Security Hot Spot: Protecting Reception Areas 

By James Gompers

It's really easy to overlook lobbies and reception areas when it comes to designing and implementing an overall security strategy. After all, security...

Strategic Security and the Facilities Manager 

By Jim Crumbley

Corporate America has realized the strategic importance of the security function and has taken great pains to fully integrate risk mitigation into business...

Hand in Hand 

By Jacqueline Emigh

Physical security professionals have traditionally lived in a very different world from the folks in information security (IS). More and more, though,...

The Human Element 

James Gompers

Although equipment failure is often cited as a major factor in breaches of security, it is impossible to ignore another significant element human error....

Data Collection Is Key To Program Management 

If you can't measure a security program, how can you manage it? Apart from the daily operations, managing a security program can take many avenues that...

Engaging Your Guard Force: Five Considerations For A Retention Program 

Officers are the backbone of a security program. Managers should take action to ensure that there is a professional and responsive team on hand to provide...

Automating Risk Response 

Michael Fickes

Two days after the terrorist attacks of Sept. 11, 2001, Doug Pasley and another risk management officer with the Tampa police department received orders...

Managing Risk and Protecting the Organization: A Military Team Approach 

By Daniel Ward

During the 1990s, the Department of Defense (DoD) established so-called Force Protection Programs with the purpose of increasing awareness of the threat...

12 Questions To Ask Before You Spec a Guard Booth 

By Dave King

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here...

Tapping the Power of Multi-Location Remote Monitoring 

By James Gompers

From manufacturing and corporate offices, to municipal and federal governments, there are many environments that can benefit from multi-location remote...

Terrorism In All Its Forms 

Noel Cummings, president of Scanna MSC Ltd., Sarasota, Fla.

Modern terrorism is not confined to traditional extremist, nationalist or separatist terrorist groups with political and religious agendas to further,...

GET THEIR ATTENTION 

by Corrina Stellitano

The event occurring in Washington, D.C., that morning was beyond the nightmares of most Americans, and working on the upper floors of the Gannett and...

Clearly Speaking 

BY JAMES GOMPERS jgompers@gtdgrp.com

With today's integrated security solutions, both video surveillance and audio surveillance can be leveraged for higher levels of verification and risk...

Working With Consultants: Getting Results 

By MARK PICKETT, CPP

Today's security professionals have to be innovative; they cannot falter, they usually have smaller budgets than they need, and they always have to be...

The Bumpy Road To Integration 

By MICHAEL J. BONANNO

In 1999, Covington & Burling, an international law firm with more than 500 lawyers practicing in Washington, New York, San Francisco, London and Brussels,...

Filling In The Blanks: The Basics Of Report Writing 

Thomas W. Leo

A report is a recording of facts onto a permanent, formal document or record initially it may be in verbal form. It may be used in criminal or civil court...

The Basics And Beyond 

BY JAMES GOMPERS

In almost every building, in almost every industry, in almost every country, security professionals lay the foundation of their asset protection plans...

DESIGN BUILD OR NOT? GOOD QUESTION 

By ROGER B. HUTCHINS, CPP

Whether one is an experienced security services buyer or a novice, it is a good idea to consider all the options. And fundamental to the choices is what...

AMAZING TRANSPARENT SYSTEMS 

By JEFFREY A. DINGLE

Security is at the forefront of many companies' priorities, but the realities of cost, aesthetics and security's impact on convenience have prevented...

Biometrics: The Basics 

James Gompers

DEFINITION Here's a quick definition of biometrics: As it pertains to security, biometrics is an emerging field of technology devoted to identification...

Hiring a Consultant 

Don Buzzelli

Hiring an independent security consultant has many advantages: an objective perspective; a new outlook on old problems; and new ideas and solutions resulting...

Flexibility Makes It Happen 

By CORRINA STELLITANO

Major surgery can be a traumatic experience. For almost 25 years, Boston Scientific Corp. has introduced less-invasive therapies and medical devices designed...

Little Cards, Big Payoff 

by JAMES GOMPERS

The ID badge, or card, is one of the most insecure aspects of security in popular use today. Counterfeiting and fraud take place at all levels of security...

Call a Consultant 

by JAMES GOMPERS

Integration is a buzzword, but how many of us know exactly what it means and what benefits it has for end-users? I think end-user frustration grows, in...

Don't Let Them Hurt Our Children 

With federal and state agencies working feverishly to reduce their exposure to terrorist attack, and with elevated threat levels on the minds of Americans,...

Previous | 1 | 2 | 3

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top