Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2012 July

Check out our July content!
  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

Solving the Eli Lilly Drug Theft

diane-2016-200.jpg
Diane Ritchey
July 1, 2012
It turned out be the largest theft of prescription drugs in United States history, as described by the authorities, and it was intricately orchestrated and meticulously executed. The late-night operation lasted five hours, with the thieves descending into an Eli Lilly warehouse in Enfield, Conn., cutting a hole in the roof of the warehouse and lowering themselves with ropes after compromising the alarm system. Over the next five hours, they used a forklift inside the warehouse to load the drugs into a tractor-trailer and made off with approximately $80 million worth of prescription drugs, which were loaded into a truck and eventually driven to Florida.
Read More

Featured Articles

Back to Top

Securing Doors in Schools, Hospitals and Detention Centers

July 1, 2012
Many institutions have been haunted by the memories of disastrous shootings and tragedies where, among other things, access control went wrong: Columbine, Virginia Tech, the Triangle Shirtwaist Factory fire.
Read More

Using Education to Prevent Parking Lot Crime

July 1, 2012
The news is frequently inundated with stories on crime in parking areas, whether it’s theft, vandalism, or yet another beating in front of Dodgers Stadium.
Read More

Calculating the Cost of Megapixel Cameras

zalud-2016-200px.jpg
Bill Zalud
July 1, 2012

But how much is it going to cost?

The fastest growing IP camera technologies are high definition and megapixel. One of these new babies can replace two, three or 95 of the old guys, depending on the marketing hype. But, the bottom line is a bottom line. You’ve got to pay for the new stuff.


Read More

Using Video Management Systems for Effective Investigations

zalud-2016-200px.jpg
Bill Zalud
July 1, 2012
It’s a matter of flexibility, contends Colin Adderley. Bryant Garrett adds integration and scalability, in addition to flexibility, to his needs. For Robert Knell, it’s the perfect bundle: a system providing a wide spectrum of features, granular configuration options, creating a highly flexible and customizable solution.
Read More

Columns

Back to Top

How Security Executives Can Leverage Expert Witnesses

Steven C. Millwee
July 1, 2012

Awakened from a deep sleep by the midnight call, the corporate-level chief security officer of this Fortune 500 Company knew he was in for a nightmare. His director of security for the firm’s Texas manufacturing facility was on the brink of panic. “One of our employees gunned down, execution-style, a female coworker at the time-clock, fired multiple shots at other employees, and then blew his brains out in the cafeteria.  The police are here. It’s bad – real bad.”  The CSO knows how the rest of the story will unfold, because local management had severely underestimated future risks when the employee was involved in a serious altercation with the same coworker months earlier.


Read More

Preparing Proactive Sports Security

Mark McCourt
July 1, 2012

“Sport reflects both good and bad aspects of our broader society, whether economic or political issues are in play. The fan that buys a ticket may feel with or against the team, entitled or angry; often as a result of the broader societal environment,” explains Dr. Lou Marciani, Director of the National Center for Spectator Sports Safety and Security. The work at NCS4 primarily benefits its members, professional leagues and division one universities, individual teams and venues. Ultimately, NCS4 serves the fans by providing safety for the enjoyment of spectator events.


Read More

How to Measure the Effect of Megapixels

Keven Marier
July 1, 2012
As the surveillance industry adopts network cameras, it leaves behind the legacy NTSC/PAL-based video constraints. These constraints are mostly characterized as resolution limits. This is a great thing for the security industry as a whole, because the increased level of image detail improves the speed and accuracy of investigations.
Read More

Educating Sports Fans for Positive Security

diane-2016-200.jpg
Diane Ritchey
July 1, 2012

MetLife Stadium, home of the NY Jets and NY Giants and a venue for other sporting and concert events, is cracking down on unruly fan behavior in a big way. Anyone who is ejected from the stadium not only has to pass a code-of-conduct class before being allowed to attend another game, but also write a letter of apology to Danny DeLorenzi.


Read More

How Test Sites Can Decrease Incidents and Increase Buy-In

Marleah Blades
July 1, 2012

One of the many difficult tasks in security leadership is showing senior management and other business leaders exactly how, where, and how much security investments positively impact the bottom line (assuming, that is, that security’s impact is positive).


Read More

Censoring Social Media to Reduce Risk

Bernard Scaglione
July 1, 2012
With the advent of social media, personal and professional identities are beginning to blend together. I am linked, I tweet and am face booked. I have my own space; I can Skype and even FaceTime. By accessing all these sites, my professional and personal lives seem to be getting in the way of each other. In fact, my personal and professional identities are melding.
Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing