It may not be readily apparent, but a rapidly evolving risk and compliance issue—pixel litigation—is bringing security practitioners into remediation efforts that are a surprise to them. To get ahead of the swell of litigation in this area, there are several things legal, compliance, and security professionals can consider doing now to assess the risk of pixel litigation.
Featured Articles
A Climate Conversation with GPT-4 and Gemini
The smarter artificial intelligence (AI) becomes, the closer it gets to the next level of intelligence: general intelligence. Then, AI will be able to accomplish any intellectual task that a smart human can. What does this mean for addressing security risks related to climate change?
12 Safety Guidelines for Casino Patrons
How to Upgrade Secure Storage in Cannabis Facilities
Security Technology: Will Security Meet the AI Moment?
Best of Security Management
Focus on Extremism and Political Instability
Leaderless Resistance: Understanding and Countering an Amorphous Threat
The most likely terrorist threat today comes from lone assailants and small cells operating under the principles of leaderless resistance.
More On This Topic
▪ The Impact and Opportunities of the Geopolitical Climate: Try Not to Overreact
▪ Intelligence to Address Extremism: Look for What Matters Most
▪ Climate Change and the Rise of Dark Green Ideologies
▪ Preparing for Civil Unrest and War in Cultural Properties
▪ Understanding the 3 Levels of Security Glass
Read the full content collection from Security Management here.
Security Management Podcast
April 2024: Meeting the Moment with AI; Plus Fighting Complacency with Ongoing Security Hardening
With brand new legislation out of the European Union shaking up artificial intelligence (AI) applications, what does this mean for security practitioners and companies? Mark Mullison, chief technology officer at Allied Universal, helps podcast host Brendan Howard wade through the new territory. Also in this episode, sponsored by BeamUP, David Harris outlines some of the opportunities that AI could present to physical security professionals—if it finally gets effectively leveraged. And lastly, Jennifer Hesterman shares how organizations can harden soft targets without turning off potential customers or patrons, with concentric rings of security out from the front door to the Internet.
Focus on Executive Protection
When Second Homes Are a Primary Concern
Vacation homes are supposed to be sanctuaries, and the people who decamp there usually treat it as such. Two experts offer advice on how executive protection teams can help make these places of refuge rejuvenating and safe for clients.
Celebrity Protection in the Spotlight
Building a Methodology for Proactive Close Protection
ASIS Calendar of Webinars & Events
As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.
Book Review: Modern Management and Leadership: Best Practice Essentials with CISO/CSO Applications
In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role.
Catch Up With SM on Social Media
Podcasts
Hear what Security Management editors and guest speakers have to say about this month’s magazine.
Webinars
View all of our past and upcoming educational webinars.
Media Kit
Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes.
Archives
Access old issues of Security Management and other content.
Download
ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.
Security Technology
Read the latest articles from our newest publication, Security Technology.