Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 50, No. 4, April

ASIS International
ASIS International regularly provides the status of guideline projects so that members and others can access completed guidelines, review draft guidelines and provide comments, or learn the status of guidelines. Listed below are the guideline projects...
Community Policing Gets a Makeover
LONG BEACH, California, is sometimes considered the largest suburb in the United States, because of its proximity to Los Angeles. In reality, it is a city of half a million residents, with many of the problems of an urban area. The city's police department...
DHS Struggling with Risk Management
INSURERS AND FINANCIERS have mastered the skill of risk management, which entails anticipating future events, deciding which of those expected risks the organization will bear, and allocating resources to mitigate the rest. But their goal is profit....
False Arrest
FALSE ARREST. A Mississippi appeals court has ruled that a casino security officer used proper investigative techniques when arresting a casino employee for theft. Because of this fact, the employee's claim of false arrest failed. [ILLUSTRATION...
Into, through, out of Africa
IT'S SAID THAT there's always something new out of Africa. In other words, Africa is always poised to spring a new surprise on the world. In the latest twist on that maxim, intelligence analysts at Kroll Security International have been working to...
Middle East, Asia Drive Up Terrorism: A Special Focus on Terrorism Trends
TERRORIST INCIDENTS rose globally in 2005. Regionally, however, trends varied widely. And if you exclude the two major hot regions--the Middle East and South Asia--the numbers are down dramatically. That's according to government data compiled by the...
New in Plaintext: Securing Windows XP
More than seven out of 10 home computers run Windows XP, so locking down these computers is an essential task, because poorly protected home computers are often the source of attacks against corporate networks. Windows XP Security Solutions is a book...
Off the Shelf Shrink Solution
RETAILERS OFTEN THINK of protecting product from theft only after it is on their shelves. But the first opportunity to reduce shrink arises when a retail merchant is negotiating to purchase product from a supplier. For example, one case that I worked...
Old School, New System
WHEN I JOINED RUTGERS STATE UNIVERSITY in New Jersey 30 years ago as the campus locksmith supervisor, the school was roughly 60 buildings smaller than it is today, with a significantly less populous student body. Nowadays, Rutgers is one of the nation's...
Pinning Down Online Money Laundering
ARE CRIMINALS TAKING ADVANTAGE of online currency sites to launder money? Federal law enforcement agents worry that criminals are moving from "well-established techniques for integrating dirty money into the financial system to modern innovations that...
Putting Vendors to the Test
WE'VE ALL BEEN THROUGH IT. It comes time to replace or upgrade security systems, and vendors swoop in with techno-jargon, high promises, and Pollyanna scenarios. But inevitably something is missing: They've ignored your company's specific situation...
R. Scott McCoy
During his more than two-decade-long security career, R. Scott McCoy, CPP, has never stopped looking for ways to enhance both his own performance and that of the profession. It is a dedication dating back to his earliest days in the industry. [ILLUSTRATION...
Scoping out Malicious Mail: Glenbrook Technologies' MailScope X-Ray Machine Protects VIPs from Ill-Intentioned Mail by Bringing to Light Even the Most Minuscule Dangers
WHEN A HEAVY, unmarked box arrived at the mailroom of the 704th Military Intelligence Brigade at the Intelligence Security Command (INSCOM), wary postal personnel immediately scanned it with their high powered MailScope x-ray machine. The suspicions...
Sometimes the Truth Hurts
It is said that the squeaky wheel gets the grease. When it comes to national security, however, the squeaky whistle-blower gets discredited. And while there are laws against retaliation, national security whistleblowers do not have the same legal protections...
Third Party Liability
THIRD PARTY LIABILITY. The California Supreme Court has ruled that a landowner may be responsible for the injuries to a contractor's employee under certain circumstances. According to the court, the landowner need not be in control of the employee's...
Tips for Tightening Fraud Controls: Leading-Edge Companies Are Expanding Their Codes of Conduct and Asking Audit Committees to Focus on Fraud
EVEN THE MOST stringent antifraud controls are ineffective when top management can override them. And between 60 to 80 percent of all controls are still manual, not automated, and thus more easily overridden, according to a recent KPMG survey. [ILLUSTRATION...
Top 10 Performing Security Stocks for January
Company/ % Stock Symbol Increase Price Analysis Identix 60% $7.99 Identix announced it will merge with IDNX Viisage creating a biometric company ...
Worth a Look: Web Browsing under Wraps
NEXT TIME YOU'RE SURFING the Internet, do a search using the phrase, "What is my IP address?" You'll reach a number of sites that will display the Internet protocol (IP) address of your computer or your company's router. Using this number, you can...