Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2013 December

In the December issue of Security Magazine, read about the Top Security Trends and Innovations for 2014, the future of big data and the lessons that were learned at the Security 500 conference this year. Also, read up on how schools are working towards better security after Sandy Hook and how the generational technology gap has affected security.
  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

Top Security Technology and Innovations in 2014

Technology has become ingrained in enterprise security operations.
December 1, 2013

Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.


Read More

Featured Articles

Back to Top

How Emergency Messaging Aids Access Strategies

Getting the word out, correctly, in time and to the right people, is an important mission for colleges and universities.
zalud-2016-200px.jpg
Bill Zalud
December 1, 2013

Mass notification has become a key element of campus safety and security. John Dellacontrada, assistant vice president of media relations at the University of Buffalo, New York, says he sought a “solution that we could deploy quickly and consistently, one that would work on desktop and mobile devices to get a message broadcast via various ways and that could work with our existing emergency public address system.”


Read More

How Mesh Networks Form the Backbone of Smart Cities

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.
zalud-2016-200px.jpg
Bill Zalud
December 1, 2013

Overall, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways.


Read More

The Future of Big Data for Retail and Property

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.
Steve Van Till
Steve Van Till
December 1, 2013

As interesting as Big Data can be for finding patterns in the past, its biggest promise for security lies in being able to predict the future.


Read More

Columns

Back to Top

Securing Schools After Sandy Hook

Last year, on December 14, 20-year-old Adam Lanza fatally shot 20 young children and six adults at Sandy Hook Elementary School in Newtown, Ct.
diane-2016-200.jpg
Diane Ritchey
December 1, 2013

It was the second deadliest mass shooting by a single person in American history, after the 2007 Virginia Tech massacre, and the second deadliest mass murder at a U.S. elementary school. As a mother of two young children, I am still anguished over “Newtown,” as the events are often referred to. Guy Grace is, as well.


Read More

How the Generational Security Gap Affects Security

Despite concerns about technology, clearly Americans still have a hard time unplugging.
zalud-2016-200px.jpg
Bill Zalud
December 1, 2013

I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.


Read More

Studying the Pros and Cons of Proprietary Wireless Surveillance

There are many examples within the technology industry of proprietary being considered better than standards-based systems.
Keven Marier
December 1, 2013

There are many examples within the technology industry of proprietary being considered better than standards-based systems. This certainly is the case within the Wireless Mesh Network (WMN) industry. These providers tend to be small and niche-based network manufacturers servicing specific industries.


Read More

What to Expect When Working with Cyber Cops

What your company, as a victim of a computer intrusion, should expect when working with the Feds.
Chabinsky-2016-200px.jpg
Steven Chabinsky
December 1, 2013

 

In last month’s column, we explored the Top Five Reasons to Report Computer Intrusions to Law Enforcement.  This month’s column will provide you with a sense of what your company, as a victim of a computer intrusion, should expect when working with the Feds.


Read More

How to Keep Up With Governance Risk

Establishing and maintaining a culture across the enterprise that is based on unwavering ethical practices from the boardroom to the lowest level employee is also a key element of effective governance programs.
Mattice-2016-200px.jpg
Lynn Mattice
December 1, 2013

One of the most important topics currently on boardroom agendas focuses on governance. Ensuring that the enterprise understands and complies with laws, regulations, policies and procedures is no longer simply enough.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing