May 2010


Plus: Disaster Recovery ♦ Food Safety ♦ Data Protection


Fast Track to Fire Safety

By Laura Spadanuta

How Oaklawn Racing and Gaming in Hot Springs, Arkansas, revamped its fire system while the facility was being expanded.


Security Lies Beneath: The Case for Corporate Safe Rooms

By Jordan Frankel

A corporate safe room is the best investment a company can make to protect its most valuable assets: its executives. (Online Exclusive)


From Response to Recovery

By Joseph Straw

A new draft framework for disaster management focuses on the recovery plans of federal agencies, including the role of the private sector.

Forging Public-Private Relationships

By Joseph Straw

A regional disaster plan that encompasses Seattle, Washington, can serve as an example to other localities.

Urban Area Perspective - Los Angeles

By Joseph Straw

Security Management interviews Sheriff Lee Baca, chief of the Los Angeles County Sheriff's Department.


Two Tools to Hold Off Hackers

By John Wagley

Firewall management and network behavior analysis are two applications helping companies secure the network.

The Golden Rule

By Stephanie Berrong

The operators of Peru's Yanacocha gold mine have learned that working with nongovernmental organizations and doing good for local communities yield security benefits.

A New Point of View for Police

By Laura Spadanuta

Many police departments have squad-car cameras, now a few cities are testing a wearable video system for use away from the vehicle.

Building a New Corporate Security Strategy

By Laura Spadanuta

Caterpillar's Director of Global Security Timothy L. Williams, CPP, and members of his security team talk to Security Management about devising a corporate security strategy.

Picture of Health

By Teresa Anderson

A new surveillance system helps Southside Medical Center offer succor in a secure environment.

Legal Report

By Teresa Anderson

An employee is awarded $1.5 million in a retaliation suit, and parents sue their son's school after learning that officials spied on him via Webcam. Also, legislation on cruise ship safety, airport security, biometrics, and firearms. 

Industry News

By Ann Longmore-Etheridge

The Netherlands adopts the ASIS standard on resilience and Lorrie Bentley-Navarro, CPP, is profiled.

Caring for Patients

By Teresa Anderson

How one medical center created an ambassador program within its security ranks to enhance customer service and create a career path.


The Magazine — Past Issues


I Would Never Call My Opponent a Scoundrel

By Sherry Harowitz

The Southern Poverty Law Center says that the Tea Party Movement cannot "fairly" be called an extremist group, raising the question: Why were they in a report on such groups?


Reining in Data Collection

By John Wagley

As Web companies continue to gather information on consumers for marketing and research purposes, privacy considerations remain a serious concern.

Worth a Look: Facing Password Insecurity

By John Wagley

KeyLemon brings facial recognition software to computer security.

Quick Bytes

By John Wagley

Executives fear voice interception of employees.

Behind the Numbers

By Forrester Research, Inc.

Forrester Research finds out why companies adopt identity and access management solutions.


Putting Duty of Care on the Radar

By Stephanie Berrong

Companies must be aware of their legal obligations to protect employees who are living or traveling abroad for business.

Finding Food Security Solutions

By Stephanie Berrong

A food monitoring system developed by researchers at London's Kingston University found that seafood is the main source of mercury contamination in Europe.


The Character of Harms: Operational Challenges in Control

By Malcolm K. Sparrow; Reviewed by Thomas E. Engells, CPP, CPM

Security professionals, argues Sparrow, should concentrate on building up the "good" rather than reducing the "bad."

Al-Qaida's Doctrine for Insurgency: Abd Al-Aziz Al-Muqrin's A Practical Course for Guerrilla War

By Norman Cigar; Reviewed by Col. Britt Mallow (Retired)

The first practical translation of an al Qaeda training manual written by a veteran jihadist.

High-Rise Security and Fire Life Safety, Third Edition

By Geoff Craighead; Reviewed by Kevin A. Cassidy

Geoff Craighead's third edition is even better than his first two editions of this highly reliable reference book.

Computer Fraud Casebook: The Bytes That Bite

By Joseph T. Wells, editor; Reviewed by Adrian A. Barnie

Forty-two cases demonstrate how hackers use computers to perpetrate fraud.

A Law Enforcement and Security Officers' Guide to Responding to Bomb Threats

By Jim Smith; Reviewed by Glen Kitteringham, CPP

Private security officers aren't taken for granted in this book about how to respond to bomb threats.

Voice Over IP Security

By Patrick Park; Reviewed by Brent Campbell

As more and more businesses opt for Voice over IP, learn how to implement the technology safely while understanding its weaknesses.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.