Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2012 August

Check out our August content!
  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

The Most Influential People in Security 2012

diane-2016-200.jpg
Diane Ritchey
August 1, 2012
Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and general public.
Read More

Featured Articles

Back to Top

Determining the Right Storage Option for Video

zalud-2016-200px.jpg
Bill Zalud
August 1, 2012
Information storage, according to psycho cybernetics author Paul Thomas, has to take place at the unconscious level. Less psycho– and more cyberfocused, Thomas has – unconsciously, no doubt – managed to get security video storage right, too.
Read More

How to Expand Surveillance Monitoring

zalud-2016-200px.jpg
Bill Zalud
August 1, 2012
Not exactly Maxwell Smart’s Cone of Silence, there was a time when security staff members monitoring blurry CCTV video images on CRTs would look through a kind of cone device to cut down on monitor glare.
Read More

How Enterprises are Detecting Expert Fake IDs

August 1, 2012
Do you have $200 and a computer? You could have an expert-proof fake ID in your mailbox within a few weeks.
Read More

Achieving Effective Access Control on a Tight Budget

August 1, 2012
The problem is ageless – you want outstanding security to protect your organization’s assets, but where does the money come from? CSOs across the globe have to petition their CFOs and other C-suite executives for appropriate funding to meet compliance requirements, keep software up to date and, generally, keep the right doors closed.
Read More

Columns

Back to Top

Securing the City

diane-2016-200.jpg
Diane Ritchey
August 1, 2012
Meet Miki Calero, CSO for the city of Columbus, Ohio. As the city’s top security executive, he establishes and leads the enterprise security risk management program for the 15th largest city in the nation. Calero is also one of Securitymagazine’s 2012 Most Influential Security Executives, featured in this issue. 


Read More

Debating the Future of Cyber Attacks

zalud-2016-200px.jpg
Bill Zalud
August 1, 2012
Afghanistan, Syria, North Korea, Yemen, Somalia. Remember that Barry McGuire 1965 song, “Eve of Destruction?” “The eastern world, it is exploding / Violence flarin', bullets loadin' / You don't believe in war, but what's that gun you're totin'?”
Read More

The Importance of Big Data

August 1, 2012
Big Data Is…. Big! It also poses big risks and big opportunities. As you know, there has been a lot written lately about cloud computing, and due to the platform’s design, cloud computing security. Securing the cloud is the work of technical experts at places like Google, Amazon, NSA and the DOD. And that cloud is being secured more each minute through both better procurement policy and technology.
Read More

Adapting Surveillance for Security-as-a-Service

Keven Marier
August 1, 2012
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to managed surveillance systems, with both private and public cloud deployments.
Read More

Creating an Effective Whistleblower Program

Jim Ratley
August 1, 2012
Whistleblower tips are the most common method of detecting occupational fraud. Research by the Association of Certified Fraud Examiners shows that more than 60 percent of frauds are uncovered by tips; in organizations with a hotline in place, tips expose more than half of all frauds. Further, nearly 40 percent of tips are received from internal employees.
Read More

Communicating Accurate Expectations with Management

Marleah Blades
August 1, 2012
Problem identified and communicated, plan created, funds provided, problem resolved. This is the lifecycle senior business leaders often expect – and prefer – organizational challenges to have. It’s the way decisions are made and issues addressed for many functions of the business.
Read More

Preventing Healthcare Crime With Access Control and ID

Bernard Scaglione
August 1, 2012
In August 2010, the International Association for Healthcare Security & Safety (IAHSS) published a survey of healthcare security executives which revealed an increase in violent crimes within the reporting hospitals.
Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing