April 2010


Plus: Crime Spotting ♦ Collaboration ♦ Public-Private Partnerships


The Evolving Terrorist Threat

By Joseph Straw

For years terrorism experts have allayed concerns over domestic "homegrown" terrorists in the United States, but that attitude is changing in light of events such as the November shootings at Fort Hood.


A Trojan Seal

By Ken Stanley

As technology allows for ever greater surveillance and espionage powers, Security Management explores how one incident from the Cold War created a paradigm shift in how groups spy on each other. (Online Exclusive)


Yet Another Cyber "Wake-up Call"

By Joseph Straw

A groundbreaking study reveals that cyberattacks are becoming more severe, and security managers, while concerned, lack the tools to combat the threat.

Urban Area Perspective - Denver

By Joseph Straw

Security Management interviews Daniel T. Alexander, director of the City and County of Denver's Mayor's Office of Emergency Management and Homeland Security.


Doing It the Dutch Way

By Matthew Harwood

A look at how the Netherlands pioneered public-private partnerships and how it is using the model to propel innovation in homeland security.

Schooled in Preparedness

By Ann Longmore-Etheridge

A federal grant allowed the East Aurora (Illinois) School District to create and implement a top-notch all-hazards emergency management plan.

Holes in Hotel Security

By Laura Spadanuta

Experts are calling for a renewed emphasis on training for personnel working in the hospitality industry in light of a high-profile stalking case.

Challenges Facing Diplomatic Security

By Laura Spadanuta

The Government Accountability Office says multiple problems plague the Bureau of Diplomatic Security's ability to do its job.

Got Your Number

By Ann Longmore-Etheridge

Security drives home the message that if you steal a car and park at this mall, your free-wheeling ways may soon come to a screeching halt.

Legal Report

By Teresa Anderson

A company that fired a potentially violent employee is not guilty of discrimination and a plaintiff who deleted e-mail loses the right to pursue the case. Also, legislative updates.

Industry News

By Ann Longmore-Etheridge

ASIS applauds the winners of the student writing competition and announces this year's seminar speakers, and Patricia Schmitt, CPP, is profiled.

Managing Big Egos

By Saul Fine and Ishayau Horowitz

Companies seeking confident and charismatic leaders might unwittingly invite narcissists into the workplace.


The Magazine — Past Issues


Failure is an Option, Failing to Learn is Not

By Sherry Harowitz

Why failure must be an option in the fight against terrorism.


The Rewards of PCI Compliance

By John Wagley

Small firms are less likely to be PCI compliant than larger organizations and are at a greater risk of data theft.

Breaches Lead to Employee Training

By John Wagley

Firms grow wiser after a data breach, a new report finds.

Quick Bytes: Security Budgets

By John Wagley

Security budgets will continue to grow in 2010 as spending on new security products recovers, according to a recent Forrester Research report.

Behind the Numbers

By M86 Security

Pharmaceutical fraud dominated spam in the second half of 2009.


Parsing Public Support

By Stephanie Berrong

A new report attempts to quantify the cost of getting public buy-in for security in the United Kingdom.

Global Security Collaboration Grows

By Stephanie Berrong

An international private-public partnership on data security in defense and aerospace contracting continues to blossom.


Top 10 Security Industry Private Investments for January

Top 10 Performing Security Industry Stocks for January

ISC West Product Showcase 2010

Peruse the products on the floor of this year's ISC West show held at the Sands Expo and Convention Center, Las Vegas, from March 24-26.


Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdepedencies

By Tyson Macaulay; Reviewed by J. Kelly Stewart, CFC, CAS

A clear, concise, and compelling textbook that explains the interdependencies of critical infrastructure deftly.

Aviation and Airport Security: Terrorism and Safety Concerns, Second Edition

By Kathleen M. Sweet; Reviewed by Mayer Nudell, CSC

A necessary book for stakeholders perpetually affected by the "War on Terrorism."

Imagining Security

By Jennifer Wood and Clifford Shearing; Marianna Perry, CPP

The 21st century will lead to a paradigm shift in the way people think of security, Imagining Security says.

An Introduction to Security and Emergency Planning for Faith-Based Organizations

By Jeffrey Hawkins; Reviewed by David Sayer

Hawkins succinctly addresses the security concerns of religious institutions and houses of worship in this introductory text.

Identity Theft Handbook: Detection, Prevention, and Security

By Martin T. Biegelman; Reviewed by Karim H. Vellani, CPP, CSC

A boring read that security professionals will find little worth their attention.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.