Featured Stories

A Risk Mitigation Strategy in Preventing Workplace Violence

In most corporate sectors those responsible for providing leadership, guidance, perspective and program management are torn between the corporate realities and the unthinkable damage one catastrophic incident of homicidal violence will have on their personal reputation and the corporate image. I am reminded of The 10 Myths of Workplace Violenceoriginally introduced by Dr. John Baron, PhD, arguing the need to implement basic workplace prevention strategies. Of which the most memorable myths that come to mind are “It won’t happen here” and “Workplace violence is not preventable.” Integrating and Collaborating Resources allows for the sharing of the Workplace Violence Prevention Mission through “strategic intervention.” Why? Because it allows for flexibility in managing the program in organizations, eliminates the stovepipe approach and spreads the program management and commitment throughout the organization.
Read More

Surround Sound

Perimeter solutions deter, detect and delay unauthorized security breaches.
When the 16-acre campus of the new World Trade Center and Memorial and Museum was being designed, architects were solely focused on building the strongest structure they could. But New York City officials targeted their attention to how to secure the perimeter of what is certain to become a significant attraction, expecting to host more than 250,000 travelers per day when it opens in 2014. Diebold, Inc. will design and implement the security system for the facility, where the World Trade Center Transportation Hub will re-establish the transportation infrastructure and facilities in existence before September 11, 2001, and transform Lower Manhattan into the third largest of the transportation center in the city.
Read More

Video’s Cloudy Future

The surveillance industry has seen a massive amount of innovation in the past decade. New technologies, revised efficiency requirements and an information-centric workforce all continue to demand new approaches. However, in most cases, these innovations – ranging from IP networks and remote access to intelligent search technology – lag several years behind similar advancements in the IT sector.

Read More

Neither Rain Nor Dark of Night Will Stop Security

Copper theft has become a major crime in the United States, thanks to record prices for the metal and hard economic times. As a New York Timesarticle put it, the current conditions have “spurred a resurgence in the past several months in the theft of common items that in better economic times might be overlooked — among them, catalytic converters from automobiles and copper wiring that is being stripped out of overhead power lines, tornado warning sirens, coal mines and foreclosed homes, where thieves sometimes tear down walls to get to copper pipes and wiring.”
Read More

Organizational Growth: Security and Enterprise Risk Management for Healthcare Organizations

Growth. Most organizations strive for it, but when it happens too quickly, unforeseen issues can arise that translate into a higher level of security related risk than the organization might be comfortable with. While most organizations constantly strive for growth and expansion, they need to recognize that with growth come growing pains and a litany of security related issues that may or may not have been factored into the plans of the organization as it continues to deal with day to day business as well as any new problems that a new acquisition might bring.
Read More

Expanding Video System Continues Watch on Orlando Area

Throughout Orlando and Orange County, Florida, video cameras help law enforcement ensure safer streets and more livable neighborhoods. Implementation of the area’s IP-based video surveillance system began about two years ago, starting small with approximately 17 cameras in the first phase. Since then, the number of cameras has grown to 150 active cameras in a regional video system covering the city of Orlando and Orange County. Keeping in step with technology and municipal security needs, the cameras in use have migrated toward higher-resolution models.
Read More

Don’t Unchain that Supply Chain ‘Melody’

So what do the Righteous Brothers, grapefruit, Cymbalta, packaged software, toy jewelry, Callaway golf clubs, Prada purses, Cowboys and Aliens and car parts have in common? Everything, when it comes to theft, counterfeiting, terrorism, diversions, health threats and other illegal and unethical practices up and down the supply chain.
Read More

‘PIVed’ Yet? Trusted Identity Moves Forward

While some see security video as the current fair-haired security solution, well, look again. Today, and into the future, a primary driving force comes wrapped in the concept of identity, credential and access management. It goes way beyond the early days of pioneering Wiegand effect cards, interestingly owned by Echlin, a car parts manufacturer that first used the technology in vehicle distributors. 

Read More



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.