Security Executives Columns & Features

  • How to build an effective PSIM program from the ground up

    Security executives need to know what should be protected and why to leverage the true power of PSIM

    Article • September 21st, 2013

  • Overcoming IP video migration obstacles

    Panel to weigh in on end user challenges, realizing the benefits of network video at ASIS 2013

    Article • September 20th, 2013

  • Tech Trends: Thermal Imagers Feeling the Shrink

    Nearly everything about infrared is decreasing — including size and, most importantly, cost

    Article • September 17th, 2013

  • Government cyber security programs mandated to go commercial

    DHS initiative seeks to 'leap frog' government technology advances into the private sector

    Article • September 16th, 2013

  • National Cyber Security Hall of Fame 2013 inductees annnounced

    These individuals helped define an industry and secure a nation, Chairman says

    Article • September 9th, 2013

  • Weathering the financial fallout of a data breach

    Why cyber insurance should be a part of your risk mitigation strategy

    Article • September 5th, 2013

  • Sage Conversations: Leading and managing change

    The core competency of 'The Next Generation Leader'

    Article • September 4th, 2013

  • Keeping Agency Information Secure in an Era of New Computing and Risks

    The cloud computing evolution is well entrenched, and has made significant changes to how organizations share, sync, edit, create and collaborate-on content. However, this computing revolution is a double-edged sword. There are benefits—increased...

    Article • September 4th, 2013

  • Collaboration Gets the MBTA into Security's Fast Lane

    The history of mass transportation around the Boston and eastern Massachusetts area goes back more than four centuries. They lay claim to the first working subway system in the North America and one of the earliest motorized bus transit authorities in the...

    Article • September 3rd, 2013

  • On Top of the World

    Social and economic realities are transforming security requirements around the globe, and nowhere is that trend more apparent than among global enterprises. With locations all over the world, these organizations are challenged by the need to operate in a...

    Article • September 3rd, 2013

  • My Point of View Running in Place

    The physical therapist had me jogging on a small trampoline in a hot hallway just off the main therapy room. She apologized that they were backed up because of staffing issues and asked if I minded working on my banged up ankle outside the main workout...

    Article • September 3rd, 2013

  • Multi-Facility Security Standardization

    Inside Yale-New Haven Hospital’s access control and video upgrade

    Article • September 3rd, 2013

  • Success Story: Greenville Health System

    Upgrading the video surveillance and physical security system of a multi-building, multi-campus medical facility takes more than simply adding or changing equipment — it takes ingenuity and perseverance from the client, combined with experienced...

    Article • August 30th, 2013

  • Get With IT Keeping Resilient

    Just when you think everything is humming along nicely in your environment, it hits. That dreaded disaster that you have been thinking about, had only affected other people so far. Well, be it a natural disaster impacting the region or a local power...

    Article • August 30th, 2013

  • Tech Trends SNMP Primer

    For many of us in security, SNMP this could literally mean “Security – Not My Protocol” for all the use we are getting out of it. What SNMP officially stands for is Simple Network Management Protocol — you may have seen it on a configuration...

    Article • August 30th, 2013