Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2008 July

  • Cover Story
  • Featured Articles
  • Columns
  • All Stories

Cover Story

Back to Top

The Art of Leadership

Marleah Blades
July 1, 2008
According to Miki Calero, CSO for the City of Columbus, Ohio, you can’t overestimate the impact of a personal touch. “People respond to you if you care about them,” Calero
Read More

Featured Articles

Back to Top

My Turn: An Only Slightly Cynical Dictionary of Security Terms

Dr. Roger Johnston
July 1, 2008
Roger G. Johnston, Ph.D., CPP, offers his My Turn only slightly in jest. He is a vulnerability assessor in physical security on the Vulnerability Assessment Team at Argonne National Laboratory
Read More

At the Start of Private Security, Evolution is Evident

zalud-2016-200px.jpg
Bill Zalud
July 1, 2008
Security at industrial and manufacturing facilities has evolved thanks to contract security officer firms as well as the use of technology such as Secure Trax from Wackenhut.Those executives who cover
Read More

Beyond Analysis; Into Business Solutions

zalud-2016-200px.jpg
Bill Zalud
July 1, 2008
The key to the future of intelligent video is the uses of the technology beyond security. At the Video Content Analysis conference I co-chaired earlier this year, Hal Weaver, capital
Read More

From Cable to Enterprise Fiber and Wireless Mesh

July 1, 2008
One of the world’s largest independent multi-user container terminal operators uses a network recorder platform and digital cameras to manage workflow as well as safety training. Loading and unloading containers
Read More

Get Value from Online Training

July 1, 2008
Many companies spend millions of dollars per year on training for their personnel. While this investment can produce significant benefits, it also creates numerous challenges, including employee scheduling and productivity,
Read More

How to Stop Document Disasters

Stephen Hoey
July 1, 2008
Chief security officers, often working with their legal counsel, need to protect paper-based documents. “Every enterprise should include backup for paper documents as well as computer documents,” advised Stephen Hoey.Are
Read More

Image Transmission – IT with Alarm Monitoring

July 1, 2008
Davidson College in North Carolina has recently upgraded its security system from phone lines to IP. Looking for a way to reduce recurring operating costs for the system, the IT
Read More

The Herd Instinct

John J. Strauchs
July 1, 2008
Call it the herd instinct. Many creatures herd together for the protection provided by being part of the larger group. So why shouldn’t security executives? There are many personalities in
Read More

Mobile Device – Where Logical and Physical Come Together

Krishna Laudenslager
July 1, 2008
Security executives and enterprise officials can use tools to physically protect mobile devices as well as the information contained in them. One example is software-based “black-listing” applications. Just like physical
Read More

Political DDoS Around the World

Dr. Jose Nazario
July 1, 2008
Distributed denial of service (DDoS) attacks are designed to overwhelm a target network with resource requests, leaving the victim unable to handle legitimate requests. These can come in many forms,
Read More

Seeking Certification: Personal, Business Reasons; But What About Insurance?

David Shepherd
July 1, 2008
It’s time that insurance companies provide premium reduction programs recognizing appropriate risk and security certification.Does There Need to be a Change? Daily newspaper articles and television news broadcasts draw audiences
Read More

Planning and Communication: Physical Security Asset Control

Doug Peckinpaugh
July 1, 2008
The design of a monitoring station in a bank building in Lexington, Ky., shows the need for designers and systems integrators, working with security, to match the surveillance and aesthetics
Read More

The Rights and Wrongs of Strategic Planning

Dr. Rebecca Staton-Reinstein
July 1, 2008
Strategic planning has made a comeback worldwide. Companies, governmental agencies and nonprofits and their security departments are all adopting it.     Although strategic planning has been around for years and
Read More

Why Change is so Hard – And How to Handle It

Dr. Gary Bradt
July 1, 2008
Natural leaders respond quickly and boldly to the circumstance of change by taking steps to reestablish a sense of balance for themselves, and his/her followers, according to Gary Bradt.Imagine that
Read More

Wireless Access Tech in the Fast Lane

July 1, 2008
Vehicle access control has a diversity of solutions including wireless and biometrics-based applications. Less than a decade ago, highway transit authorities needed a convenient, user-friendly way to identify vehicles and
Read More

Columns

Back to Top

Can You Outshine an Outsource?

