Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 47, No. 6, June

Airlines Find Matchmaker
After the September 11 terrorist attacks, a great deal of confusion surrounded the process of identifying the culprits: Tracking the hijackers' earlier movements around the United States, physically and financially, was difficult because of variations...
A New Crew Oversees Airports. (Transportation)
Federal security directors in charge of airport security at major airports in the United States discuss the challenges they have faced since taking up their posts after 9-11. With the threat of terrorist attacks ever-present since 911, a major thrust...
Another Deal, Another Dollar: It Used to Be That Only Financial Institutions Were Targeted, and Held Accountable, for Money Laundering. but This Risk Has Expanded to a Broad Range of Businesses. (Money Laundering)
Money laundering has long been a concern, but not always the highest priority concern. The issue in the past was that the funds being laundered were assumed to support organized crime and, in some cases, drug cartels. Since 9-11, a more urgent concern...
Anthentication vs. Privacy. (Tech Talk)
Finding a balance between the security need for authentication and an individual's right to privacy is a task often relegated to technology. Any number of solutions, from passwords to public-key infrastructure (PKI), have been suggested and ardently...
Antispam Legislation and the Constitution. (Tech Talk)
A new California bill that would prohibit a person or company from sending spam from California or to a California e-mail address has not been welcomed by some high-tech professionals. Opposition to the bill has come from the American Electronics Association...
A Picture-Perfect Copyright Guard. (Working Wise)
Photographers and illustrators whose work is displayed on the Web have to balance the benefit of allowing millions of potential buyers to see samples of their artwork with the chance that unscrupulous viewers will simply steal an image and use it without...
ASIS Launches Virtual Forums. (ASIS News)
ASIS International has announced a series of interactive, two-hour training sessions called Virtual Forums that allow participants to learn without leaving their offices. The video portion of the forum is a live Web-based slide presentation that offers...
Business News. (Industry Focus)
The United Nations refugee agency (UNHCR) is using iris recognition technology to help Afghan refugees returning to Afghanistan. Refugees are entitled to a one-time aid package that includes a travel grant, food, and other assistance. To make sure...
Campus Shooting Triggers New Procedures. (News and Trends)
At the University of Arizona last October, many students watched as nursing student Robert Flores, toting five handguns and at least 200 rounds of ammunition, shot and killed two instructors in a classroom where midterm exams were taking place. Just...
Certified, Smart, & Thinking Ahead. (Advertorial)
Michael Betten Michael Bettn, CPP, is making a difference in his community. As an officer with the Overland Park Police Department, Betten has focused on alarm reduction and community protection. "We're trying not to look at things like you would...
For a Thinking World
More than ever, security is serious business. New threats. New challenges. New technologies. How do you stay on top of it all? And are you risking everything if you don't? Achieving and maintaining success in today's rapidly evolving industry requires...
Get a Load of This Policy. (Transportation)
Pfizer's security department developed standards for its truck transportation system and devised procedures to be followed by its service providers throughout the supply chain. On May 19, 2001, 77 pallets of the antibiotic Zithromax were shipped...
Getting IT Training Right. (Tech Talk)
A staggering number of high-tech gadgets is available today to help a company of any size protect itself from online attacks; these solutions range from small software firewalls to expensive hardware-based intrusion detection systems. Yet breaches...
Home on the Page. (News and Trends)
www.securitymanagement.com With each day a new threat seems to unfurl. Keep up to date with what you really need to know by checking in regularly with Security Management Online. The following is a sample of items newly placed online. Also, look...
Hotel Studies Sketch Security Posture. (News and Trends)
In a pair of recent studies, Cornell University's Center for Hospitality Research reported on safety and security levels at hotels of various types, evaluating properties based on such factors as size, price, location, age, and type. One study looked...
How Can Information Exchange Be Enhanced? (Viewpoint)
Public-private sharing of crisis management information is primarily based on personal relationships. That's inadequate. The heightened risk of terrorism, coupled with the overlap between public- and private-sector ownership of water, power, telecommunications,...
In It for the Long Haul: Cargo Crime Prevention Is Difficult, but Those in the Industry Who Recognize Its Importance Are in It for the Long Haul. (Transportation)
It was 9:46 p.m. and muggy. In a dusty, industrial area of Miami, two young men in baggy shorts and t-shirts quietly approached a tractor-trailer that was apparently parked for the night. The pair wasted little time: As one expertly broke into the...
It/s What You Know. (Professional Development)
Security education initiatives, both degree programs and certifications, offer many options to security managers seeking to advance both financially and professionally. Knowledge is power. Earnings power, that is. It has always been so, but in the...
Letters
Remote Threat I was forwarded a copy of the article "A Remote Threat," discussing the possible threats of terrorism using remotely piloted vehicles ("News and Trends," October). I appreciate the attempt made to inform people of this possibility;...
Places Everyone: Drills Are to Security as Dress Rehearsals Are to Broadway; They Are the Only Way to Ensure Success for the Real Performance. (Contingency Planning)
A security organization without security drills is like a theater production without dress rehearsals. It doesn't matter how talented the actors are or how long they spend separately studying their lines. Without several dry runs under the critical...
Read This Rule and Call Me in the Morning: A New Set of Security Standards for Businesses That Handle Patient Healthcare Information Provides a Strong Framework but Few Specifics. (Medical Privacy)
The Department of Health and Human Services (HHS), after more than four years of debate and deliberation, has issued the final rule for Health Insurance Portability and Accountability Act (HIPAA) security standards. Large healthcare plans and providers...
Reduce Software Piracy to Boost Economies. (Tech Talk)
As many as four out of 10 software programs in use around the world are pirated copies. But this theft is doing harm far beyond its impact on the companies that produce software; it is diminishing the economic benefits that could be seen by struggling...
States Struggling with IT Security. (Tech Talk)
While federal agencies are often singled out for having weak IT security, many states are doing even worse, according to a new review of state cybersecurity policies conducted by Zeichner Risk Analytics, LLC. Many state agencies have made little or...
Take the Guess Work out of Guest Control: How One Major High Rise Rose above Problems to Revamp Its Visitor-Control Policies and Procedures. (Access Control)
The challenges of securing any multistory facility expand exponentially when the building is a multitenant facility. And visitor access control is one of the most difficult issues that any multitenant management company faces. The case of one particularly...
The Long Road to Infrastructure Protection. (Tech Talk)
More than four years after the issuance of Presidential Decision Directive (POD) 63, which called on federal agencies to improve their protection of the nation's critical infrastructure, some agencies have still not completed "the fundamental step...
The Time for Urgency Is Now
War, terrorism, workplace violence, sabotage, theft...the list of security-related worries preoccupying today's executive seems to grow each year. Who can predict what looms on the horizon? It's easy to pretend that corporations cannot shield themselves...
U.S. Congressional Legislation. (Legal Reporter)
Cyberfraud. Two subcommittees of the House Financial Services Committee held a hearing on information security recently to discuss the problem of cybertheft, which, according to the full committee chair Rep. Michael G. Oxley (R-OH), is costing American...
U.S. Judicial Decisions. (Legal Reporter)
Privacy. The Illinois Supreme Court has ruled that a telephone company that audited an employee's phone records cannot be held liable for invasion of privacy The court found that a company has a legitimate business interest in auditing employee records...
Watchhing the Detectives. (News and Trends)
Understanding what makes a good and productive employee is a notoriously challenging task. In an effort to answer this question for one type of security job, a recent study analyzed more than 200 store detectives via written test and supervisor evaluation....
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.