Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 49, No. 8, August

2005 ASIS International Professional Development Programs: Experience, Dedication, and Leadership in Security Education
New advancements. New technologies. New challenges. So much to stay on top of. One thing is certain. Professional development in the security industry is a must. Rely on the experienced, dedicated leader in security education--ASIS International....
Alarms
Alarms. An Oregon appeals court has ruled that the police search of a citizen's home in response to a false burglar alarm was illegal. On the evening of February 23, 2002, the burglar alarm went off at Damon Stoudamire's house in Lake Oswego, Oregon....
ASIS Awarded SAFETY Act Designation
In April, ASIS International received a Support Antiterrorism by Fostering Effective Technology (SAFETY) Act of 2002 Designation Award from the U.S. Department of Homeland Security (DHS). The designation gives liability protection to the ASIS guide-lines-development...
ASIS International
ASIS INTERNATIONAL regularly provides the status of guideline projects so that members and others can access completed guidelines, review draft guidelines and provide comments, or learn the status of guidelines. Listed below are the projects of...
Banking on Encryption
The Internet has opened the door for tech-savvy identity thieves eager to steal bank account details and other personal information. To combat this threat, the New Alliance Bank in Manchester, Connecticut, has installed an e-mail encryption system...
Benchmarks in Compensation: Find out How Compensation Trends Are Affecting Your Segment of the Security Profession
The median compensation for security professionals working in the United States rose 5.9 percent in 2004, outpacing inflation. But the increase was less than the 8.3 percent rise of 2003. The news was far better for some segments of the profession,...
Checking on Sarbanes-Oxley
Immediately after Enron and other corporate scandals broke, the public pushed for more accountability at the top. Congress responded with the Sarbanes-Oxley Act of 2002 (SOX). The legislation established stringent reporting requirements for public...
Digging Up the Dirt on Pharming
While phishing scams are still going strong, scammers are moving toward a more high-tech method of online fraud known as pharming. [ILLUSTRATION OMITTED] "Pharming is 'phishing' without the lure," says Scott Chasin, chief technology officer with...
From Back Burner to Business Imperative: Presenters at the Upcoming ASIS International Seminar and Exhibits Highlight Some of the Important Lessons to Be Offered in Orlando
Finding a way to prove that the security department is a critical business unit within an organization is a challenge that ASIS International has been tackling since the Society's inception. "Security offers such absolutely essential, vital services...
Home on the Page @ WWW.Securitymanagement.Com
Every month Security Management Online culls the best new security reports and analysis from government and industry groups and gathers them together for easy reference. Here's some of what's new online this month. Drug testing. The names of products...
Information Security
Information security. At a recent hearing on identity theft, data brokers argued that only limited measures were needed to protect consumers from identity theft, while consumer advocates and identity theft victims disagreed and laid out steps Congress...
Intelligent Design: Making Sure That Security Gets Its Place in Project Planning; Security Directors Should Take the Lead in Advocating for the Development of Standards for Campus Building Projects
When security professionals at one large state university planned a new parking structure as part of a recently constructed medical campus, they knew they had to address the potential security risks presented by the surrounding neighborhood. The site...
Labor Law's Changing Tides: Six New Cases Issued by National Labor Relations Board Reverse Longstanding Trends and Establish New Rules between Employers and Their Employees
It is not unusual for the National Labor Relations Board (NLRB) to change its position on recurring and important issues for both unionized and nonunion employers. Political changes at the White House and the appointment of new board members often...
Lessons from London
There was a deja vu quality to the events surrounding the July terrorist attacks in London. I'm speaking not of the tragedy itself, but rather of the U.S. government's assurances that everything that could be done to secure mass transit was being done....
Putting the Praise in Appraisals: Managers Need to Establish a Well-Thought-Out Performance-Appraisal System, Set Clear Goals, Conduct Timely Reviews, and Develop Follow-Up Action Plans
Employees who need direction rely on their leaders to give them feedback about their performance and to mentor them. But leaders are often not prepared or trained to conduct the type of employee review that ensures employee development. Instead, the...
Security in Motion: How to Safeguard Your Institution's Traveling Treasures
To celebrate the 100th anniversary of what is called Einstein's Miraculous Year, the American Museum of Natural History in New York City has allowed the Einstein Manuscripts, which include hand-written ledgers and formulas, to go out on loan to museums...
The Inside Story on Outsource Planning: When Companies Outsource Their Security Functions, Attention to Detail, Planning, and Analysis Are Critical
Outsourcing continues to be an appealing strategy for business executives, who see it as a way to cut costs and focus the company on core competencies. Security is frequently one of the functions selected for outsourcing. More than half of the respondents...
The Security Consultant
Q: My security team is expected to stop would-be intruders before they can do damage. How can we detect intruders earlier to improve our response time? A: First and foremost, you need to include at least one type of perimeter security measure. Traditionally,...
The Time for Urgency Is now[SM]
War, terrorism, workplace violence, sabotage, theft ... the list of security-related worries preoccupying today's executive seems to grow each year. Who can predict what looms on the horizon? It's easy to pretend that corporations cannot shield themselves...
Trade Secrets
Trade secrets. An Ohio appeals court has ruled in favor of a preliminary injunction barring an employee from using his former employer's information in his new job. However, the court ruled that some of the information taken by the employee could not...
Worth a Look
Wireless networking has become nearly ubiquitous, and so, it seems, have wireless threats. Judging from the never-ending stream of concerns over everything from cracking wireless encryption schemes to connecting to fake access points, setting up a...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.