This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Blogs » Security Week in Review » The Week in Review: May 26-June 1

The Week in Review: May 26-June 1

USE THIS BLOG LOGO
June 1, 2012
No Comments
KEYWORDS Security News / top stories / week in review
Reprints

The Week in Review 5/26/12-6/1/12

What were the top articles this week? Catch up with your peers and get involved in the conversation!

Check out this little preview of each of this week’s top 10 articles:

Using Crime Data to Drive and Defend Security Resource Allocations: The most enduring theory of W. Edwards Deming – one of the business world’s most respected authorities on organizational theory – was that unless an activity is measured, it cannot be properly managed. Dr. Deming believed that all decision-making must be driven by reliable data, and this once revolutionary concept is now accepted as a fundamental management practice at most corporations around the globe.

Beyond the Numbers: What the Stanley-Niscayah M&A Means for You: When security integrator Stanley Security Solutions announced plans last year to purchase fellow security integrator Niscayah, one of the largest global security firms in Europe and the U.S., for $1.2 billion, the move shook the very core of the security integrator space. The acquisition was large, to say the least: with it, Stanley Security Solutions increases its global presence, and its North American team greatly increased. There are more installation technicians, service specialists, branch employees, supervisors and team leaders. It created a much larger business, growing 30 percent in overall U.S. associates since January 2011. 

DHS Releases List of Monitored Online Keywords: The list of keywords and phrases monitored to determine threats against the U.S. includes the obvious choices – “attack,” “Al Qaeda,” “terrorism” and “dirty bomb.” But some more ambiguous search words were also mentioned, such as “pork,” “cloud,” “team” and “Mexico,” the article says.

Trail Mix: Five Good Ways to Track People: People tracking, overcoming its sometimes Peeping Tom, Big Brother image, boasts both long existing and on-horizon applications that have business benefits, increasing the level of security while also, many times, saving lives.

The Most Influential People in Security – 2011: Each year, Security magazine honors top security executives who positively affect the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and the general public.

Check in with us on August 1 to see who made the list for The Most Influential People in Security – 2012.

Protecting Against the Thieves Within: How to Implement an Effective Fraud Prevention Program: Research conducted by the Association of Certified Fraud Examiners (ACFE) shows that the typical organization loses an estimated 5 percent of its revenues to fraud each year, and more than 85 percent of all occupational fraud cases involve employee theft. The threat of fraud and embezzlement is not only significant; it is universal. Put simply, any company that employs individuals is at risk of losing assets to employee theft.

The Top 10 Open Video Management Systems: In the video surveillance market today there is a plethora of Video Management Systems (VMS). Some are unique that serve very niche markets, while others are the dominate players or market leaders, and in between are the up and coming systems that are challenging the market leaders. In all of these solutions there is one principle: to provide a tool that aids the security professional in the efficient and effective use of surveillance equipment.

Security’s Top 25 People in the Security Industry: Many here speak of the security industry in general, including how to adapt to the changing face of security. But this year, the security industry has experienced blows that call attention to an area that is in desperate need of security beefing up: education and campus security

Multi-Layer Defenses Protect Perimeters: On March 1 of this year, Kenneth Mazik barreled his SUV through a security fence at the Philadelphia Airport and drove onto the runway. Aircraft controllers were given only seconds to divert an incoming commercial jet before collision with the rogue vehicle. Fortunately, airport police and security were well prepared to deal with the incident; as Philadelphia Police Chief Inspector Joseph Sullivan reported on ABC News: “The ground radar kicked in; the tower was alerted immediately and they made sure to divert flights coming in and then quickly shut the airport down.”

SECURITY’s Top Guarding Companies: The guarding business is strong and growing, with firms providing a diversity of services. The top six firms surveyed by SECURITY magazine employ about 19 percent of the total security guards in the United States. And guarding companies say that, on average, hours billed increased by 20 percent in 2002 compared to 2001.

 

Other top news this week includes:

On the Track of OSAC: The Country Council Chronicles, London: By John McClurg

Flame Virus Was Built for Cyber Espionage, Experts Say

ASIS Receives ANSI Approval for Physical Asset Protection Standard

Flame Virus Stirs Up Concern in UN

 

Was your favorite article not listed? Share it with us in the comments section, post it to your preferred social media site, or email me with your notes at meyerc@bnpmedia.com. I look forward to hearing from you!

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing