According to Miki Calero, CSO for the City of Columbus, Ohio, you can’t overestimate the impact of a personal touch. “People respond to you if you care about them,” Calero
Roger G. Johnston, Ph.D., CPP, offers his My Turn only slightly in jest. He is a vulnerability assessor in physical security on the Vulnerability Assessment Team at Argonne National Laboratory
Security at industrial and manufacturing facilities has evolved thanks to contract security officer firms as well as the use of technology such as Secure Trax from Wackenhut.Those executives who cover
The key to the future of intelligent video is the uses of the technology beyond security. At the Video Content Analysis conference I co-chaired earlier this year, Hal Weaver, capital
One of the world’s largest independent multi-user container terminal operators uses a network recorder platform and digital cameras to manage workflow as well as safety training. Loading and unloading containers
Many companies spend millions of dollars per year on training for their personnel. While this investment can produce significant benefits, it also creates numerous challenges, including employee scheduling and productivity,
Chief security officers, often working with their legal counsel, need to protect paper-based documents. “Every enterprise should include backup for paper documents as well as computer documents,” advised Stephen Hoey.Are
Davidson College in North Carolina has recently upgraded its security system from phone lines to IP. Looking for a way to reduce recurring operating costs for the system, the IT
Call it the herd instinct. Many creatures herd together for the protection provided by being part of the larger group. So why shouldn’t security executives? There are many personalities in
Security executives and enterprise officials can use tools to physically protect mobile devices as well as the information contained in them. One example is software-based “black-listing” applications. Just like physical
Distributed denial of service (DDoS) attacks are designed to overwhelm a target network with resource requests, leaving the victim unable to handle legitimate requests. These can come in many forms,
It’s time that insurance companies provide premium reduction programs recognizing appropriate risk and security certification.Does There Need to be a Change? Daily newspaper articles and television news broadcasts draw audiences
The design of a monitoring station in a bank building in Lexington, Ky., shows the need for designers and systems integrators, working with security, to match the surveillance and aesthetics
Strategic planning has made a comeback worldwide. Companies, governmental agencies and nonprofits and their security departments are all adopting it. Although strategic planning has been around for years and
Natural leaders respond quickly and boldly to the circumstance of change by taking steps to reestablish a sense of balance for themselves, and his/her followers, according to Gary Bradt.Imagine that
Vehicle access control has a diversity of solutions including wireless and biometrics-based applications. Less than a decade ago, highway transit authorities needed a convenient, user-friendly way to identify vehicles and
Had a busy day zipping around the D.C. beltway recently. Checked my e-mail a dozen times on my PDA, which gets the e-mail feeds from an outsourced mail server and
Feature articles and columns not in this month’s issue include: Criminals Face Downsizing Due to Slow Economy Organized Crime Cuts Capital Spending Gas Prices Affect Hacker Activity, Reducing Attempts 25
Having been in this industry for over 34 years, I have been involved with and known many security directors. Some very well – some just in passing, but I have
When security is an issue, does money ever stand in the way? While we’d like to think money is not a problem, when there is a security need, in reality,
Last month in this column I had the opportunity to talk about “smart” surveillance and how under this umbrella of smartness, video surveillance is evolving from a reactive to a
Compiled by Erin J. Fellores Large commercial grade monitors have been proven to be a valuable asset when used in hospitality, retail and myriad security uses. Tatung now offers a
Natural disasters that are weather related can create more of a security threat to the business and its employees than more rare terror and violence threats.The more often you test
SEGRO, a property investment and development company headquartered in the , has installed a security video system at the Kings Norton Business Centre, in Rather than hard-wiring the system, SEGRO
Compiled by Bill ZaludThe Department of Defense (DoD) has selected a Capella University graduate student to receive its Information Assurance Scholarship, which is a full-ride scholarship that the DoD created
Compiled by Erin J. Fellores For smaller buildings that need a reliable intercom system, check this one out. Aiphone has released a master station, which complements its AX Series intercom.
Compiled by Erin J. Fellores This NVR is part of the new generation of digital surveillance solutions to provide immediate surveillance, yet is an affordable answer for the enterprise. QNAP
Designed for mission-critical applications such as homeland security, military, defense and perimeter security, this fiber protection switch fits in standard rack frames, or can be converted to a standalone module.
Compiled by Erin J. Fellores An enterprise can be more effective when systems operators can easily monitor and manage numerous events in real-time with a comprehensive video surveillance solution. Datacom
Compiled by Bill Zalud In mid September, thousands of security management practitioners will head to the . ASIS 2008 expects to bring together thousands of security, business and government professionals
Security officers and supervisors were the primary purpose of Ron Minion, who established the International Foundation for Protection Officers. There are just a few people that make a great impact