Physical Security

Are Your Vacant Buildings Adequately Protected?

Key Risk Management Considerations

 

Economic downturns typically result in an influx of foreclosed, vacant, idle, and even completely abandoned properties. This affects a range of business sectors—including habitation and office facilities, factories, schools, hospitals and retail.


Read More

What Are America's Most Dangerous Cities?

A city where murder is nearly a daily occurence stands a good shot of being named the most violent, crime-prone area in the country. And last year there were 345 murders reported in the Detroit metropolitan area - altogether 1,111 violent crimes per 100,000 residents. What other cities made the Most Dangerous list?


Read More

Using Technology to Manage Lower-Risk Offenders

Our nation's continued budget woes are taking a toll at all levels of government, including local cities and counties that are struggling with higher costs, lower tax revenue collections and sometimes dwindling state and federal aid. The result is a need to look for lower-cost and less-labor-intensive ways to address a range of government security and law enforcement needs. When governments downsize, technology is a tool to help fill the gap.
Read More

Don’t Unchain that Supply Chain ‘Melody’

So what do the Righteous Brothers, grapefruit, Cymbalta, packaged software, toy jewelry, Callaway golf clubs, Prada purses, Cowboys and Aliens and car parts have in common? Everything, when it comes to theft, counterfeiting, terrorism, diversions, health threats and other illegal and unethical practices up and down the supply chain.
Read More

Sentries to Officers: Guardhouses Diversify

Do you think that keys and locks are the oldest man-made security tool? Forget it. Guardhouses go back hundreds, if not thousands of years as a place a person would sit or stand, observe, control access, alert others and take occasional action such as dumping hot oil over the wall. These permanent and temporary structures, built in or brought in, are used in most every country. 


Read More

Retail Security News - June 2011

After numerous robberies of convenience stores, some tragically ending in the murder of staff or customers, a number of states enacted legislation to encourage store owners to institute security measures.


Read More

A Complete View of Security

Based in Marble Falls, American Bank of Texas, N.A. provides banking and other financial services for the Highland Lakes, Austin, San Antonio, Seguin, Fredericksburg and Temple areas. American Bank of Texas N.A. delivers personalized attention to customers across the bank's 16 branches. With total assets more than $747 million, ABT offers the charm of a small town bank with the resources of a large financial institution. 


Read More

TSA Privatization Talk Misses the Mark

There continues to be discussion over the technologies, procedures and screening professionals at airports. Here are perceptive observations of an executive from the inside.

The recent controversy of the Transportation Security Administration’s (TSA) increased use of passenger pat downs and full body image scanning has re-ignited the rhetoric around privatization of TSA screeners at U.S. airports. This increased scrutiny comes at a time when many travelers, lawmakers, privacy advocates and the general public  re already voicing  criticism of the TSA’s reliance on screening methods that many characterize as overly aggressive and a violation of privacy.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.