Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Blogs » Security Blog

Security Blog
Security Blog RSS FeedSubscribe

The Security Blog is curated by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Tell Integrators About Your Needs

October 4, 2007
LinksTell Them Here
Read More

HDAS? It’s a High Density Analytics Server

October 4, 2007
Advanced video analytics technology – software that analyzes video from cameras to identify and alert on specific events and behaviors – is a key element of effective video surveillance systems
Read More

Choctaw Nation Relies on Casino Surveillance

October 4, 2007
Zalud’s Blog just discovered that the Choctaw Nation of Oklahoma has deployed over 300 IQeye cameras for surveillance of gaming tables and public areas, and current plans call for expanding
Read More

Advanced Accelerator Board for Super Family Of Controllers

October 4, 2007
Continental Access now offers a high-tech Accelerator Board to provide performance improvements to any SuperTerm or Turbo SuperTerm family of controllers. Improvements include faster downloads, larger cardholder capacity, faster processing
Read More

NVT's Digital EQTM UTP Video Receiver Hubs

October 4, 2007
Network Video Technologies (NVT) tells Zalud’s Blog it released a range of three revolutionary Digital EQTM UTP Active Receiver Hubs. The NV-872, NV–1672 and the NV-3272 are 8-, 16-, and
Read More

Clemson Implantable Biochip Not for Smart Weapons

October 1, 2007
A News & Analysis report in the September issue of Security Magazine described a unique biochip project at Clemson University. A spokesperson there requested that Security clarify that the individual
Read More

Integral Technologies Selects IQinVision as Strategic Partner

October 1, 2007
Integral Technologies IqinVision to its roster of best-of-breed partners. The IQinVision IQeye family of multi-megapixel network cameras is fully integrated with Integral’s DigitalSENTRY video surveillance product line.   The
Read More

Intelligent Video Offers Electric Utilities a Solution to Copper Theft

October 1, 2007
With the price of copper holding steady at well over three dollars per pound during the last 12 months, increasing numbers of criminals are engaging in metal theft. Among the
Read More

Sielox and EasyLobby Fully Integrated Access Control/Visitor Management Solution

October 1, 2007
Sielox and EasyLobby told Zalud’s Blog of an add-on software module that tightly integrates Sielox’s Pinnacle and EasyLobby's SVM (Secure Visitor Management) software. As part of the announcement, Sielox has also
Read More

University Keeps Files Accessible and Secure While Improving Staff Safety

October 1, 2007
With over 2,976 full-time undergraduate students attending the University of Richmond at any one time, the Admissions Office is always a busy place. Between senior graduations and freshman applications, the
Read More
Previous 1 2 … 161 162 163 164 165 166 167 168 169 … 173 174 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing