Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 47, No. 5, May

A Healthy Dose of Data Security. (Information Protection)
Businesses that handle sensitive healthcare data have two years to set up systems to protect the data that travels over the Internet if they are to be in compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The following...
Read preview Overview
Antipiracy Efforts Face Uphill Battle. (News and Trends)
In Greek mythology, Sisyphus was condemned by the gods to push a boulder endlessly up a hill. Companies battling piracy and counterfeiting must know how that feels. They spend many millions each year battling the problem, and still they continue to...
Read preview Overview
A Worm's 15 Minutes of Fame. (Tech Talk)
When the Slammer (or Sapphire) worm began to spread across the Internet in January; it did so at a furious pace: The population of infected machines doubled in size every 8.5 seconds, and most vulnerable computers were infected within 10 minutes of...
Read preview Overview
Behind the Scenes: CCTV Trends. (Surveillance Tools)
It's a journey of epic proportions. They're coming from the computer hardware and software world. They're coming from the cabling and connectivity arenas. They're coming from the high-tech imaging sector. And, of course, they're coming from the traditional...
Read preview Overview
Better Backups for Financial Markets. (Tech Talk)
On Monday, September 17, 2001, the financial markets in New York City opened for business, a mere six days after cataclysmic attacks devastated the World Trade Center towers, located only blocks away from the heart of the financial district. The downtime...
Read preview Overview
Business News
In an effort to prevent product counterfeiting and tampering in the United States, the Food and Drug Administration (FDA) is gathering and analyzing information on security technologies for brand and product protection. With an external group headed...
Read preview Overview
Designated for Success. (ASIS News)
ASIS has introduced two technical certifications--Professional Certified Investigator (PCI) and Physical Security Professional (PSP). The new certifications are designed to meet employers' critical need for qualified security professionals with demonstrated...
Read preview Overview
End of an Error. (System Analysis)
Los Alamos National Laboratory's security team aims to eliminate threats to national security resulting from human error. "To err is human," wrote poet and commentator Alexander Pope in 1711 in his Essay on Criticism. This is still true today despite...
Read preview Overview
Fitting Patrols into the Picture. (News and Trends)
In countless films, criminals assess a facility's guard coverage and time the officers' rounds, just slipping out of sight with their loot as the guard enters the picture. In fact, guard coverage is a crucial issue in museums, especially considering...
Read preview Overview
Forward Thinking for a Changing World: 2003 Seminar Preview and Advance Registration
SEPTEMBER 15-18, 2003 ERNEST N. MORIAL CONVENTION CENTER NEW ORLEANS, LOUISIANA ASIS INTERNATIONAL 2003 49TH ANNUAL SEMINAR & EXHIBITS More than ever, security is serious business. New threats. New challenges. New technologies. How...
Read preview Overview
Home on the Page. (News and Trends)
www.securitymanagement.com Whether they need general security information or materials related to specific articles or departments, Security Management readers are increasingly availing themselves of the wealth of offerings on Security Management...
Read preview Overview
It's All Happening at the Zoo. (Public Venues)
More and more, the goal at zoos and aquariums is to put people up close and personal with all manner of winged, four-legged, and finned creatures in ways few could have imagined only a decade or two ago. And behind the scenes, this movement has prompted...
Read preview Overview
Letters
Citizen Participation In "Can Security Help with Civil Defense?" ("Viewpoint," February), Harry J. Azano, CPP, opines about using the citizenry, especially private security; to assist local law enforcement in coping with terrorist activity. I commend...
Read preview Overview
Make Planning a Priority. (Life Safety)
The Fire Department of New York City (FDNY) produces what is perhaps the most concise and extensive set of regulations regarding the protection of high-rise buildings in the United States, but for all the excellent material these regulations contain,...
Read preview Overview
Patchwork All in One Piece. (Working Wise)
For students, the University of South Florida's Tampa Library is a quiet place for studying, completing computer lab work, and researching through vast databases and other electronic resources. For Beverly Caggiano, who works behind the scenes as IT...
Read preview Overview
Punishing Computer Criminals. (Tech Talk)
Are convicted cybercriminals getting off easy? It depends whom you ask. The issue is being addressed by the U.S. Sentencing Commission at the behest of Congress, and the commission has invited public comment on the topic to help it assess whether cyberjustice...
Read preview Overview
Security Pros Add Homeland Security Duties. (News and Trends)
Since 9-11 the U.S. government has lumped the disciplines formerly known as defense, antiterrorism, and border control into the catchall "homeland security" category. So it should come as no surprise that many security professionals are reporting that...
Read preview Overview
Shipshape Security. (Working Wise)
Since 1873, ships from Seattle based Holland America Line have been plying the seas, carrying both cargo and passengers to ports of call around the world. Helping to ensure smooth sailing for the company's data and communications is security administrator...
Read preview Overview
There Are 13,000 Private Security Firms: But There's Only One Guardsmark[R]
Guardsmark is not like any other security services firm. TIME magazine says we are the company that "many security experts consider the best national firm in the business." In Liberation Management (Alfred A Knopi Inc.), Tom Peters describes Guardsmark...
Read preview Overview
The Time for Urgency Is Now
War, terrorism, workplace violence, sabotage, theft... the list of security-related worries preoccupying today's executive seems to grow each year. Who can predict what looms on the horizon? It's easy to pretend that corporations cannot shield themselves...
Read preview Overview
Trials and Tribulations. (Courts/Prisons)
Richland County, Ohio, improved courthouse security and prisoner monitoring and saved its taxpayers more than $1 million. The Richland County Courthouse had become an unpredictable place to work or visit. Although the three-story building in Mansfield,...
Read preview Overview
Updated Cybersecurity Strategy Looks to the Past
The White House has released an updated version of the National Strategy to Secure Cyberspace, a 76-page document that lays out national priorities toward safeguarding the nation from cyber-attack. The latest release of the plan, which has drawn both...
Read preview Overview
U.S. Congressional Legislation. (Legal Reporter)
Identity theft. A bill (S. 153) introduced by Sen. Dianne Feinstein (DCA) that would increase penalties for those who commit identity theft has been approved by the Senate Judiciary Committee and has been taken up by the House of Representatives. ...
Read preview Overview
U.S. Judicial Decisions. (Legal Reporter)
Pretoxting. The New Hampshire Supreme Court has ruled that information-brokerage firms that practiced pretexting can be held responsible for the stalking death of a young woman. Liam Youens, who had been obsessed with Amy Boyer for many years, contacted...
Read preview Overview
U.S. Regulatory Issues. (Legal Reporter)
HIPAA. The Department of Health and Human Services has released its final healthcare security rule as required by the Health Insurance Portability and Accountability Act (HIPAA). The rule requires that healthcare providers and certain insurance companies--called...
Read preview Overview
U.S. State Legislation. (Legal Reporter)
Pennsylvania Cybercrime. Two new laws in Pennsylvania address computer crime. The first law, formerly H.B. 2614, is designed to curb the use of unsolicited e-mail. The law makes it illegal to send commercial e-mail without a valid return e-mail...
Read preview Overview
Wireless Security Gets a New Set of Keys. (Tech Talk)
The security of sensitive information that travels through the air between the laptop of a business traveler in an airport coffee shop and his or her company's network has been questionable at best under the existing security standard known as Wired...
Read preview Overview