Featured Stories

Counting Up PSIM Benefits for the Business

 It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.  


Read More

Supply Chain Management Best Practices for 2014 and Beyond

 In August, Ryder System Inc. received recognition as a “2014 Great Supply Chain Partner” for the 12th consecutive year. The 12th Annual List was  the result of a six-month online poll in which supply chain professionals were asked to nominate vendors and service providers whose solutions have made a significant impact on their company’s efficiency, customer service and overall supply chain performance.  


Read More

The Most Influential People in Security 2014

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.

This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.


Read More

Mitigating Workplace Violence Risks with Awareness, Deescalation

Workplace violence incidents happen every day, in every industry, and statistics show reports that these events are on the rise.

Depending on the environment you’re in, physical safeguards such as desks, railings and panic buttons can be helpful deterrents. “You don’t want to make it look like a prison, but at the same time, you can make minor modifications that help protect.


Read More

4 Challenges to Address in Corporate Cyber War

We are fighting a cyber war and need to take proactive steps to protect ourselves and our companies as the virtual bullets fly.

Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.


Read More

How to Adjust Security for Hazardous Locations

Many enterprises are looking beyond the U.S. shores to expand into emerging markets.

Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.


Read More

Using Badges to Realize Special-Needs Kids' Disney Dreams

The Kraddick Foundation didn’t seek out badging help from Diamond Business Services, Inc.

Kraddick spoke of his Foundation’s work with chronic and terminally ill children and funding an all-expense paid trip to Walt Disney World in Florida each year. The story tugged at the heartstrings of Pence, who has a healthy daughter that she adopted from Russia.


Read More

TV Station Upgrades with Visitor Management System

Over the past 15 years the visitor management market has evolved from a simple “hello my name is” label to roaming officers processing visitors with 4G-enabled tablets and evacuation systems

Employees are currently able to pre-register guests both from their desktop and from their home computer or laptop. KGW is collaborating with Veristream to work on an app that will also allow them to do it from their cellphones in the near future.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.