Online pharmacies are a multimillion dollar business, but it’s a consumer-beware world in which much of what is sold is not what it purports to be. Governments and the private sector are trying to address the problem.
A new, comprehensive training program for first responders at all levels will replace a system focused on federal agencies, but concerns over testing remain.
Daryl Johnson, former terrorism analyst at the Department of Homeland Security, is interviewed.
How two no-cost moves can promote security to a seat at the big table.
The CSO Roundtable has joined with management groups to publish a paper exploring the role of CSOs in corporations, and Jere Peltonen, CPP, PCI, PSP, is profiled.
Courts have issued decisions on employee misconduct, background screening, and investigations.
A school district opening a new high school needed a surveillance system to serve as a deterrent to crime and a tool for carrying out investigations.
Wireless carriers agree to support 911 calls, and researchers study disease tracking via Twitter.
Two financial institutions used technology to improve the security of their systems and their customers’ financial assets.
Public and private security agencies coordinated plans and handled everything from VIP protection to Hurricane Isaac at the 2012 Republican National Convention.
Have you encountered any blatherskites lately?
Actions companies took in 2012 to protect sensitive information.
Terrorist groups are most likely to die off when their leaders are removed, but the timing and circumstance of the change are important factors.
This academic work frames the problem of excessive surveillance and describes threats to privacy.
While accessible to readers at all experience levels, Basic Private Investigation targets law enforcement retirees and other professionals considering investigations as a second career.
Although its intended audience is primarily senior corporate executives and board members, this book also makes an excellent how-to manual for any security manager.
The technologies of communications and eavesdropping are increasingly complicated, and public policy must keep up with those innovations.
Though this book is slightly more on the IT side, the authors of Security Strategy bridge this divide by discussing both types of issues as they relate to high-level security.
Despite a large number of books on homeland security, few cover the legal implications surrounding the topic.
In this collection of scholarly compositions, editors James Albrecht and Dilip Das present work from authors who made presentations at an International Police Executive Symposium.
See all the latest links and resources that supplement the current issue of Security Management magazine.
Security Management is the award-winning publication of ASIS International, the preeminent international
organization for security professionals, with more than 38,000 members worldwide.
ASIS International, Inc. Worldwide Headquarters, 1625 Prince Street, Alexandria, Virginia 22314-2882 U.S.A.
703.519.6200 | fax 703.519.6299 | www.asisonline.org
© 2014 Security Management
This site is protected by copyright and trade mark laws under U.S. and International law.
No part of this work may be reproduced without the written permission of Security Management.