THE MAGAZINE

April 2008

CAMPUS SHOOTINGS: WHO'S MOST LIKELY TO?

Plus: Brand Protection • Food Safety • Wireless Networks

COVER STORY

Teaming Up to Reduce Risk

By Matthew Harwood

Universities are using threat assessment teams to help identify at-risk students and keep them from harming themselves or others.

Sidebar: Navigating Privacy Protections

FEATURES

Recipe for Success

By John Barham

The European Union has a number of initiatives underway that it hopes are the right ingredients for securing the food supply.

Sidebar: China Syndrome

HOMELAND SECURITY

State Perspective - Ohio

By Joseph Straw

Interview with William F. Veda, Jr., executive director of Ohio Homeland Security .

Learning Bomb-Making Secrets

By Joseph Straw

A Web portal sponsored by the government provides IED techniques to qualified bomb technicians.

Driver's License Rule Improved, but Imperfect

By Joseph Straw

States that want their citizens to be able to use driver’s licenses as federal identification now have a limited timeframe in which to institute far more thorough methods for vetting the vital documents used to apply for those licenses and to take other steps to ensure that the entire process is more secure.

Worldwide Terrorism by Target

By Mike Moran

Quarterly target data on terrorist incidents from the MIPT Terrorism Knowledge Base.

NEWS & TRENDS

House of Worship Security and Training Tips

By Laura Spadanuta

Last year's shootings at a Colorado mission and megachurch are a reminder that even houses of worship must address security.

PRINT EDITION ONLY

The Right Way to Go Wireless

By John Wagley

A favorite hacking target, wireless networks can be secured with the right mix of policy and technical solutions.

Food Testing Trends

By Joseph Straw

Emerging technology may help food-safety testing meet the challenges of today's fast-paced global supply chain.

Protecting the Brand

By Michael Steinle

It is crucial for companies to develop strategies to protect their reputations, which includes preventing and responding to incidents involving food products.

Communications Upgrade

By Laura Spadanuta

A problem with public-safety communications in an emergency may get solved as a part of the move to digital television broadcasting.

Can Design Affect Suicide-Bomber Casualty Rates?

By Laura Spadanuta

Yes, says a new study from the Florida Institute of Technology.

Legal Report

By Teresa Anderson

Rulings on harrassment, emotional distress, and employee screening; plus legislation on airport security, gun control, and identity theft.

Industry News

By Ann Longmore-Etheridge

Technical education programs can provide good training for future security professionals and the Profile Group of Companies of Ontario, Canada, is recognized.

Painless Performance Reviews

By Mick Hager

Reviews should focus not on past problems but on how the worker can improve and plot a career path with the company.

 

The Magazine — Past Issues

EDITOR'S NOTE

Terrorism Down but Never Out

By Sherry Harowitz

Terrorism attacks are down, but worries remain high.

CYBERSECURITY

E-mail Encryption Gets Practical

By John Wagley

More companies are considering new products and technologies that allow for easy encryption of e-mail.

Tech Talk from Microsoft: IT Security Assessments

By Thomas Dawkins

This is the third in a series of four pieces that will highlight resources available from Microsoft. ASIS International is partnering with Microsoft to help raise IT awareness among security professionals.

 

Behind the Numbers: Most Common IT Security Managed Services

Numbers

46

The percentage of IT professionals who expect a serious data loss once a year, according to Symantec’s 2nd annual IT Risk Management Report.

New Trends in System Password Management

By John Wagley

Companies are implementing a more sophisticated version of password management, known as enterprise single sign-on (ESSO).

PRODUCT SHOWCASE

ISC West Showcase

Exit controls, network video, dome cameras, and ID printers are among the items on display from the ISC West trade show.

INTERNATIONAL

Risk and Reward in Global Markets

By John Barham

A recent analysis of crime trends around the world shines a spotlight on Asia, Europe, and Latin America.

Russian Cybercrooks Adopt Lower Profile

By John Barham

How publicity killed the Russian Business Network.

Security Research Gets a Boost from the EU

By John Barham

The European Union is ramping up funding to develop new security technologies and to encourage cooperation in Europe’s fragmented security industry.

Numbers

4

The percent of cargo containers that were targeted for manual inspection at foreign ports because of red flags raised during screening but were never examined. Reasons for the oversight include difficulty getting to the container and refusals by the host government to cooperate.

CASE STUDY

Order in the Court

By Teresa Anderson

As people enter the Clermont County Municipal Courthouse, they go through an instant database check to see whether they are wanted by law enforcement.

BOOK REVIEWS

Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justice

By Ronald J. Olive; Reviewed by Thomas E. Engells

The agent that secured the spy Jonathan Pollard's confession tells how he nabbed the man behind one of the greatest national security breaches in U.S. history.

Security Clearance Manual: How to Reduce the Time It Takes to Get Your Government Clearance

By William H. Henderson; Reviewed by Brent Campbell

Thinking of getting a government job that requires a security clearance? If so, this book is for you.

Fighting Fraud: How to Establish and Manage an Anti-Fraud Program

By Gerald L. Kovacich; Reviewed by Ronald Mendell, CISSP

Get the practical advice needed to develop a successful anti-fraud program.

Principles and Practices of Business Continuity: Tools and Techniques

By Jim Burtles; Reviewed by Mayer Nudell

Responding to threats to your organization by creating a comprehensive and well-functioning business continuity plan.

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets

By Jeffrey M. Stanton and Kathryn R. Stam; Reviewed by Colin D. Pearce

How companies can strike a balance between protecting themselves against insider threats and respecting employees' privacy.

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.