Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Web Exclusive Blog

The Week in Review: September 22-28

September 28, 2012

Good afternoon, Security readers – are you gearing up for the weekend? It looks like we’re going to have some awesome weather here in Chicago, and I hope your hometown will have the same.

So while you’re outside enjoying the fall colors and perhaps sipping some hot coffee (or cider if you’re feeling particularly festive), take a moment to leisurely catch up on the top news from Security magazine! Luckily for you, we’ve gathered it all together in this convenient weekend reading guide.

So kick back, grab your computer, tablet or smartphone and scroll through the latest and greatest articles from the security industry.

1.       Managing Risk on the Global Stage: Did you get a chance to read over September’s cover story yet? Don’t be left out on our most popular article of the month – how global leaders are managing the risks that inevitably accompany doing business abroad.

2.       Why Healthcare Records Are a Hacker’s Holy Grail: From this week’s Security eNewsletter, read up on why healthcare records are such an attractive target to hackers. Here’s a hint – your credit card information is worth $1 on the black market. How much is your medical ID number worth?

3.       7 Methods for Better Perimeter Surveillance: Effective perimeter security often hinges on accurate intrusion detection – how can intelligent video systems help to eliminate false alarms and increase trust in your program?

4.       Aurora Shooting Victims Sue Theater Owner over Lack of Security: Three Colorado moviegoers who were wounded when a gunman opened fire at a July screening of The Dark Knight Rises sued the owner of the theater for failing to provide adequate security procedures, equipment and personnel.

5.       Flight Attendant’s Gun Fires at Airport Security Checkpoint: Oops – this flight attendant told police that she forgot the gun was in her carry-on bag as she left for work that morning.

6.       Smartphone Apps Streamline Mass Notification: Get on a train or walk around a college campus – how many smartphones do you see? With these new smartphone apps, each one of those phones is now a portal to two-way emergency communication and mass notification.

7.       Report: Most Data Breaches Caused by Employees: According to new research, the majority of data breaches are caused by rather mundane events, such as employees losing or unwittingly misusing corporate data, instead of insidious plots from hackers.

8.       Riot at Foxconn Factory in China Blamed on Harsh Security Officers: A 2,000-worker riot at the Chinese facility that manufactures iPhone components was reportedly initiated by a brawl between abused assembly-line workers and harsh security officers.

9.       Three Lessons to Learn from Aviation Checkpoints: The TSA catches all kinds of flack for one pat-down or another, but there are definite things you can learn from airport security, such as the need for speed, unorthodox technology and solid training.

10.   Handling Stress in Crisis Management: Just because someone’s the CEO of the company does not necessarily mean that he or she is right to be a part of a crisis management team. Contributing writer Dean Correia reports on how to pick your group wisely.

11.   10 Training Tips for Crime Prevention on Campus: How can you adequately prepare your security officers for emergencies such as shootings or violence incidents on campus? These tips are simpler to follow than you think.

                So there you have it folks – the top news of the week from Security magazine. And don’t forget to check in with us next week for brand new features and columns from the October edition! 

Here’s your sneak peek from the cover story, Cloud Computing’s Potential:

It wasn’t long ago that “cloud computing” was a marketing term being thrown around. And now? There’s been a marked shift towards cloud-based services. Research firm Gartner recently predicted that the market will grow 19.6 percent to $109 billion by the end of this year.

The advantages that it can offer an enterprise are numerous, including the creation of business efficiencies, value, business flexibility and scalability and more.

KEYWORDS: most popular Security News security risk management week in review

Share This Story

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing