Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 48, No. 8, August

A High-Tech R & D Agenda
A Dartmouth College think tank, the Institute for Security Technology Studies (ISTS), released the third of three reports that analyze and prioritize the technology needs of cyberattack investigators. While the first paper collected data from these...
ANSI, ASTM Join Standards Effort
Entities as diverse as the American Chemistry Council, the U.S. Department of Agriculture, the International Standards Organization, and the Biometric Consortium have proposed or issued security standards, best practices, or guidelines. Most recently,...
ASIS Guidelines Update
To ensure that draft guidelines benefit from the participation of all interested parties, ASIS International regularly provides the status of draft guideline projects so that members and others can access completed guidelines, review draft guidelines...
A Touchy Subject for Museums
Honesty isn't always the best policy, say museum security professionals exchanging ideas via a peer group electronic forum. Sometimes a white lie can work wonders. That's the case when it comes to the challenge of keeping curious or careless--and sometimes...
Bombs Away: Bomb Detection Technologies Continue to Improve, and They Are Being Used in Increasingly Effective Ways
Interest in bomb detection capabilities is on the rise as the result of heightened fears of terrorism. Recent bomb attacks on the Madrid train network and the British consulate in Istanbul have underlined the need for governments and businesses to...
Building Cleared of Glass Danger
When the National Geographic Society was founded in Washington, D.C., in 1888, the White House had no electricity and the Washington Monument had just opened to the public. Today, the headquarters stands in a more complicated world, and that includes...
Canvassing the Campus: An Update on How Universities Are Addressing Risks That Range from Terrorism and Bias Crime to Identity Theft
In life, sometimes the student is the teacher. On campus, sometimes the students are the arbiters of acceptable security. In other words, a security program must be acceptable to and supported by students, as well as faculty and staff, if it is to...
Corporate Liability
Corporate liability. A federal appeals court has determined that a company can be held liable for the discriminatory termination of an employee even if those firing the employee acted in good faith. Liability can be applied if the decision is based...
Cultivating Your Cultural Intelligence: Before Business Professionals Do Business with Other Cultures, They Must Know How to Bridge the Cultural Divide
Chan Yuk Fai had ushered his British guest into the crowded Shanghai restaurant. Around them, the atmosphere was busy with the quiet babble of a dozen conversations. Chan bowed slightly then leaned forward and smiled. "I think," he said in excellent...
Digging Deeper into Data Mining
Data mining--the process of poring through various databases looking for hidden patterns and relationships--is alive and well, despite controversy raised by projects such as the Defense Advanced Research Projects Agency's (DARPA's) Terrorism Information...
From Jericho to Jersey Barrier: To Ensure That Security Barriers Won't Fall If Subjected to a Car-Bomb Attack, Businesses Must Properly Assess the Risk and Select the Right Barrier for the Job
The ancient city of Jericho is described on one biblical Web site as surrounded by a great earthen rampart with a stone retaining wall at its base that was imposingly high and topped by a thick mudbrick wall. It was considered a formidable barrier...
Home on the Page @ WWW.Securitymanagement.Com
There is no security on this earth, Douglas Macarthur said. Only opportunity. The great general's words are debatable, but they do point out that today's dangerous security environment provides many opportunities for bold thinkers and leaders. Part...
Intellectual Property
Intellectual property. A Maryland appeals court has rejected the use of the inevitable disclosure doctrine--in which a departing employee is prohibited from working for a competitor because that employee would inevitably be required to disclose trade...
Introduction to Emergency Management
For every action there is an equal and opposite reaction, Newton said. Likewise, adding action to the narrative of a book or movie usually produces a commensurate positive reaction from readers and viewers. Although books on security, by the very nature...
Networks That Talk Back
With broadband Internet connections able to handle steadily increasing amounts of traffic, the notion of using the same lines to transmit telephone communications via the computer sounds like the perfect moneysaver. But the technology still has security...
Patch as Patch Can
One of the greatest dangers to a computer network is the presence of desktop PCs and servers that have not been patched for the latest vulnerabilities and can be exploited by malicious attacks such as worms. Blame goes to software developers for creating...
Security at the Speed of Change
50 ASIS INTERNATIONAL 2004 50th ANNUAL SEMINAR AND EXHIBITS SEPTEMBER 27-30, 2004 DALLAS, TEXAS 50 Years of Experience Make ASIS 2004 the Only Real Choice ASIS 2004 SPOTLIGHT [ILLUSTRATION OMITTED] Wednesday's Keynote Speaker: Rudolph...
Translating Solutions into Action: Learn to Identify Potential Threats and Protective Strategies during the Educational Sessions at Next Month's ASIS 50th Annual Seminar and Exhibits in Dallas
Crisis mitigation is often too much theory and too little application. The challenge is "like taking a dictionary and turning it into a language," says crisis management specialist Ken Brady. Brady is one of the many experts who will be helping ASIS...
Who Should Lead in System Selection? the IT Manager Has Nudged the Security Director Aside When It Comes to System Selection. It's Time for Security to Get Back into the Action
As a security system design consultant, my dealings with multiple businesses over the course of a decade or more have given me a front row seat from which to watch the unfolding battle between IT and security professionals. Beginning ten years ago,...
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.