Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Week in Review: May 13-18, 2012

May 18, 2012

Happy Friday, faithful Security readers!

I have for you the top-viewed articles of the week for your reading pleasure! Already read them? Leave us a comment and let us know what you thought!

So without further ado, your top stories this week (May 13-18, 2012) are:

SECURITY’s Top Guarding Companies: The guarding business is strong and growing, with firms providing a diversity of services. The top six firms surveyed by SECURITY magazine employ about 19 percent of the total security guards in the United States. And guarding companies say that, on average, hours billed increased by 20 percent in 2002 compared to 2001. Originally published January 16, 2004.

SEC 500: 2011 Rankings: What executives were ranked as Security’s top 500 in 2011? Check our roster and prepare for the 2012 edition in November! Originally published in the November 2011 print edition.

Beyond the Numbers: What the Stanley-Niscayah M&A Means for You: When security integrator Stanley Security Solutions announced plans last year to purchase fellow security integrator Niscayah, one of the largest global security firms in Europe and the U.S., for $1.2 billion, the move shook the very core of the security integrator space. The acquisition was large, to say the least: with it, Stanley Security Solutions increases its global presence, and its North American team greatly increased. There are more installation technicians, service specialists, branch employees, supervisors and team leaders. It created a much larger business, growing 30 percent in overall U.S. associates since January 2011. Originally published in the May 2012 print edition.

Duty of Care: What’s the Security Director’s Role? Duty of Care is a shared responsibility, especially in today’s global economy. As employees cross borders and increasingly work in hostile environments, increased risk is brought to an organization’s most valuable assets: its employees. Originally published in the March 2012 print edition.

How to Hire a Leader: Six Common Screening Mistakes: While employment screening is standard operating procedure for many companies today, some organizations haven’t revisited their policies in some time. Meanwhile, regulatory requirements and best practices have changed. As a result, many organizations unknowingly make common mistakes in employment background screening that can result in undue risks and security gaps. Originally published January 24, 2012.

Security’s Top 25 People in the Security Industry: They contribute to their own organizations, but also influence the security industry and enterprises across the world. This is Security Magazine's second annual spotlight on the Top 25. Originally published December 1, 2007.

Beyond the Box: Security That Works: What do a global news and information company, a large utility, a Fortune 500 electronic commerce and payment processing provider, a diverse hospital and a local government have in common? Originally published in the March 2012 print edition.

Security Officers: A Matter Of Values: Just as justification of technology is really a business decision, so is the application of officers. And, not surprisingly, annual growth in the numbers of security officers matches, and sometimes surpasses, growth of security video and card access controls. Originally published January 26, 2012.

The Top 10 Open Video Management Systems: In the video surveillance market today there is a plethora of Video Management Systems (VMS). Some are unique that serve very niche markets, while others are the dominate players or market leaders, and in between are the up and coming systems that are challenging the market leaders. In all of these solutions there is one principle: to provide a tool that aids the security professional in the efficient and effective use of surveillance equipment. Originally published in the February 2010 print edition.

Core Security Values: Do You Have Them? All too often, we practical folks engaged in the day-to-day operations of our departments dismiss these concepts as superfluous or mere hoops to jump through to please some higher authority. As I’ve been known to preach about, regularly, is the need to market our services to our customers, both internal and external.  One “corporate speak” method of marketing our work with the value added benefit of guiding our decision making is in the form of value statements. Originally published January 26, 2012.

 

Looking for the latest and greatest in news? Here are a few of our most popular news articles published this week:

Breaking News: Tony Byerly Leaving Stanley CSS

Study: Chicago Police Cameras More Effective When Clustered

London Photographers Fed Up with ‘Excessive’ Security

Report: TSA Under-Reports Security Breaches

Silicon Valley Engineer Convicted in Trade Secrets Case

 

Did you have a favorite article you want to share? Want to read more about a particular topic? Leave us a comment or shoot me an email at meyerc@bnpmedia.com.

KEYWORDS: most popular Security News

Share This Story

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing