Study Finds Most N.C. Businesses Have Disaster Plans 

Fewer than one in five North Carolina businesses surveyed by AT&T for an annual study have no disaster recovery or continuity plan, and about three-quarters consider business continuity planning a priority....

ASIS Foundation Reports On Workplace Dishonesty 

Employers cannot afford to ignore this large-scale problem and should do everything in their power to create a workplace atmosphere that promotes honesty and encourages and rewards good behavior. ...

ASIS Foundation Explores Gun Violence In The Workplace 

Workplace violence affects more than two million workers in the United States every year and accounts for about 20 percent of all violent crime. That’s according to “Preventing Gun Violence in the Workplace,” a Connecting Research in Security to Practice (CRISP) Report commissioned by the ASIS Foundation....

Will Exiting Employees Steal Data? 

Companies should exercise extreme caution when it comes to dismissing employees with knowledge of a business’s IT systems, according to a new survey released by a company specializing in identity management. ...

Who? What? When? Where? Why? 

By Paul C. Boucherle

Advances in digital technology within the security industry are driving today's convergence mania. For example, options abound in security video surveillance,...

Ed Merkle leads technology success story at Virginia Port Authority 

By Carol Carey

In most instances, security directors wishing to install sophisticated access control or surveillance systems at their workplaces must be sensitive to...

Wendy Nather builds-in information security at Texas Education Agency 

By Randy Southerland

Wendy Nather never planned to get into the security business. It wasn't exactly an accident, but arriving at her current position as information security...

Shawn Reilly combines guards and gadgets at Greenville hospital 

By Randy Southerland

Building an effective security program for a hospital with multiple campuses and buildings that weren't designed with security in mind can be a challenging...

Emphasis on service drives success for Planned Security's Dino Iuliano 

By Randy Southerland

Dino Iuliano had given up on the security field. After spending years in the military and working in law enforcement and private security he had grown...

Robert Achenbach lifts security profile at First National of Nebraska 

By Carol Carey

Today's security director needs to be a manager of people, places and technology, with both law enforcement and business skills. Working with upper management...

Mobile Insecurity 

By Derek Benz

In a world where convenience is king, global markets demand mobility, and the sun never sets on business. The idea of increased security chafes like a...

One Hero Among Many 

By Stephanie Silk

It didn't take a phone booth or a batcave for one security officer to transform into a hero just the knowledge, training and instinct he has learned from...

Traveling Safely 

What threats are we under when we travel that don't present themselves every day? SAL LIFRIERI, Protective Countermeasures and Consulting Inc.: Probably...

Targeting The Customer 

By William Kennedy

The biggest technology shift in access control and video security in the last 10 years has not been the move to IP/IT devices, which was and still is...

Experience Pays Off 

By Michael Fickes

As James Urrea walks through the aisles of a Stater Brothers supermarket, he scans the shelves and often plucks a can or a box from a display and turns...

Candidates Cheat On Job Certification Exams, Says Study 

A secret international investigation into job certification test fraud has confirmed long-held suspicions that thousands of people worldwide are cheating on certification exams for coveted jobs....

5 ASIS Sessions NOT TO MISS 

The 54th Annual ASIS International Seminar, which takes place in Atlanta on Sept. 15-18, will feature more than 175 concurrent sessions as part of its...

Training For Technology Success 

Supplier companies and other organizations are rising to the challenge of offering technology training that helps to maximize the effectiveness of technology's...

Warning: Crisis Ahead 

By Ashley Roe

Disasters are all around us. Last March, an outbreak of tornadoes barreled through downtown Atlanta, catching residents, tourists and businesses off guard...

Marking The Yardstick 

By Kathleen Kotwica and Marleah Blades

Let's say you're asked to prove the effectiveness of one of your security programs or initiatives to senior management. Or perhaps you need to develop...

Building Interdepartmental Alliances Based On ROSI 

By Paul C. Boucherle

EDITOR'S NOTE: Our monthly column translates issues of convergence into everyday, practical terms. The goal is to provide readers with an action plan...

ASIS International Publishes Book To Teach Asset Protection 

To help company’s protect their assets, ASIS International has published “Security Surveys” by William R. Floyd, CPP....

ASIS International Issues Second Edition For Two Guidelines 

The ASIS Commission on Standards and Guidelines recently released two new guidelines: the second edition of the Chief Security Officer Guideline and the second edition of the Threat Advisory System Response (TASR) Guideline. ...

Companies’ Shredding Efforts May Fall Short 

When it comes to shredding sensitive business documents, many companies admit unfamiliarity with key federal and state laws governing information privacy, leaving them vulnerable to fines and identity theft....

9 Rules of Security Integration 

By Michael Fickes

Emerging technology is rocking the world of corporate and institutional security directors. Several years ago, security technology networks avoided the...

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top