THE MAGAZINE

December 2012
COVER STORY

Left of the Boom

By Matthew Harwood

The goal of all those engaged in the fight against improvised explosives is to find ways to detect and prevent them, which they call getting “left of the boom.”

HOMELAND SECURITY

Agency of Last Resort

By Matthew Harwood

Communities will turn to the local fire department in the aftermath of a disaster, says a recent report, and fire officials must be prepared.

Black Swans and the Challenge of Mitigating the Unknown

By Bob Raffel

School shootings are uncommon and unpredictable. As such, they might be classified as “Black Swans”, events which are random yet produce extreme impacts. It is perhaps more productive to focus on what is known about such attacks and direct mitigation measures accordingly. ONLINE EXCLUSIVE

The Evolution of School Security

By Charles Schnabolk, P.E., PSP

To ignore past history will only encourage school administrators to repeat the same mistakes all over again. ONLINE EXCLUSIVE

Federal Cybersecurity Perspective: Interview with Laura Mather, Ph.D.

By Matthew Harwood

An interview with Dr. Laura Mather, cofounder and chief visionary of Silver Tail Systems.


 

PRINT EDITION ONLY

The Fight Against Food Fraud

By Laura Spadanuta

Though 9-11 focused attention on possible risks of food-chain contamination by terrorists, attention is shifting back to the more common safety issue of food ingredients being diluted, adulterated, or misrepresented to increase profit.

Intelligence

By Laura Spadanuta

A new tool is helping authorities prepare for possible pandemics, and some schools are using RFID tags to monitor students.

Managing

By Teresa Anderson

A new joint forces facility in North Carolina houses several state agencies under one roof.

Case Study

By Ann Longmore-Etheridge

Security at a ballpark needed a reliable, user friendly fire alarm system. The nonproprietary Fire-Lite system was a winner.

Legal Report

By Teresa Anderson

A review of the legislation approved by the 112th Congress, as well as measures that did not pass this session.

ASIS SEMINAR AND EXHIBITS: Insights in Abundance

By Security Management Editors

Get a taste of the valuable knowledge gleaned from all who attended the ASIS International 58th Annual Seminar and Exhibits.

Industry News

By Ann Longmore-Etheridge

The ASIS Board Management Committee is announced; the foundation launches a new scholarship; and Robert L. Oatman, CPP, is profiled.

 

The Magazine — Past Issues

EDITOR'S NOTE

Surveillance System Technology Trends

By Sherry Harowitz

It’s getting easier to have surveillance systems that don’t overwhelm the network or storage systems.

CYBERSECURITY

Creating a Digital Evidence Policy

By John Wagley

Now that most court cases involve digital evidence analysis, companies should develop a policy on retaining such documents.

CHART: Behind The Numbers

Security tools lag behind security policies.

PRODUCT SHOWCASE

ASIS 2012 Seminar Showcase

 

 

INTERNATIONAL

Armoring Trends in Latin America

By Carlton Purvis

As violent attacks on citizens continue in countries such as Brazil and Mexico,individuals are responding by buying armor for private vehicles.

MANAGING

How to Recruit and Retain Quality Security Employees

By Jack Thomas, CPP

One of the greatest challenges for any security director is finding and retaining the right people to fill security positions. The keys to success are to know how to attract and interview candidates and then how to engender loyalty among those who join the team. ONLINE EXCLUSIVE

BOOK REVIEWS

Liars & Outliers: Enabling the Trust That Society Needs to Thrive

By Bruce Schneier; Reviewed by Mayer Nudell, CSC

Without a broad base of trust, society and all of our institutions would fail to function. This is the focus of Bruce Schneier’s new­est book, Liars & Outliers: Enabling the Trust That Society Needs to Thrive.

How to Do Financial Asset Investigations

By Ronald Mendell; Reviewed by Adrian A. Barnie, CPP, CFE, CAMS

An overall theme in the book is to obey the law when conducting investigations. It is critical that investigators be aware of the specifics of the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act as well as other state and federal laws.

Thor’s Microsoft Security Bible

By Timothy “Thor” Mullen; Reviewed by Col. Kuljeet Singh (retired), CPP

This book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes, and meth­odologies uniquely illustrated through real-world process examples.

Electronic Access Control

By Thomas Norman;Reviewed by Paul D. Barnard, CPP, CISM, SFPC

This book is likely one of the most current and comprehensive works available in this subject area, says reviewer Paul D. Barnard, CPP, CISM, SFPC.

Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

By Gilbert Sorebo and Michael Echols; Reviewed by Ben Rothke, CISSP

Reviewer: For those looking to get a handle on how to secure the evolving and dynamic smart grid, Smart Grid Security: An End-to-End View of Security in the New Electrical Grid is an excellent reference.

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.