ransomware attack exposed Ferrari customer data

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

April 6, 2023

Do Employees Feel Safe at Work? New Data for 2023

Employees don’t feel prepared to navigate an increasingly dangerous world, and they expect their employers to not only care about their personal safety, but to actively keep them safe. 

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing