Items Tagged with 'international security'

ARTICLES

How to Use Executive Protection Services Overseas

For the 2014 Winter Olympics, a 50-person contingent from the U.S. Ski and Snowboard Association (USSA), including several members of the board of directors, spent 14 days attending various events and competitions in Sochi, Russia. For Tiger Shaw, two-time Olympian and now President and CEO of the USSA, this meant the need to call in some expert help.


Read More

How Much Is Cyber Crime Costing U.S. Businesses?

 Frankly, it’s costing U.S. businesses more than other nations’ enterprises worldwide, according to data collected in the 2014 Cost of Cyber Crime Study: United Statesfrom the Ponemon Institute and HP Enterprise Security. The mean cost of cyber crime for a company in the U.S. last year was $12.7 million per year; other countries’ enterprises mean costs ranged from Germany’s $8.13 million to Russia’s mere $3.33 million. The study observes a $1.1 million (or 9.3 percent) increase in cyber crime costs for the U.S. from last year’s report.  


Read More

Helping Security Officers Improve Incident Reporting

 Commissionaires is a private, not-for-profit organization that has been protecting people and property for more than 86 years. As one of Canada’s top security organizations, it employs more than 20,000 people across the country and holds the highest retention rate in the industry. Its workforce consists of a well-trained, diverse team of individuals from all walks of life, including but not limited to, former Canadian Forces and RCMP personnel.   


Read More

Vance Toler: Finding Common Ground in Different Perceptions of Security

At the heart of our mission at Southwest Airlines is an unrelenting dedication to deliver the highest quality of customer service in the industry. After all, we’re in the service and hospitality industry. Our purpose is to connect people to what’s important to them in their daily lives. In order for the security team to make a meaningful contribution to the success of the company, we can’t deviate from those core beliefs.” This is the mission statement of Vance Toler, the Director of Corporate Security for Southwest Airlines.


Read More

Dennis Quiles: From Farm to Fork

 Since 1955 McDonald’s has been proud to serve the world some of its favorite food. Along the way, McDonald’s not only lived through history, but created it: from drive-thru restaurants, to Chicken McNuggets, to college credits from Hamburger University and much more.   


Read More

Rich Mason: Changing the Weather

 Honeywell is a Fortune 100 diversified technology and manufacturing leader, serving customers worldwide with aerospace products and services; control technologies for buildings, homes and industry; turbochargers; and performance materials.  With such diversity of opportunity at Honeywell, having the right controls and security in place is critical to long-term success.  


Read More

Report: China Is Main Source of Counterfeit Goods

The International Hologram Manufacturers Association(IHMA) says reports from the EU, the Japan Patent Office and the U.S. Department of Homeland Security are reminders of the “huge” threat posed to consumer safety – China is a leading supplier of goods to the world’s markets, and it is also the primary source for counterfeit items. 


Read More

How to Adjust Security for Hazardous Locations

Many enterprises are looking beyond the U.S. shores to expand into emerging markets.

Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.