Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Week in Review: May 26-June 1

June 1, 2012

The Week in Review 5/26/12-6/1/12

What were the top articles this week? Catch up with your peers and get involved in the conversation!

Check out this little preview of each of this week’s top 10 articles:

Using Crime Data to Drive and Defend Security Resource Allocations: The most enduring theory of W. Edwards Deming – one of the business world’s most respected authorities on organizational theory – was that unless an activity is measured, it cannot be properly managed. Dr. Deming believed that all decision-making must be driven by reliable data, and this once revolutionary concept is now accepted as a fundamental management practice at most corporations around the globe.

Beyond the Numbers: What the Stanley-Niscayah M&A Means for You: When security integrator Stanley Security Solutions announced plans last year to purchase fellow security integrator Niscayah, one of the largest global security firms in Europe and the U.S., for $1.2 billion, the move shook the very core of the security integrator space. The acquisition was large, to say the least: with it, Stanley Security Solutions increases its global presence, and its North American team greatly increased. There are more installation technicians, service specialists, branch employees, supervisors and team leaders. It created a much larger business, growing 30 percent in overall U.S. associates since January 2011. 

DHS Releases List of Monitored Online Keywords: The list of keywords and phrases monitored to determine threats against the U.S. includes the obvious choices – “attack,” “Al Qaeda,” “terrorism” and “dirty bomb.” But some more ambiguous search words were also mentioned, such as “pork,” “cloud,” “team” and “Mexico,” the article says.

Trail Mix: Five Good Ways to Track People: People tracking, overcoming its sometimes Peeping Tom, Big Brother image, boasts both long existing and on-horizon applications that have business benefits, increasing the level of security while also, many times, saving lives.

The Most Influential People in Security – 2011: Each year, Security magazine honors top security executives who positively affect the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and the general public.

Check in with us on August 1 to see who made the list for The Most Influential People in Security – 2012.

Protecting Against the Thieves Within: How to Implement an Effective Fraud Prevention Program: Research conducted by the Association of Certified Fraud Examiners (ACFE) shows that the typical organization loses an estimated 5 percent of its revenues to fraud each year, and more than 85 percent of all occupational fraud cases involve employee theft. The threat of fraud and embezzlement is not only significant; it is universal. Put simply, any company that employs individuals is at risk of losing assets to employee theft.

The Top 10 Open Video Management Systems: In the video surveillance market today there is a plethora of Video Management Systems (VMS). Some are unique that serve very niche markets, while others are the dominate players or market leaders, and in between are the up and coming systems that are challenging the market leaders. In all of these solutions there is one principle: to provide a tool that aids the security professional in the efficient and effective use of surveillance equipment.

Security’s Top 25 People in the Security Industry: Many here speak of the security industry in general, including how to adapt to the changing face of security. But this year, the security industry has experienced blows that call attention to an area that is in desperate need of security beefing up: education and campus security

Multi-Layer Defenses Protect Perimeters: On March 1 of this year, Kenneth Mazik barreled his SUV through a security fence at the Philadelphia Airport and drove onto the runway. Aircraft controllers were given only seconds to divert an incoming commercial jet before collision with the rogue vehicle. Fortunately, airport police and security were well prepared to deal with the incident; as Philadelphia Police Chief Inspector Joseph Sullivan reported on ABC News: “The ground radar kicked in; the tower was alerted immediately and they made sure to divert flights coming in and then quickly shut the airport down.”

SECURITY’s Top Guarding Companies: The guarding business is strong and growing, with firms providing a diversity of services. The top six firms surveyed by SECURITY magazine employ about 19 percent of the total security guards in the United States. And guarding companies say that, on average, hours billed increased by 20 percent in 2002 compared to 2001.

 

Other top news this week includes:

On the Track of OSAC: The Country Council Chronicles, London: By John McClurg

Flame Virus Was Built for Cyber Espionage, Experts Say

ASIS Receives ANSI Approval for Physical Asset Protection Standard

Flame Virus Stirs Up Concern in UN

 

Was your favorite article not listed? Share it with us in the comments section, post it to your preferred social media site, or email me with your notes at meyerc@bnpmedia.com. I look forward to hearing from you!

KEYWORDS: Security News top stories week in review

Share This Story

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing