Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Week in Review: October 20-26

October 26, 2012

Happy Friday, Security readers! Fall is a busy time of year for us here, coming in off of ASIS International in September to hustle right into preparation for our event of the year – the Security 500 Conference.

If you can’t make it, you don’t have to miss out on the experience all together: Attend our free webinar on November 6 to hear Security 500 founder and Security magazine publisher Mark McCourt share his industry insight from the report and the top trends to look forward to in 2013.

But since we know how busy you are, all of Security’s webinars remain archived for a whole year – so if you can’t make it to the live session, you can watch it later whenever you find some free time.

So without further ado, here are your top articles of the past week:

Security Officers: How Changing Titles Changes Perceptions: From Tuesday’s eNewsletter, check out this column to see why security practitioners should take the time to change security guards to security officers, and how much that mental shift can pay off.

The Top 20 Airports for TSA Theft: Nearly 400 TSA employees have been fired so far for theft in the agency’s decade-long existence – does your local airport top the list?

Deciphering Security’s Alphabet Soup of Acronyms: ASTM, IAM, NFC, PIAM – What does it all mean?! If you want a quick refresher course on some of the industry’s many acronyms, check out this Alphabet Soup section and then take a moment to add your own favorite acronym in the comments section!

Shooting at Suburban Milwaukee Mall: After being ordered last week to hand over all of his weapons in a domestic dispute, a man opened fire at his estranged wife’s workplace.

The Top 10 Open Video Management Systems: Another acronym that never fails to befuddle – some VMS (Video Management Systems) are quite unique and serve very niche markets, and other versions apply to a wide range of applications: Which one is right for you?

Security 500 Report to be Released on 11/1: Who will top this year’s Security 500 rankings? Find out on November 1 for the full report.

Online Voter Registration is Vulnerable to Hacking: Data in Maryland online voter registration files may have been left vulnerable to tampering. What practice lead to the this problem?

Report says Cyber-Security Threats Unaddressed by Small Businesses: 77 percent of small- and midsize business respondents in a National Cyber Security Alliance report say their company is safe from cyber threats, but 83 percent have no formal cyber security plan.

How to Hire the Right Security Integrator: Are you planning a new security improvement? Good for you! But make sure that the integrator you choose is the right one – their advice? Test them.

How Cloud Computing Changes Risk Management: How has cloud computing changed the landscape of security, and how can you keep up with the IT-inspired revolution? Find out with our October 2012 cover story.

Plus, don’t forget to check in with us on November 1, at 10 a.m. ET, for the online release of the Security 500 report and the other features from the November edition, such as designing surf-and-turf perimeter security: cutting costs with eco-friendly security: how to get better and more effective mass notification reach; and how to confidently choose a video storage option.

Did you have a favorite article that didn’t make it to our Week in Review segment? Share it in the comments section below!

Oh, and Happy Halloween – check out this “spooky” infographic on the top 10 cyber attacks of 2012.

KEYWORDS: most popular security officer Security trends week in review

Share This Story

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing