Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 46, No. 11, November

Attendees Seek out Sessions. (Sessions)
FOR ATTENDEES at the ASIS International 48th Annual Seminar and Exhibits, the 150 educational sessions offered unprecedented opportunities to learn from experts, peers, and product developers. Attendees could tailor their selections to their experience...
Read preview Overview
Chalk It Up to Experience. (Tech Talk)
A network administrator arriving at her office building notices a strange chalk drawing on the sidewalk. She dismisses it as graffiti, not realizing that it is actually a sign-called warchalking--that identifies an unprotected wireless connection...
Read preview Overview
Congressional Legislation. (Legal Report)
Internet privacy. A bill (S. 2201) designed to protect the personal information of Internet users has been approved by the Senate Commerce, Science, and Transportation Committee. The bill would prohibit Internet service providers and commercial...
Read preview Overview
CPP Anniversary Celebration. (CPP Events)
CPPs GATHERED at a special luncheon where the CPP program celebrated its 25th anniversary. Sponsored by CH2MHill, the CPP luncheon featured prize drawings, a video retrospective, honors for exemplary CPPs, good food, and interesting conversation...
Read preview Overview
Cyberspace Protection Plan Gets Mixed Reviews. (Tech Talk)
President Bush's Draft National Strategy to Secure Cyberspace, which remains open for comment until November 18, has drawn a strong response both from those who feel it is a necessary first step toward national cybersecurity and those who believe...
Read preview Overview
Dallas High Rises React to 9-11. (News and Trends)
Dallas's largest high rises have responded to 9-11 and its aftermath with a reevaluation of plans and procedures, but they have not invested in additional security personnel or equipment long term. Thus, many of these properties have returned to...
Read preview Overview
Defeating the Bandwidth Bandits. (Working Wise)
The systems administrator was baffled. The network had plenty of bandwidth--the company's two T1 lines should have been more than adequate to handle the site's normal traffic--yet visitors were reporting that they were unable to access the company's...
Read preview Overview
Don't Hack Back: A Company's Policies with Regard to IT Defenses and Emergency Response to Breaches Must Be Crafted with an Eye toward Legal Issues. (Focus On: Economic Crime)
XYZ COMPANY IS A high-volume transporter of hazardous materials. Through efficient management of its truck fleet and an impeccable security record, the company, which started Out as a regional transporter on the West Coast, has seen its business...
Read preview Overview
Drowning in Data: Network Devices Gather Volumes of Information about Malicious Users. Finding Patterns within That Data Is the Job of Information Management Software. (Computer Security)
DANA RACINE KNOWS FIRSTHAND the difficulty of overseeing a gargantuan computer network. The senior network engineer at the Office of Consumer Affairs and Business Regulation with the Commonwealth of Massachusetts, Racine administers a network of...
Read preview Overview
Events
ASIS EVENTS NOVEMBER 4-8 Assets Protection Course I: Concepts and Methods, Annapolis, MD 18-19 Transportation Security in Today's World, Miami, FL 20-22 Physical Security: Advanced Applications and Technology, Miami, FL 22 International...
Read preview Overview
Flying High without Wires. (Working Wise)
Redlands Municipal Airport is a 180-acre general aviation facility in Redlands, California. Under the control of the City of Redlands municipal government, the airport features a 4,470-foot runway, 150 hangars, 310 tie-downs, 11 businesses, and...
Read preview Overview
Guardsmark
Guardsmark is not like any other security services firm. TIME magazine says we are the company that "many security experts consider the best national firm in the business." In Liberation Management (Alfred A. Knopf, Inc.), Tom Peters describes Guardsmark...
Read preview Overview
Home on the Page. (News and Trends)
www.securitymanagement.com After 9-11, security has received unprecedented attention. New organizations are popping up daily, producing reports, holding conferences, and generating data. It's often hard to tell if these are trusted sources or...
Read preview Overview
How Can Process Plants Improve Safety? Plants That Handle Hazardous Materials Need to Implement Better Security despite the Lack of Guidance from Authorities. (Viewpoint)
A few months ago, I was in a chemical plant, which had called in my firm to help with risk management. One of the process engineers proudly told me he could change process operations from his home computer. He explained that he could use the Internet...
Read preview Overview
Judicial Decisions. (Legal Reporter)
Vicarious liability. In a recent appellate case, the court found that a bank could not be held liable for the action of an employee who laundered money for a computer theft ring. A gang of armed robbers carried out six heists targeting Oki Semiconductor...
Read preview Overview
Leaders Share and Plan. (Special Meetings)
THROUGHOUT THE days in Philadelphia, numerous groups of ASIS leaders met to review the strategies set out for the year and to look to the future. The ASIS Board of Directors, the Professional Certification Board, the ASIS Foundation Board of Trustees,...
Read preview Overview
Learning Starts with Weekend Sessions. (Preseminar Sessions)
HUNDREDS OF security professionals arrived on the weekend before the official opening of the ASIS International 48th Annual Seminar and Exhibits to attend various preseminar sessions. The programs included workshops in banking security, cargo security,...
Read preview Overview
Letters
Tilting at Windmills The "Letter to the Editor" (July) from John Simmons, which called the "security industry" to arms in the fight against terrorism, made me feel very much as if I had spent my 40 years in the security industry like Don Quixote,...
Read preview Overview
Linkin' Logs to Fraud: The Secret to a Successful Computer Fraud Investigation Is Proper Logging and Audit-Trail Reports. (Focus On: Economic Crime)
THE TELEVISED REPORT OF A bank computer fraud case had a familiar theme: Law enforcement agents were shown removing computing equipment--specifically, a suspect's PC--as part of what television reporters said would be a computer forensics investigation....
Read preview Overview
Mischaracterization Rebutted. (ASIS News)
Steven C. Millwee, CPP, president of ASIS International, has rebutted an incorrect characterization of security officers that was aired on ABC's Good Morning America (GMA) during an interview on July 5. In a letter mailed to GMA on July 15, Millwee...
Read preview Overview
New Friends and Auld Lang Syne. (Special Events)
AN IMPORTANT part of every ASIS International Annual Seminar and Exhibits is the opportunity for attendees to renew acquaintances with old friends as well as to meet new colleagues who share the unique concerns and opportunities that face security...
Read preview Overview
Only Guards Mark Offers Health Insurance to 100% of Its Security Officers
As one of the largest private security services firms in the world, we employ about 18,000 security officers in more than 145 offices serving 400 cities across North America, with revenues of $450,000,000. We protect shareholder assets and company...
Read preview Overview
Private Security, Public Responsibility: Why Guardsmark Is 100 Percent Drug Free
We're one of the largest private security services firms in the world, with about 18,000 employees in more than 145 offices serving 400 cities across North America. We protect company assets and employees in a wide range of industries and settings,...
Read preview Overview
Products Pack the Exhibit Hall. (Exhibit Hall)
ASIS INTERNATIONAL President Steven C. Millwee, CPP, opened the Exhibit Hall by noting that lust beyond this ribbon is an eye-opening collection of innovative, leading-edge, top-quality security services and products...each and all an example of...
Read preview Overview
Providing Protective Services: A Practical Guide for Police and Security, Second Edition. (Reviews)
Providing Protective Services: A Practical Guide for Police and Security, Second Edition. By James A King; published by Varro Press; available from ASIS International, Item #1481, 703/519-6200 (phone), 703/519-6299 (fax); 287 pages; $30 (ASIS members),...
Read preview Overview
Public-Private Emergency Planning. (Tech Talk)
The enormous scale of the response to the World Trade Center attacks underscored the importance--and difficulty--of public-private cooperation in emergency planning and response. The IT consulting firm Candle Corporation has launched a fee-based...
Read preview Overview
Regulatory Issues. (Legal Report)
Privacy. The Health and Human Services Department has issued a final rule regarding the privacy of medical records. Under the new rule, which takes effect in April 2003, patients must give specific authorization before covered entities--such as...
Read preview Overview
Security Policy Summit Questions Strategy on Homeland Security. (Congressional Legislation)
"The war on terrorism knows no boundaries and the private sector is on the front lines in this war." With these words, Frank Cilluffo, director of policy for the Office of Homeland Security, urged private security professionals to get involved and...
Read preview Overview
Shoplifters Blazing a Trail. (News and Trends)
From late May through mid-July, arsonists hit department stores in Montgomery County, Maryland, Live times, including J.C. Penney's units three times. The latest, on July 14, shut down the Wheaton J.C. Penney's when a rack of women's clothing went...
Read preview Overview
Storage Space No Laughing Matter. (Tech Talk)
Comedian George Carlin once quipped that houses are nothing more than buildings that hold our stuff. But for businesses that increasingly need to find a place to store vast amounts of digital stuff, storage networking is no laughing matter. A new...
Read preview Overview
They Secure the Bodyelectric: Security Standards and Guidelines Are Being Introduced to the Electricity Sector. Will They Close the Gap between Security Haves and Have-Nots? (Energy Sector)
HOW SECURE IS the U.S. electric utility infrastructure and how prepared are companies to handle an attack? In an effort to answer that question, Duke Energy, Pacific Gas & Electric, the Bonneville Power Administration, Puget Sound Energy, Verizon,...
Read preview Overview
Tradition Sparks Innovation. (Getting Started)
TRADITION Sparks Innovation, the theme of the ASIS International 48th Annual Seminar and Exhibits, permeated all phases of this most significant event on the calendar of security professionals worldwide. As a testament to their commitment to top-notch...
Read preview Overview
Women in Public and Private Law Enforcement. (Reviews)
Women in Public and Private Law Enforcement. By Kathryn E. Scarborough and Pamela A. Collins; published by Butterworth-Heinemann, available from ASIS, Item #1457, 703/519-6200 (phone), 703/519-6299 (fax); 166 pages; $30 (ASIS members), $33 (nonmembers)....
Read preview Overview
Workers Paint Shocking Fraud Picture. (News and Trends)
Six percent has been the generally accepted figure for the aunt of income that businesses lose to occupational fraud each year. That according to the Association of Certified Fraud Examiners (ACFE). But a new survey by Ernst & Young (E&Y)...
Read preview Overview