Steve Hunt
July 1, 2008
Had a busy day zipping around the D.C. beltway recently. Checked my e-mail a dozen times on my PDA, which gets the e-mail feeds from an outsourced mail server and
Read More

Do Tight Budgets = Loose Security?

Mark McCourt
July 1, 2008
Feature articles and columns not in this month’s issue include: Criminals Face Downsizing Due to Slow Economy Organized Crime Cuts Capital Spending Gas Prices Affect Hacker Activity, Reducing Attempts 25
Read More

From Good to Great

Ray Dean
July 1, 2008
Having been in this industry for over 34 years, I have been involved with and known many security directors. Some very well – some just in passing, but I have
Read More

Mission Essential Vulnerability Assessments – Try Them, You Just Might Like Them

Jeffrey Dingle
July 1, 2008
When security is an issue, does money ever stand in the way? While we’d like to think money is not a problem, when there is a security need, in reality,
Read More

Smart Technology Version 2.0

Cynthia Freschi
July 1, 2008
Last month in this column I had the opportunity to talk about “smart” surveillance and how under this umbrella of smartness, video surveillance is evolving from a reactive to a
Read More

All Stories

Back to Top

42-inch Commercial Grade LCD Display Unit Available

July 1, 2008
Compiled by Erin J. Fellores Large commercial grade monitors have been proven to be a valuable asset when used in hospitality, retail and myriad security uses. Tatung now offers a
Read More

Carrying On After a Disaster

zalud-2016-200px.jpg
Bill Zalud
July 1, 2008
Natural disasters that are weather related can create more of a security threat to the business and its employees than more rare terror and violence threats.The more often you test
Read More

Cost, Installation Time Cut with Network Installation

July 1, 2008
SEGRO, a property investment and development company headquartered in the , has installed a security video system at the Kings Norton Business Centre, in Rather than hard-wiring the system, SEGRO
Read More

Department of Defense Selects Information Assurance Scholarship

July 1, 2008
Compiled by Bill ZaludThe Department of Defense (DoD) has selected a Capella University graduate student to receive its Information Assurance Scholarship, which is a full-ride scholarship that the DoD created
Read More

Intercom Works with Electronic Access Control, Analog Systems

July 1, 2008
Compiled by Erin J. Fellores For smaller buildings that need a reliable intercom system, check this one out. Aiphone has released a master station, which complements its AX Series intercom.
Read More

NVR Surveillance Kit for Office Installations

July 1, 2008
Compiled by Erin J. Fellores This NVR is part of the new generation of digital surveillance solutions to provide immediate surveillance, yet is an affordable answer for the enterprise. QNAP
Read More

New All-Optical Active Fiber Protection Switch

July 1, 2008
Designed for mission-critical applications such as homeland security, military, defense and perimeter security, this fiber protection switch fits in standard rack frames, or can be converted to a standalone module.
Read More

Open-Architecture Video Management Software Offered

July 1, 2008
Compiled by Erin J. Fellores An enterprise can be more effective when systems operators can easily monitor and manage numerous events in real-time with a comprehensive video surveillance solution. Datacom
Read More

Security Magazine Exclusive: ASIS International Seminar

July 1, 2008
Compiled by Bill Zalud In mid September, thousands of security management practitioners will head to the . ASIS 2008 expects to bring together thousands of security, business and government professionals
Read More

Loss and Gain; Tears and Commitments

zalud-2016-200px.jpg
Bill Zalud
July 1, 2008
Security officers and supervisors were the primary purpose of Ron Minion, who established the International Foundation for Protection Officers. There are just a few people that make a great impact
Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing