<?xml version="1.0" encoding="utf-8"?><rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0"><channel xml:base="http://www.asisonline.org/security-management-magazine/latest-news/rss-feed---security-management/" xmlns:atom="http://www.w3.org/2005/Atom"><title>Security Management</title><link>http://www.asisonline.org/security-management-magazine/latest-news/rss-feed---security-management/</link><description>Articles, infographics, and more from Security Management, powered by ASIS International.</description><language>en-us</language><lastBuildDate>Thu, 21 May 2026 17:24:56 -0400</lastBuildDate><atom:link href="ASIS.Models.Pages.RSSFeedPage_DynamicProxy" rel="self" type="application/rss+xml" /><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/05/world-cup-security/adidas-preparedness/"><guid isPermaLink="false">0c0296d0-069b-421d-816d-23383282f48f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/05/world-cup-security/adidas-preparedness/</link><title>How Adidas is Preparing for the Biggest World Cup Tournament in History</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/may/0526-world-cup-gates-case-study-about-adidas.jpg' style='float: left' alt=''/&gt;The FIFA World Cup 2026 is massive, creating new opportunities and complexities for security risk managers. Here’s how adidas is leveraging its regional teams, alongside a GSOC from Healix, to address the challenge.</description><pubDate>Mon, 18 May 2026 07:48:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/05/world-cup-security/executive-protection-advance/"><guid isPermaLink="false">c8c60419-1cdf-4b6f-ab29-fe04d980792d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/05/world-cup-security/executive-protection-advance/</link><title>Dual Advances Boost Relationships and Preparedness for World Cup Executive Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/may/0526-meyer-world-cup-executive-protection.jpg' style='float: left' alt=''/&gt;Security teams can streamline their executive protection threat assessments by first narrowing which matches principals want to attend. After that, respectful outreach takes priority. </description><pubDate>Mon, 18 May 2026 07:48:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/05/certification-profile/"><guid isPermaLink="false">52658d76-1b83-4fe2-8ff2-f7bc942ee1d2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/05/certification-profile/</link><title>Certification Profile: Chris Marshall, CPP, MBCI, M.ISRM </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/may/0526-chris-marshall-certification-profile.jpg' style='float: left' alt=''/&gt;“Time spent investing in your professional education and learning from others is never wasted, nor is optimizing your networking opportunities,” says Chris Marshall, CPP.</description><pubDate>Mon, 11 May 2026 14:19:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/3-non-negotiables-cisos-agentic-era/"><guid isPermaLink="false">4a5f52a9-e255-4d8d-a97e-e25ea85931c5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/3-non-negotiables-cisos-agentic-era/</link><title>3 Non-Negotiables for CISOs in the Agentic Era</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-robinson-sectech-agentic-ai-non-negotiables-cisos.jpg' style='float: left' alt=''/&gt;Artificial intelligence (AI) threats are evolving rapidly in the agentic AI era. Now is the time to create security foundations and a playbook for managing them. </description><pubDate>Fri, 01 May 2026 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/human-and-tech-collaboration-how-socs-become-truly-intelligent/"><guid isPermaLink="false">6c33d6ff-80f7-46d0-a180-8c40f6b30cdd</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/human-and-tech-collaboration-how-socs-become-truly-intelligent/</link><title>Human and Tech Collaboration: How SOCs Become Truly Intelligent</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-sectech-hill.jpg' style='float: left' alt=''/&gt;Strategic security operations centers are using systems powered by artificial intelligence to handle basic alerts, freeing human operators to focus on exceptions and high-stakes incidents.</description><pubDate>Fri, 01 May 2026 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/from-data-theft-security-control-doubts-5-survey-takeaways-about-agentic-ai-risk-management/"><guid isPermaLink="false">bb60b00b-5aa2-4312-8c72-3e634c03eff3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/from-data-theft-security-control-doubts-5-survey-takeaways-about-agentic-ai-risk-management/</link><title>From Data Theft to Security Control Doubts: 5 Survey Takeaways About Agentic AI Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-sectech-listicle-884x500.png' style='float: left' alt=''/&gt;As some organizations deploy agentic AI, risk management concerns are causing others to pause or slow their technology advancement. A recent global survey sheds light on why.</description><pubDate>Fri, 01 May 2026 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/how-to-use-ai-responsibly-prevent-soc-analyst-burnout/"><guid isPermaLink="false">9c6f059d-9b3f-4652-b0ab-a6c613678da9</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/how-to-use-ai-responsibly-prevent-soc-analyst-burnout/</link><title>How to Use AI Responsibly to Prevent SOC Analyst Burnout</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/sectech-may-2026-macdonald-final.png' style='float: left' alt=''/&gt;Security operations center analyst burnout from prolonged vigilance while responding to a flood of alerts is a problem. Agentic AI solutions could help.</description><pubDate>Fri, 01 May 2026 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/what-is-agentic-ai/"><guid isPermaLink="false">a06de138-e66a-458d-a401-ecc8cb388e39</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/what-is-agentic-ai/</link><title>What is Agentic AI?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-gates-fast-facts-agentic-ai.jpg' style='float: left' alt=''/&gt;Companies are beginning to use agentic artificial intelligence (AI) to write software and triage security alarms. But what exactly is agentic AI? And what sets it apart from other types of AI?</description><pubDate>Fri, 01 May 2026 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/the-authority-gap-why-human-oversight-fails-agentic-workforce/"><guid isPermaLink="false">bc7af18b-5b89-44e6-9d87-6442d10e1a1c</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/the-authority-gap-why-human-oversight-fails-agentic-workforce/</link><title>The Authority Gap: Why Human Oversight Fails the Agentic Workforce</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-sectech-tidwell-agenic-ai-human-oversight-fails.jpg' style='float: left' alt=''/&gt;The reliance on human-in-the-loop tends to trigger automation bias. True organizational durability requires moving toward human-on-the-loop oversight to secure the agency of agentic AI—not just its access.</description><pubDate>Mon, 04 May 2026 14:18:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/how-to-set-up-your-reasoning-forensics-black-box-to-manage-agentic-ai-risk/"><guid isPermaLink="false">31ec148e-3021-4bd3-b12a-8a95e98de2f2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/how-to-set-up-your-reasoning-forensics-black-box-to-manage-agentic-ai-risk/</link><title>How to Set-Up Your Reasoning Forensics Black Box to Manage Agentic AI Risk</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-sectech-tidwell-sidebar-884x500.jpg' style='float: left' alt=''/&gt;Security practitioners should create a Reasoning Forensics Black Box (RFBB), a security control for all autonomous agents operating with certain levels of authority. Here’s how to get started.</description><pubDate>Mon, 04 May 2026 14:17:30 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/05/listen-to-nurses/"><guid isPermaLink="false">bc122de0-0960-443b-bfe1-d49f3fbbf427</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/05/listen-to-nurses/</link><title>Preventing Workplace Violence: Holistic Support Starts with Listening to Nurses</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/may/0526-sm-walker-oe-preventing-workplace-violence02-884x500.png' style='float: left' alt=''/&gt;Nurses are working in an increasingly complex and high-risk environment. A chief nursing officer writes that more can be done to prevent critical situations, so nurses can focus on delivering care.</description><pubDate>Wed, 06 May 2026 11:42:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/05/book-review-great-heist/"><guid isPermaLink="false">0ee61749-8d7e-4fbf-8bd4-3c47b35c30af</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/05/book-review-great-heist/</link><title>Book Review: The Great Heist: China’s Epic Campaign to Steal America’s Secrets</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/may/0526-book-review-the-great-heist-featured-image.jpg' style='float: left' alt=''/&gt;The authors’ presentation of documented facts that makes a strong case that corporate and university complacency enabled this “great heist.”</description><pubDate>Tue, 05 May 2026 09:53:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/defending-against-online-fraud-in-the-age-of-agentic-ai/"><guid isPermaLink="false">60139611-53dc-4b49-8317-edb470216dab</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/defending-against-online-fraud-in-the-age-of-agentic-ai/</link><title>Defending Against Online Fraud in the Age of Agentic AI</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/0526-sectech-teruel-884x500.png' style='float: left' alt=''/&gt;Agentic AI is helping bad actors quickly evolve their tactics by deepening the complexity of their attacks and widening their reach with unprecedented scale.</description><pubDate>Fri, 01 May 2026 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/risk-vs-reward-what-security-leaders-need-to-know-when-using-agentic-ai/"><guid isPermaLink="false">996e8072-965d-48a0-b4a7-63d9461880b8</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/agentic-ai/risk-vs-reward-what-security-leaders-need-to-know-when-using-agentic-ai/</link><title>Risk vs. Reward: What Security Leaders Need to Know When Using Agentic AI </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/may/sectech-may-2026-lazzaro.gif' style='float: left' alt=''/&gt;Security vendors are increasingly touting agentic artificial intelligence solutions. We spoke with risk management experts about steps practitioners should take before deploying them at their organizations. </description><pubDate>Fri, 01 May 2026 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/modern-paradox-checkpoints/"><guid isPermaLink="false">84ab5289-3e9e-459f-84d3-571631c486b7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/modern-paradox-checkpoints/</link><title>Why Traditional Checkpoints Could Be Increasing Your Enterprise Risk</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/sm-0426-oe-modern-security-paradox-ralph-clark-v1.png' style='float: left' alt=''/&gt;Understanding—and resolving—this paradox requires security leaders to rethink how risk is defined, measured, and managed in high-throughput environments.</description><pubDate>Tue, 28 Apr 2026 08:18:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/cognitive-warfare/"><guid isPermaLink="false">4606d676-2d6d-44b2-84b7-011bf4f901e1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/cognitive-warfare/</link><title>Cognitive Warfare Is Exploiting Polarization, Both in Nations and Companies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/sm-0426-wood---oe---cognitive-warfare.jpg' style='float: left' alt=''/&gt;State-sponsored operations are no longer just stealing data or disrupting networks. They are degrading the way people think, and domestic polarization is the attack surface.</description><pubDate>Wed, 22 Apr 2026 08:15:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/crisis-readiness-digital-twins/"><guid isPermaLink="false">994a8c07-7f8f-42a1-bd41-41e436ea2f11</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/crisis-readiness-digital-twins/</link><title>Buying Back Decision Time: How Digital Twins Improve Crisis Readiness </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-oe-massimo-pani-digital-twins-for-disaster-response-884x500.png' style='float: left' alt=''/&gt;AI doesn’t remove uncertainty, but it changes what leaders can see and simulate before, during, and after an impact. The organizations that navigate faster do not just add dashboards; they decide differently. </description><pubDate>Fri, 17 Apr 2026 08:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/asis-news/"><guid isPermaLink="false">ae73f916-674a-41d2-81e8-ea150a550bbd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/asis-news/</link><title>ASIS News: Be a Security LeadHER!</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-asis-news-884x500.jpg' style='float: left' alt=''/&gt;Register for Security LeadHER to access powerful education, networking, and professional development, plus other monthly ASIS insights you won’t want to miss.</description><pubDate>Mon, 27 Apr 2026 08:40:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/industry-news/"><guid isPermaLink="false">26544b4e-8bd6-40bc-92b5-1aa8e952865b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/industry-news/</link><title>Industry News: Security Monitoring Platform Strengthens Protections and Privacy for Nonprofit Clients and Staff</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/sm-0426-industry-news-safe-alliance-building.jpg' style='float: left' alt=''/&gt;An Austin, Texas-based nonprofit that supports survivors of abuse and violence leaned on a Genetec solution to improve its security and access control across several facilities.</description><pubDate>Thu, 23 Apr 2026 09:50:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/high-turnover-violence-risk/"><guid isPermaLink="false">2ddca79a-d35e-4390-b379-7da4b788300c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/high-turnover-violence-risk/</link><title>Why Violence Risk in High-Turnover Environments Is a Leadership and HR Governance Problem</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-warehouses-high-turnover-environments01-884x500.jpg' style='float: left' alt=''/&gt;Distribution centers and warehouses prove, again and again, that violence prevention is not a security program. It is a leadership system.</description><pubDate>Mon, 13 Apr 2026 08:06:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/scanner-theft/"><guid isPermaLink="false">26a8cf5c-273e-43f0-9f7c-8d3f53e783c9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/scanner-theft/</link><title>Scan Here for Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-meyer-warehouses-inventory-scanner-theft-costs.jpg' style='float: left' alt=''/&gt;Inventory scanners have been invaluable for logistics, distribution centers, and retailers. But those handheld devices are easy to steal and resell, potentially costing organizations device costs and potential revenue.</description><pubDate>Mon, 13 Apr 2026 08:06:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/fast-facts/"><guid isPermaLink="false">4c7bae11-215d-471f-b1bb-2278d4b50393</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/fast-facts/</link><title>Phantom Freight Scams Boost Cargo Crime Rates</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-warehouses-fast-facts01-884x500.gif' style='float: left' alt=''/&gt;Criminals increasingly use digital tools to conceal their identities and enable fraud along the supply chain. </description><pubDate>Mon, 13 Apr 2026 08:06:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/distribution-center-arson-attack/"><guid isPermaLink="false">131a8e99-4018-49d7-9ef2-69440fd05af9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/distribution-center-arson-attack/</link><title>Ideology and Anger: Early Lessons from the Kimberly-Clark Distribution Center Arson </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-rodriguez-oe-kimberly-clark-fire.jpg' style='float: left' alt=''/&gt;The arson case in California combines workplace violence, devastating property damage, Luigi Mangione, and a noteworthy anticorporate narrative. </description><pubDate>Tue, 21 Apr 2026 08:25:28 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/scrap-disposal/"><guid isPermaLink="false">7ec49185-9e6d-40e3-bf5c-5abab3c20283</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/scrap-disposal/</link><title>Scrap Disposal: When the End of the Supply Chain Becomes a Brand and Public Safety Risk</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/sm-0426-warehouses-fontes-scrap-disposal-v4.png' style='float: left' alt=''/&gt;When scrap governance fails, organizations are not simply losing material, they are losing control of their brand and, in some cases, exposing the public to unsafe products.</description><pubDate>Mon, 13 Apr 2026 08:06:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/certification-profile/"><guid isPermaLink="false">6ec3fdbb-c346-451a-96a0-fbb6b80f3be3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/certification-profile/</link><title>Certification Profile: Andrew Henecke, CPP, CBCP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-andrew-henecke-certification-profile.jpg' style='float: left' alt=''/&gt;Andrew Henecke, CPP, continues a legacy built on the principles of service, discipline, and protecting others.</description><pubDate>Tue, 14 Apr 2026 09:07:04 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/modern-warehouse/"><guid isPermaLink="false">dec968b4-6ce0-4a2a-a3ae-dafed84ebbae</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/warehouse-and-distribution-center-security/modern-warehouse/</link><title>How to Secure the Modern Warehouse</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-warehouses-miles-kruzycki-modern-warehouse-security-884x500.jpg' style='float: left' alt=''/&gt;Warehouses and distribution centers are the heart of e-commerce. Their scale, criticality, and inventory make them essential security management sites. </description><pubDate>Mon, 13 Apr 2026 08:06:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/audience-focused-presentations/"><guid isPermaLink="false">8f7758c9-3870-49e0-83a3-e768dd090111</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/audience-focused-presentations/</link><title>For Better Presentations, Adjust to Fit Your Audience</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-rhatigan-better-presentations-audience-fit.jpg' style='float: left' alt=''/&gt;While metrics can sometimes help, they aren’t the sole factor behind a successful presentation.</description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/fast-facts/"><guid isPermaLink="false">07ec32b9-b4bb-4f23-bb22-0d4d2152a294</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/fast-facts/</link><title>Fast Facts: The Elements of Audience Impression</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0326-mosqueda-presentations-fast-facts.jpg' style='float: left' alt=''/&gt;What an audience sees shapes their impression of a speaker, as well as that person’s credibility. Here are a few nonverbal elements that are impacting audiences beyond the content of a presentation.</description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/vendor-client-synergy/"><guid isPermaLink="false">df36c749-e8b9-497d-b990-4d44d6200510</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/vendor-client-synergy/</link><title>Vendor-Client Synergy: Resolving Expectation Misalignments in Contract Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-turner-oe-vendor-client-synergy.jpg' style='float: left' alt=''/&gt;To avoid misalignment, vendors and clients should have early, honest, and realistic discussions about what security officers assigned to the account can and cannot reasonably be expected to do.</description><pubDate>Fri, 10 Apr 2026 07:13:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/what-csuites-want/"><guid isPermaLink="false">c913416f-ea66-46ad-a4ba-67975059a903</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/what-csuites-want/</link><title>What the C-Suite Wants From Presenters</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-presentations-sidebar-qa02-884x500.png' style='float: left' alt=''/&gt;Two security executives offer insight into what makes great presenters stand out and what to avoid so your presentation doesn’t fall flat.</description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/advantages-of-storytelling/"><guid isPermaLink="false">2fbf0e50-329b-481d-b6d6-34c818ec7ee0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/advantages-of-storytelling/</link><title>The 4 Big Advantages of Storytelling in Professional Presentations </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/30426-listicle-v5.png' style='float: left' alt=''/&gt;Strategic storytelling has been used for centuries to sway audiences. These are the four significant advantages that storytellers can leverage when successful.</description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/stronger-career-better-presentations/"><guid isPermaLink="false">33f6750f-5e5d-4577-a8f9-451efc29dd72</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/stronger-career-better-presentations/</link><title>Strengthen Your Career with Effective Presentations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-oconnor-improving-presentations-executive-presence.gif' style='float: left' alt=''/&gt;While most professionals can give a PowerPoint presentation, delivering a message that can sway decision makers requires executive presence. Here’s how to develop these crucial skills. </description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/storytelling-superpower/"><guid isPermaLink="false">81ff32ab-7dc8-4dcb-8828-1de2bc69d626</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/04/improving-presentations/storytelling-superpower/</link><title>Why Storytelling Is the Ultimate Corporate Security Superpower  </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/april/0426-sm-presentations-sidebar-briggs-rudge-884x500.png' style='float: left' alt=''/&gt;Stories are the building blocks of trust, and when trust is secured, data helps to clinch the deal—not the other way around.</description><pubDate>Wed, 01 Apr 2026 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/grc-physical-security/"><guid isPermaLink="false">c161000b-0ca8-475c-a169-43be5aa27e85</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/grc-physical-security/</link><title>GRC and Physical Security: Strengthening Strategic Resilience Through Integrated Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/sm-0326---standalone-article---governancerisk-managementcompliance-final-v2.png' style='float: left' alt=''/&gt;Governance, risk, and compliance frameworks can enable physical security professionals to shift from gatekeepers to business strategists.</description><pubDate>Mon, 30 Mar 2026 09:00:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/misogyny-and-extremism/mitigation-efforts-for-researchers/"><guid isPermaLink="false">bd579ab4-f5aa-464e-bf7e-83c04a4ec5e6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/misogyny-and-extremism/mitigation-efforts-for-researchers/</link><title>How to Support Researchers and Analysts Who Are Targeted Online for Their Work </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-mosqueda-misogyny-extremism-listicle-supporting-researchers-analysts-.gif' style='float: left' alt=''/&gt;Extremism researchers require support from their peers and institutions to combat harassment and other online harm. </description><pubDate>Mon, 23 Mar 2026 07:48:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/misogyny-and-extremism/researching-extremism/"><guid isPermaLink="false">299dcdf7-baea-421d-8fac-c2bb72a87368</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/misogyny-and-extremism/researching-extremism/</link><title>When Researching Extremism, Women Face Outsized Risks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-sm-extremism-misogyny-main-feature01.jpg' style='float: left' alt=''/&gt;Publicly shared and promoted research into extremism shines a light on shadowy organizations and radicalization methods. But that spotlight can put researchers—especially female researchers—at risk. </description><pubDate>Mon, 23 Mar 2026 07:48:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/overcrowding-european-prisons/"><guid isPermaLink="false">f72b46f9-ecb1-48bd-9feb-2015abf08f59</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/overcrowding-european-prisons/</link><title>Overlapping Factors Lead to Overcrowding, Safety Condition Challenges in European Prisons </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/corrections-security/0326-gates-corrections-overcrowding-european-prisons.jpg' style='float: left' alt=''/&gt;A European organization for prison and correctional services identified overcrowding as one of the most persistent and systemic challenges prison administrators face.</description><pubDate>Mon, 16 Mar 2026 08:17:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/mini-cellphones-in-prisons/"><guid isPermaLink="false">6fee2188-1453-42ce-92de-aabff895ca2c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/mini-cellphones-in-prisons/</link><title>A Small but Mighty Problem: Tracking Down Mini Cellphones in Prisons </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/corrections-security/0326-sm-corrections-tracking-down-mini-cellphones-in-prisons-884x500.jpg' style='float: left' alt=''/&gt;Miniature cellphone use by incarcerated individuals poses a problem for correctional facilities. Here are a few tactics that prisons in Europe are using to detect and remove them.</description><pubDate>Mon, 16 Mar 2026 08:17:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/fast-facts/"><guid isPermaLink="false">e3038bc8-a7b0-41e4-ab87-9d7aa2f2b9db</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/fast-facts/</link><title>Fast Facts: The Most Common Contraband in U.S. Federal Prisons</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/corrections-security/0326-gates-corrections-security-contraband-in-prisons.png' style='float: left' alt=''/&gt;An analysis from the U.S. Sentencing Commission identified the top forms of contraband in federal prison facilities between 2019 and 2023.</description><pubDate>Mon, 16 Mar 2026 08:17:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/asis-news/"><guid isPermaLink="false">3553d706-54d0-46bc-995c-601408022adb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/asis-news/</link><title>ASIS News: Celebrating Our Members and Their Achievements</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-asis-news-member-appreciation.jpg' style='float: left' alt=''/&gt;Advance your career with bonus content, special savings, scholarships, regional events, mentorships, and more. </description><pubDate>Wed, 18 Mar 2026 13:26:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/unsafe-understaffing/"><guid isPermaLink="false">766a9cd1-0d9c-4ad7-a3a3-4e545b9be7da</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/corrections-security/unsafe-understaffing/</link><title>A Cascading Crisis: U.S. Federal Prisons Grapple with Decades of Unsafe Understaffing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/corrections-security/0326-sm-corrections-gates-main-feature-staffing-shortages-in-u.s.-prisons-884x500.jpg' style='float: left' alt=''/&gt;The U.S. Bureau of Prisons has struggled to recruit and retain corrections officers for over a decade. Its ongoing staffing crisis is creating a variety of safety and security concerns for staff and incarcerated individuals alike.</description><pubDate>Mon, 16 Mar 2026 08:17:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/barrier-removal/"><guid isPermaLink="false">a0e4a337-d8a0-4ec0-9797-380954cc8d6f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/barrier-removal/</link><title>Why Treat Barrier Removal as a Strategic Capital Investment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-sm-system-lifecycles-muggari-barrier-removal-884x500.gif' style='float: left' alt=''/&gt;Accessibility upgrades may be required in some facilities, but they can also form a critical part of asset preservation and resilience strategies. </description><pubDate>Sat, 28 Feb 2026 11:02:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/subcontractor-evaluation/"><guid isPermaLink="false">017b95b6-119f-4215-83c2-e7a99bf475e0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/subcontractor-evaluation/</link><title>Reinventing Subcontractor Evaluation Beyond Pass/Fail </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-tibbetts-system-lifecycles-subcontractor-evaluation.jpg' style='float: left' alt=''/&gt;A subcontractor struggling with financial instability, poor safety practices, or quality issues can derail an entire project.</description><pubDate>Sat, 28 Feb 2026 11:02:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/rethinking-physical-security/"><guid isPermaLink="false">f0fe6383-dc19-4f19-a193-3c0cb63816f7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/rethinking-physical-security/</link><title>Rethinking Physical Security: Why Life-Cycle Management is Now Table Stakes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-sm-subburaj-life-cycle-management-tracking-884x500.jpg' style='float: left' alt=''/&gt;Life-cycle management gives teams a way to move forward with structure. It creates continuity across the full system life cycle, so information is not lost, decisions are easier to make, and performance is easier to measure.</description><pubDate>Sat, 28 Feb 2026 11:02:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/certification-profile/"><guid isPermaLink="false">c84ed068-b20f-411a-adc1-cca75ac672db</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/certification-profile/</link><title>Certification Profile: Rahul Gopal, CPP, PCI, PSP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-rahul-mohan-certification-profile.jpg' style='float: left' alt=''/&gt;Precision under pressure: ASIS connections and credentialing shaped one professional’s career.  </description><pubDate>Thu, 05 Mar 2026 09:44:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/holistic-asset-management-framework/"><guid isPermaLink="false">f4fb1d3a-cbb7-4181-b8e8-7f4aabe1a672</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/holistic-asset-management-framework/</link><title>Seeing the Forest, Not Just the Trees, in Life-Cycle Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-shehzad-system-lifecycles-periodic-validation.jpg' style='float: left' alt=''/&gt;True life-cycle management is a holistic framework for managing your security assets from end to end, not just the checking the health of individual devices.</description><pubDate>Sat, 28 Feb 2026 11:02:38 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/purchasing-decisions/"><guid isPermaLink="false">20f99ae5-ff3e-426f-8dc9-ff0c6831d109</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/03/security-system-life-cycle-management/purchasing-decisions/</link><title>IT Decision-Makers Put Physical Security Purchases Under the Microscope </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/march/0326-meyer-system-lifecycles-cyber-purchasing-power.jpg' style='float: left' alt=''/&gt;IT was the department most frequently involved in physical security purchasing decisions (54 percent), followed by physical security (48 percent), Genetec found in a recent survey. IT professionals use this sway to examine vendors more closely. </description><pubDate>Sat, 28 Feb 2026 11:02:38 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/industry-news/"><guid isPermaLink="false">46fa516a-f877-4747-84e9-56ab8a556748</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/industry-news/</link><title>Industry News: Virtual Perimeter Solution Increases Late-Night Security at White Castle</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-mosqueda-industry-news-white-castle.jpg' style='float: left' alt=''/&gt;At one of fast-food chain White Castle’s high-risk locations, an Interface solution combines artificial intelligence with support from real people to decrease perimeter security issues. </description><pubDate>Thu, 26 Feb 2026 14:30:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/fast-facts/"><guid isPermaLink="false">52345296-4c40-495e-a896-6408fd81291a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/fast-facts/</link><title>Fast Facts: Healthcare Worker Safety in 2025</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-healthcare-fast-facts.jpg' style='float: left' alt=''/&gt;More than 40 percent of U.S. healthcare workers feel there is only minimal security at their workplace, according to recent research.</description><pubDate>Mon, 16 Feb 2026 08:10:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/asis-news/"><guid isPermaLink="false">b709278b-b7e8-4e3e-acdc-63b8cf2341f1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/asis-news/</link><title>ASIS News: Celebrating Progress and Shaping the Future  </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-asis-news-02.jpg' style='float: left' alt=''/&gt;Mark your calendars for upcoming ASIS global events, scholarship opportunities, and member appreciation month.</description><pubDate>Fri, 20 Feb 2026 09:24:51 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/workplace-violence-views/"><guid isPermaLink="false">9711f64f-f20e-4a79-8100-d6b07e1350f1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/workplace-violence-views/</link><title>Healthcare Workers by the Numbers: How Different Demographics View Workplace Violence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-sm-healthcare-listicle-884x500.jpg' style='float: left' alt=''/&gt;Understanding staff’s perceptions about workplace violence can help security tailor visitor management systems and communicate that support to staff.</description><pubDate>Mon, 16 Feb 2026 08:10:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/security-gaps-healthcare/"><guid isPermaLink="false">a1339101-eae4-48db-b334-c9f51d511ceb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/security-gaps-healthcare/</link><title>Spotting and Shutting Security Gaps in Healthcare Visitor Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-sm-healthcare-feature02-884x500.gif' style='float: left' alt=''/&gt;Hospitals and other healthcare facilities are increasingly dealing with a wide range of risks, so identifying gaps in security before an incident can make all the difference.</description><pubDate>Mon, 16 Feb 2026 08:10:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/regulating-hospital-access/"><guid isPermaLink="false">ac015443-ac9f-4c38-93e3-ed0816f9305b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/visitor-management-in-healthcare/regulating-hospital-access/</link><title>How to Regulate Access and Traffic Flow in Hospitals</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-avigilon-visitor-management--healthcare-sidebar.jpg' style='float: left' alt=''/&gt;Healthcare facilities don’t need a complete renovation to support effective visitor management—six basic but key features for public entryways can create a strong access control system.</description><pubDate>Mon, 16 Feb 2026 08:10:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/investigation-surveillance/"><guid isPermaLink="false">ccc604e4-1cf1-453e-8b3b-ef3520df53cf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/investigation-surveillance/</link><title>Conducting Effective Surveillance in Investigations: Benefits, Legalities, and Modalities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-sm-oe-rule-for-ethical-private-investigation-surveillance01.gif' style='float: left' alt=''/&gt;Mastering the craft of surveillance demands more than simply following a target—it requires planning, patience, and strict adherence to legal and ethical standards.</description><pubDate>Thu, 12 Feb 2026 10:14:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/american-university-case-study/"><guid isPermaLink="false">2cd246b2-233a-4fea-8500-adfe47ed3680</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/american-university-case-study/</link><title>American University Improves Its Campus Dining Experience with Modern Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/sm-0226-american-university-case-study.jpg' style='float: left' alt=''/&gt;When American University fully renovated its main student dining hall, it chose to completely reconfigure its entrance and exit, minimizing wait times and gaining insights into logistics. </description><pubDate>Wed, 11 Feb 2026 09:31:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/book-review-protective-intelligence/"><guid isPermaLink="false">253d2ef1-3d5d-41f9-b741-27fd8be0dcd3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/book-review-protective-intelligence/</link><title>Book Review: The Protective Intelligence Advantage</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-book-review-the-protective-intelligence-advantage.jpg' style='float: left' alt=''/&gt;Authors Fred Burton and Scott Stewart were generous in sharing with readers every bit of protective intelligence they have learned to keep their followers safe and secure of their own accord, says our reviewer. </description><pubDate>Mon, 09 Feb 2026 08:09:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/how-laser-scanning-can-help-cultural-heritage-restoration-efforts/"><guid isPermaLink="false">03d71064-8cd2-4f93-9490-78bd42cc9f68</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/how-laser-scanning-can-help-cultural-heritage-restoration-efforts/</link><title>How Laser Scanning Can Help Cultural Heritage Restoration Efforts</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/february/0226-gates-sectech-fast-facts-lidar-notre-dame.jpg' style='float: left' alt=''/&gt;A fire seriously damaged Notre Dame cathedral in 2019. Prior laser scanning projects were key to restoring the Parisian landmark. </description><pubDate>Sun, 01 Feb 2026 11:24:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/certification-profile/"><guid isPermaLink="false">56a6ac67-0575-45d1-8301-1b3856530141</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/certification-profile/</link><title>Certification Profile: Maureen S. Rush, MS, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-maureen-rush-certification-profile.jpg' style='float: left' alt=''/&gt;The University of Pennsylvania VP for public safety reflects on a career built on service and leadership, strengthened by the ASIS network.</description><pubDate>Thu, 05 Feb 2026 10:08:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/lidar-101/"><guid isPermaLink="false">77c47c0a-bda4-43d7-b52e-f887235c6935</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/lidar-101/</link><title>LiDAR 101: Breaking Down the Technology and its Use Cases</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/february/0226-gates-sectech-lidar-listicle.jpg' style='float: left' alt=''/&gt;Light detection and ranging is better known as LiDAR. Here’s how it works and how it’s being adopted for research, commercial, and security use.</description><pubDate>Sun, 01 Feb 2026 11:24:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/why-intelligent-lidar-solutions-are-the-next-frontier-in-security-and-safety/"><guid isPermaLink="false">d32612b0-8539-4865-ab36-4d9a506d14b0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/why-intelligent-lidar-solutions-are-the-next-frontier-in-security-and-safety/</link><title>Why Intelligent LiDAR Solutions are the Next Frontier in Security and Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/february/0226-sectech-vutukuru-884x500.gif' style='float: left' alt=''/&gt;LiDAR is a proven, reliable solution for industrial and robotics applications—and now for physical security and safety.</description><pubDate>Sun, 01 Feb 2026 11:24:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/lidar-dual-frontier-how-ubiquitous-3d-sensing-transforming-security-empowering-adversaries/"><guid isPermaLink="false">0939d182-a9d4-4c62-a5d0-f77f2a17b592</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/lidar-dual-frontier-how-ubiquitous-3d-sensing-transforming-security-empowering-adversaries/</link><title>LiDAR’s Dual Frontier: How Ubiquitous 3D Sensing is Transforming Security and Empowering Adversaries</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/february/0226-maguire-sectech-lidar-3d-sensing-adversaries.gif' style='float: left' alt=''/&gt;The challenge for defenders is no longer obtaining data via LiDAR but securing it and interpreting it faster and more effectively than those who would exploit it.</description><pubDate>Sun, 01 Feb 2026 11:24:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/02/news-crew-security-protests/"><guid isPermaLink="false">729b8cb4-08a2-4d33-b6c9-98c61ae87c37</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/02/news-crew-security-protests/</link><title>Lessons Learned from Minnesota on Safeguarding News Crews and Executives in Dynamic Environments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/february/0226-meyer-oe-journalists-cover-ice-enforcement-884x500.jpg' style='float: left' alt=''/&gt;By prioritizing preparation, gear, coordination, and adaptive tactics, news organizations can fulfill their public-service role while minimizing harm to personnel and limiting institutional liability.</description><pubDate>Tue, 03 Feb 2026 14:05:24 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/precision-for-a-safer-future-the-benefits-of-airports-adopting-lidar-solutions/"><guid isPermaLink="false">db71ef4c-b24a-4b91-8c87-500c086e7231</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2026/lidar/precision-for-a-safer-future-the-benefits-of-airports-adopting-lidar-solutions/</link><title>Precision for a Safer Future: The Benefits of Airports Adopting LiDAR Solutions</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2026/february/0226-sectech-karakulko-884x500.gif' style='float: left' alt=''/&gt;LiDAR technology is emerging as a solution for perimeter protection, offering precision, adaptability and integration capabilities previously unavailable in airport security.</description><pubDate>Sun, 01 Feb 2026 11:24:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/facial-recognition-stadiums/"><guid isPermaLink="false">ede0e86e-55ab-4a7a-b4be-468eb493e254</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/facial-recognition-stadiums/</link><title>How Facial Recognition Can Help Keep Stadium Staff and Spectators Safe</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-how-facial-recognition-can-help-keep-stadium-staff-and-spectators-safe-884x500.jpg' style='float: left' alt=''/&gt;Stadium operators are increasingly exploring the use of facial recognition to identify threats and ease access for credentialed individuals. </description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/steep-stairs-stadiums/"><guid isPermaLink="false">cf1804a7-0143-4f68-8e66-57c7fc8f1d56</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/steep-stairs-stadiums/</link><title>Going Up: Training Security on Steep Stadium Stairs </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-going-up-the-steep-stairs-problem-884x500.jpg' style='float: left' alt=''/&gt;The steeper the stadium stairs, the greater the risk of injury from falls for security officers and fans alike. Proper training and barricading can help.</description><pubDate>Mon, 19 Jan 2026 08:46:36 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/6-considerations-for-managing-fan-misbehavior-in-modern-sports-venues/"><guid isPermaLink="false">9998238a-5f82-42fd-8844-ac2050e95dd4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/6-considerations-for-managing-fan-misbehavior-in-modern-sports-venues/</link><title>6 Considerations for Managing Fan Misbehavior in Modern Sports Venues</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-demeo-fan-misbehavior-managing-modern-sports-venues.jpg' style='float: left' alt=''/&gt;As fan misbehavior evolves, adopting a holistic risk mitigation approach is key for safeguarding stadiums, venues, and arenas.</description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/fast-facts/"><guid isPermaLink="false">aa7d901c-c924-4f1c-961b-6eaa733d5135</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/fast-facts/</link><title>Best Practices for Mitigating Fan Alcohol Abuse at Sports Stadiums</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-gates-fan-misbhavior-mitigating-fan-alcohol.jpg' style='float: left' alt=''/&gt;The Techniques for Effective Alcohol Management Coalition provides guidance for venues and sports leagues on best practices for serving alcohol to fans at events to limit misuse and abuse.</description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/stadium-screening/"><guid isPermaLink="false">da026380-e698-4c6c-a870-8adcb31c8bc8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/stadium-screening/</link><title>Stadium Screening Runs on Partnerships, People, and Technology</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-addressing-fan-misbehavior-with-screening-884x500.jpg' style='float: left' alt=''/&gt;The assistant chief of public safety at Caesars Superdome and Smoothie King Center shares insights into the preparation for successful security screening.</description><pubDate>Tue, 20 Jan 2026 17:10:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/5-security-takeaways-from-ncs4s-sports-fan-survey/"><guid isPermaLink="false">d368972b-d812-4b98-95c4-d6e77bba1e6e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/5-security-takeaways-from-ncs4s-sports-fan-survey/</link><title>5 Security Takeaways from NCS4’s Sports Fan Survey</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-5-security-takeaways-from-ncs4s-sports-fan-survey01.jpg' style='float: left' alt=''/&gt;The overall experience and sense of personal safety at a live sporting event are key factors that fans consider before buying game day tickets again, according to analysis from the National Center for Spectator Sports Safety and Security. </description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/industry-news/"><guid isPermaLink="false">5e5db514-90b6-4b09-bf7b-a38aacaefe5d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/industry-news/</link><title>Industry News: Popular Italian Port City Installs New Surveillance System</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/sm-0126---industry-news.png' style='float: left' alt=''/&gt;Imperia, Italy, updated its video surveillance system with new cameras and a unified platform for monitoring both the city and its marina.</description><pubDate>Fri, 23 Jan 2026 12:43:42 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/4-ways-to-protect-clients-from-bad-fan-behavior/"><guid isPermaLink="false">2b603508-6bb0-4b29-bbb2-c12ca93d7b12</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/4-ways-to-protect-clients-from-bad-fan-behavior/</link><title>4 Ways to Protect Clients from Bad Fan Behavior</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-4-ways-to-protect-clients-from-bad-fan-behavior01.jpg' style='float: left' alt=''/&gt;Most fan interactions are positive, but sometimes the fan dynamic turns toxic. Security Management spoke with an executive protection expert about this transition and steps to take to mitigate it.</description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/risk-sits-courtside-at-basketball-games/"><guid isPermaLink="false">98f4ce57-02d8-498b-a560-5899a1062e11</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/fan-misbehavior/risk-sits-courtside-at-basketball-games/</link><title>Risk Sits Courtside at Basketball Games</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-gates-fan-misbehavior-basketball-courtside.jpg' style='float: left' alt=''/&gt;Professional basketball games give fans the rare opportunity to sit directly next to the action on the court. This access creates a thrilling game experience, but also poses risks for players, team personnel, and fans alike.</description><pubDate>Mon, 19 Jan 2026 08:46:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/eddie-sorrells-asis-president/"><guid isPermaLink="false">dd749b9a-7143-4a52-8c1d-6d662b73b8f4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/eddie-sorrells-asis-president/</link><title>From Midnight Shift to CEO: Leadership and Transformation Lessons from 2026 ASIS President Eddie Sorrells, CPP, PCI, PSP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-meyer-eddie-sorrells-interview.jpg' style='float: left' alt=''/&gt;Eddie Sorrells plans on leveraging the volunteer leadership skills he honed during 30 years of ASIS involvement while he serves as 2026 ASIS president, modeling an industrywide culture of curiosity. </description><pubDate>Wed, 21 Jan 2026 08:00:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/primary-source-collection/"><guid isPermaLink="false">533aaec9-4f7b-4512-888a-afe5096c2811</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/primary-source-collection/</link><title>Executive Protection in the Age of Primary Source Collection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-kobray-executive-protection-sidebar-data-teams-inforamation.jpg' style='float: left' alt=''/&gt;As threats to executives increasingly arise in dissonant digital spaces, protective intelligence programs should consider primary source collection to bridge the gap from reactive to proactive.</description><pubDate>Mon, 12 Jan 2026 08:16:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/digital-breadcrumbs/"><guid isPermaLink="false">160fe25e-f264-4f6b-8627-a1ec72b47679</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/digital-breadcrumbs/</link><title>The Digital Breadcrumbs that Expose Executives</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-sidebar-muse-zerofox-leveraging-predictability04.jpg' style='float: left' alt=''/&gt;Modern executive protection must take into account how open-source information and social media allows threat actors insight into executives’ routines and weak spots. </description><pubDate>Mon, 12 Jan 2026 08:16:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/fast-facts/"><guid isPermaLink="false">ade6561d-edeb-41bd-9222-7a17922c3c4a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/fast-facts/</link><title>Back to Basics: Do You Know Who to Protect in an Executive Protection Program?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-mosqueda-executive-protection-who-to-protect.jpg' style='float: left' alt=''/&gt;While modern threats and attack methods ebb and flow, an effective EP program is rooted in a strong foundation, with help from the latest ASIS International standard.</description><pubDate>Mon, 12 Jan 2026 08:16:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/asis-news/"><guid isPermaLink="false">473bd3d7-0fe1-4960-ac9b-c73ed9bb9ab0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/asis-news/</link><title>ASIS News: Looking Ahead to 2026</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-asis-news.jpg' style='float: left' alt=''/&gt;Kick off 2026 with vision from our new ASIS President, Eddie Sorrells, CPP, PCI, PSP.</description><pubDate>Fri, 16 Jan 2026 08:00:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/highway-kidnapping/"><guid isPermaLink="false">c33f55da-0f5a-4ee7-a249-21dc5a2312af</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/highway-kidnapping/</link><title>Highway Express Kidnapping: Challenges in Prevention, Resilience, and Post-Victimization</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-main-feature-flores.jpg' style='float: left' alt=''/&gt;Ricardo Flores, CPP, was kidnapped. Here’s how he survived and why prevention measures are crucial in a kidnapping.</description><pubDate>Mon, 12 Jan 2026 08:16:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/risk-conversation/"><guid isPermaLink="false">94ae0d61-1620-49e6-9718-8ccae9006745</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/risk-conversation/</link><title>How CIOs Can Master the Risk Conversation with CEOs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-tabletops-netskope-cio-risk-conversations01.jpg' style='float: left' alt=''/&gt;Research shows that 31 percent of CIOs aren’t confident they know what their CEO truly wants, and 34 percent don’t feel empowered to make long-term strategic decisions.</description><pubDate>Thu, 01 Jan 2026 18:24:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/activism-corporate-risk/"><guid isPermaLink="false">fcc96d48-5001-4d93-a726-deee961d1fcc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/executive-protection/activism-corporate-risk/</link><title>How Activism and Executive Risk Converge Today </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/125-ontic-clarity-executive-protection-civil-unrest-doxing-ceo-threats.png' style='float: left' alt=''/&gt;Executive protection must go beyond logistics and the presence of guns, guards, and gates. It must evolve to consider the full social, digital, and physical complexity.</description><pubDate>Mon, 12 Jan 2026 08:16:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/future-proofing/"><guid isPermaLink="false">2218a488-5462-41b2-af96-bddabbca905c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/future-proofing/</link><title>Clairvoyance Not Required: Build Resilience with Future Proofing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-tabletops-futurist-perspectives-for-tabletop-exercises-884x500.jpg' style='float: left' alt=''/&gt;Exercises in future proofing can help you envision possible futures so you can prepare for changing conditions and increase organizational resilience. </description><pubDate>Thu, 01 Jan 2026 18:24:52 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/fast-facts/"><guid isPermaLink="false">50657dbf-b244-4094-af8e-4b503fa34373</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/fast-facts/</link><title>6 Steps to Design Tabletop Exercises </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-sm-6-steps-to-design-tabletop-exercises-fast-facts-884x500-v3.gif' style='float: left' alt=''/&gt;Aim for realistic scenarios grounded in real-world, recent events. You want to stretch participants’ abilities, not their belief.</description><pubDate>Thu, 01 Jan 2026 18:24:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/culture-emergency-management-exercises/"><guid isPermaLink="false">ee0c29a1-5b8f-47e8-8310-b21eda373bc1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/tabletop-exercises/culture-emergency-management-exercises/</link><title>For Compelling Emergency Management Exercises, Culture Is Key</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0125-alsayed-tabletops-emergency-management-culture.jpg' style='float: left' alt=''/&gt;Exercises that respect culture prepare teams for real-world complexity, where awareness and adaptability matter as much as any plan on paper.</description><pubDate>Thu, 01 Jan 2026 18:24:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2026/01/certification-profile/"><guid isPermaLink="false">99d6e4f9-31b2-427f-996e-832d67e24096</guid><link>http://www.asisonline.org/security-management-magazine/articles/2026/01/certification-profile/</link><title>Certification Profile: Jeremy Batcheldor, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2026/january/0126-jeremy-batcheldor-certification-profile.jpg' style='float: left' alt=''/&gt;Early curiosity and continuous learning shaped this security professional’s path to excellence.</description><pubDate>Wed, 07 Jan 2026 08:07:32 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/to_retain_security_talent_start_with_reframing_its_value/"><guid isPermaLink="false">a9cbae2b-a4ea-4909-b569-1cc67b7e3c9d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/to_retain_security_talent_start_with_reframing_its_value/</link><title>To Retain Security Talent, Start with Reframing Its Value</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-evanoff-burton-hiring-retention-reframe-securitys-value-retention.gif' style='float: left' alt=''/&gt;Understaffed and overstretched teams are more likely to experience burnout, high turnover, and the loss of institutional knowledge—all of which weaken enterprise resilience.</description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/why_unified_workplaces_are_a_leadership_priority/"><guid isPermaLink="false">c87f5171-e335-4eff-a93a-b9b2399062c0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/why_unified_workplaces_are_a_leadership_priority/</link><title>Why Unified Workplaces Are a Leadership Priority</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-swanson-retention-hiring-return-to-office.jpg' style='float: left' alt=''/&gt;Operational leaders face a new wave of pressure: how to optimize buildings, assets, and employee experience in real time, with data that is often siloed, inconsistent, or inaccessible.</description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/from_officer_to_leader_rethinking_leadership_development_in_security/"><guid isPermaLink="false">0d9b2e35-0400-4912-9e72-1dc119adb34f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/from_officer_to_leader_rethinking_leadership_development_in_security/</link><title>From Officer to Leader: Rethinking Leadership Development in Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-sm-fitzsimmons-leadership-development-884x500.png' style='float: left' alt=''/&gt;Too often, the security industry trains officers to follow post orders, not to lead. The result is a workforce strong in compliance but underprepared for the complex, people-centered demands of modern security operations.</description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/competitive-job-market/"><guid isPermaLink="false">8252c220-bb9b-45e7-9483-78fcd2b61927</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/competitive-job-market/</link><title>Q&amp;A: Recruiting in a Highly Competitive Job Market</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-sm-employee-retention-sidebar-qa-mosqueda01.gif' style='float: left' alt=''/&gt;Security Management spoke with Melissa Mack, CPP, at GSX 2025 about how employers are weighing job applicants and keeping talent.</description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/employee-recognition-program/"><guid isPermaLink="false">9440e736-1076-4c86-b699-525ac194e045</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/employee-recognition-program/</link><title>A Global Approach to Building an Employee Recognition Program </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-nunez-rentention-global-recognition-program.jpg' style='float: left' alt=''/&gt;There’s no one-size-fits-all model when it comes to employee recognition. An effective program must be reflective of an organization’s core values and priorities, balanced by a region’s culture. </description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/asis-news/"><guid isPermaLink="false">16129cb9-f23b-43ad-81f8-7f4ce5328133</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/asis-news/</link><title>New Leadership Announced as ASIS Prepares for 2026</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-asis-news.jpg' style='float: left' alt=''/&gt;ASIS International seats its 2026 regional boards, including the inaugural Sub-Saharan Regional Board.</description><pubDate>Thu, 18 Dec 2025 15:37:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/career-growth-strategies/"><guid isPermaLink="false">3eac3bce-5ed5-460f-89ad-8df04c0f32ee</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/career-growth-strategies/</link><title>10 Essential Career-Growth Strategies for Aspiring Security Professionals</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-sm-szewczuk-listicle-on-early-career-strategies01.gif' style='float: left' alt=''/&gt;Whether you’re a recent graduate or changing careers into private security, hands-on involvement and proactive networking can pay dividends for career development. </description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/guard-retention/"><guid isPermaLink="false">5998838e-03b1-440a-9ab8-aa44273b3e4e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/guard-retention/</link><title>Guard Retention Starts with Wages but Relies on Continuous Touchpoints</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-meyer-rentention-specialized-interview.gif' style='float: left' alt=''/&gt;Living wages, practical benefits, and workplace improvements make a huge difference for guard force recruitment and retention, according to executives at security services company Specialized. </description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/executive-impediments/"><guid isPermaLink="false">fd37256a-8d7f-4153-91c0-01adbf87c560</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/executive-impediments/</link><title>The Main Impediment to Executive Protection? The Executives Themselves</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-briscoe-ep-research-budgets-executive-noncompliance.gif' style='float: left' alt=''/&gt;ASIS research studies how security directors can overcome the two leading obstacles to effective executive protection: budgets and executive noncompliance.</description><pubDate>Mon, 08 Dec 2025 08:08:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/executive-skills-video/"><guid isPermaLink="false">6246414d-72c5-4f00-aa3f-193629e299ca</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/employee-retention/executive-skills-video/</link><title>How Your Executive Skills Can Boost Employee Retention </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-mosqueda-rentention-fast-facts.jpg' style='float: left' alt=''/&gt;Retention goes beyond “show me the money.” Lisa Ross, a senior vice president in HR, highlights measures besides paychecks that leaders can use to influence staff to stay on. </description><pubDate>Mon, 15 Dec 2025 08:04:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/consultants-ep/"><guid isPermaLink="false">e3339b55-68f2-45e6-81d2-c6a502b00477</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/consultants-ep/</link><title>How Security Consultants View the State of Corporate Executive Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-sm-ep-research-consultants-article.jpg' style='float: left' alt=''/&gt;Learn what tools executive protection consultants think are indispensable and other findings from ASIS International’s comprehensive executive protection survey.</description><pubDate>Mon, 08 Dec 2025 08:08:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/legal-report/"><guid isPermaLink="false">d8834191-b2f6-4d78-a498-de5df511e27a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/legal-report/</link><title>Legal Report: SEC Drops Case Against SolarWinds and Its CISO</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/sm-0224-legal-report.jpg' style='float: left' alt=''/&gt;The U.S. Securities and Exchange Commission dismissed its enforcement action with prejudice against SolarWinds Corp and CISO Tim Brown. </description><pubDate>Thu, 11 Dec 2025 11:49:24 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/benchmarking/"><guid isPermaLink="false">5bd34480-30b3-4158-8e2d-f33113450b54</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/research-executive-protection/benchmarking/</link><title>Benchmarking: ASIS Research Findings and the Executive Protection Standard</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/1225-sm-security-issues-research-ep-standard.jpg' style='float: left' alt=''/&gt;Looking for ways to improve your executive protection program? It’s time for a gap analysis between recent ASIS research findings and a new standard about executive protection.</description><pubDate>Mon, 08 Dec 2025 08:08:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/12/marketplace/"><guid isPermaLink="false">ec2626e5-f572-4217-a5f0-735029c77062</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/12/marketplace/</link><title>New Security Products: Mobile Investigation Apps, AI-Enabled PTZ Surveillance, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/december/marketplace/1225-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;What new products are entering the scene in the security industry? Check out this quick roundup from Security Management.</description><pubDate>Wed, 10 Dec 2025 09:18:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/mitigating-the-insider-threat-with-integrated-turnstiles-and-metal-detectors/"><guid isPermaLink="false">d2e53629-74e4-4130-a7d4-2ecc90a41417</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/mitigating-the-insider-threat-with-integrated-turnstiles-and-metal-detectors/</link><title>Mitigating the Insider Threat with Integrated Turnstiles and Metal Detectors</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1225-sectech-khadilkar-884x500.gif' style='float: left' alt=''/&gt;The core challenge for security professionals is finding a solution that can reduce risk, expenses, and shrinkage, while maximizing employee throughput.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/strategies-to-upgrade-or-retrofit-existing-data-center-security-systems/"><guid isPermaLink="false">b161341f-0fe0-4ad9-ba47-becc8f1a7311</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/strategies-to-upgrade-or-retrofit-existing-data-center-security-systems/</link><title>Strategies to Upgrade or Retrofit Existing Data Center Security Systems</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1225-sectech-lewis-884x500.gif' style='float: left' alt=''/&gt;Data center operators can take a strategic approach to upgrades or retrofits of systems to enhance security. Here are some tips to keep in mind.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/the-two-types-of-radiation-security-screening-equipment-relies-on/"><guid isPermaLink="false">57ec0f6b-c22f-4b61-86bd-91d2da7b53e8</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/the-two-types-of-radiation-security-screening-equipment-relies-on/</link><title>The Two Types of Radiation Security Screening Equipment Relies On</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1225-gates-sectech-airport-security-screening-2.gif' style='float: left' alt=''/&gt;Security screeners at airports use a variety of equipment to check luggage and people for prohibited items. That equipment generally depends on two types of radiation to work.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/the-data-centers-hidden-security-divide/"><guid isPermaLink="false">32b50e34-dad7-4102-8172-a4c13a0848e6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/the-data-centers-hidden-security-divide/</link><title>The Data Center’s Hidden Security Divide</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1125-melendez-sectech-data-centers.gif' style='float: left' alt=''/&gt;For all the technological sophistication behind digital infrastructure, many facilities still rely on fragmented physical access systems that have evolved separately over time. A new design philosophy aims to change that.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/essential-security-strategies-threat-of-chemical-attacks/"><guid isPermaLink="false">9d10807a-8577-4f1e-b3d7-7a49ecdc6cc3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/essential-security-strategies-threat-of-chemical-attacks/</link><title>Essential Security Strategies to Mitigate the Threat of Chemical Attacks at Large Events</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/sectech-oct/1225-sm-sectech-brodeur-events-03.gif' style='float: left' alt=''/&gt;While unlikely, the potential for a chemical attack at a major sporting event cannot be discounted. Here are strategies to help security managers mitigate the threat.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/security-by-design-enhancing-human-judgement-in-an-ai-enabled-world/"><guid isPermaLink="false">11a28ca4-5639-4766-9389-36d136267c2f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/security-by-design-enhancing-human-judgement-in-an-ai-enabled-world/</link><title>Security by Design: Enhancing Human Judgment in an AI-Enabled World</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1225-sectech-simpson-884x500.gif' style='float: left' alt=''/&gt;To understand how human psychology affects real-world performance, we must first explore the mechanics of sustained attention and how quickly it can falter under pressure.</description><pubDate>Mon, 01 Dec 2025 07:48:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/security-that-serves-students-smart-screening-in-k-12-environments/"><guid isPermaLink="false">de0ef837-91e5-4268-8484-a5c8efc37e06</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/december/security-that-serves-students-smart-screening-in-k-12-environments/</link><title>Security That Serves Students: Smart Screening in K‑12 Environments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/december/1225-sectech-mcdermott-security-screening-k12-schools.jpg' style='float: left' alt=''/&gt;Thoughtful, manned screening solutions supported by trained personnel can offer a path forward that fosters trust, connection, and protection on campus.</description><pubDate>Mon, 01 Dec 2025 07:48:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/fast-facts/"><guid isPermaLink="false">1f8f6ca2-49f1-4920-ae89-bcdcf7aa735c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/fast-facts/</link><title>Where Schools Fall Short on Title IX Investigations </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-title-ix-fast-facts-884x500-v2.gif' style='float: left' alt=''/&gt;Title IX requires education programs and activities that receive U.S. federal financial assistance to investigate discrimination complaints. Not all institutions are following the mandate.</description><pubDate>Mon, 17 Nov 2025 08:03:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/industry-news/"><guid isPermaLink="false">09abfe34-9618-41ae-a038-ade7a5b22aa1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/industry-news/</link><title>Industry News: SOS Technologies Partners with NYC Public Schools for Emergency Alert System</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-industry-news-nyc-mayor-sos.jpg' style='float: left' alt=''/&gt;The partnership between New York City and SOS Technologies created a system that directly connects schools to emergency responders, decreasing response times. </description><pubDate>Wed, 26 Nov 2025 11:31:08 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/a-title-ix-primer-for-investigators/"><guid isPermaLink="false">5ad2d3f9-8d88-4f71-a7ad-c2ac395b412c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/a-title-ix-primer-for-investigators/</link><title>A Title IX Primer for Investigators</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/title-ix-investigations/01-1125-gates-title-ix-primer.jpg' style='float: left' alt=''/&gt;Under Title IX, education institutions that accept U.S. federal funding are required to have an investigative process in place to address complaints of sex discrimination on their campuses.  </description><pubDate>Mon, 17 Nov 2025 08:03:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/asis-news/"><guid isPermaLink="false">51add253-426f-4a16-b28b-afdceddda707</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/asis-news/</link><title>ASIS News: Expand Your Perspective with Regional ASIS Events</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1225-asis-news-01-884x500.jpg' style='float: left' alt=''/&gt;The ASIS Asia Pacific Conference earlier this month brought together more than 200 security professionals from across the region.</description><pubDate>Mon, 24 Nov 2025 08:32:58 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/7-tips-for-conducting-sensitive-interviews-from-a-veteran-investigator/"><guid isPermaLink="false">04b8e0ec-dd46-4cc2-9d94-9f7d44657e31</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/7-tips-for-conducting-sensitive-interviews-from-a-veteran-investigator/</link><title>7 Tips for Conducting Sensitive Interviews from a Veteran Investigator</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/title-ix-investigations/1125-sm-titleix-sensitive-interviews-02.gif' style='float: left' alt=''/&gt;To learn more about conducting sensitive interviews with empathy and professionalism, Security Management reached out to veteran investigator Scot Walker, PCI. </description><pubDate>Mon, 17 Nov 2025 08:03:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/legal-report/"><guid isPermaLink="false">9ba23f26-3dc1-460a-8836-bef050d730e0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/legal-report/</link><title>Legal Report: California Department of Corrections to Pay Nearly $17 Million for Unfair Firing, Defamation of Psychologist </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-legal-report.jpg' style='float: left' alt=''/&gt;Also in this month’s legal news, a U.S. federal court approved the U.S. government’s request to dismiss a criminal conspiracy case against Boeing. </description><pubDate>Thu, 20 Nov 2025 08:18:05 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/book-review-firefighting-paradox/"><guid isPermaLink="false">77c46d4e-21d5-4d75-af1a-7ca29467a63c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/book-review-firefighting-paradox/</link><title>Book Review: Security Management—The Driving Force for Operational Resilience: The Firefighting Paradox</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/title-ix-investigations/1125-book-review-security-risk-management-884x500.jpg' style='float: left' alt=''/&gt;The authors demonstrate how taking the time to create operational resilience capabilities and integrating them into the organization’s DNA makes recovery from disruptions much easier.</description><pubDate>Tue, 18 Nov 2025 11:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/independent-investigations-help-schools-move-forward-on-title-ix/"><guid isPermaLink="false">4d8147a7-d6f8-4412-b9be-5ff1ffbd7996</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/title-ix-investigations/independent-investigations-help-schools-move-forward-on-title-ix/</link><title>Independent Investigations Help Schools Move Forward on Title IX</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/title-ix-investigations/1125-gates-title-ix-independent-investigations-lead.gif' style='float: left' alt=''/&gt;To comply with Title IX, U.S. education institutions are required to conduct independent investigations into complaints of sexual harassment and discrimination—separate from any law enforcement investigation. Here’s what that looks like in practice.</description><pubDate>Mon, 17 Nov 2025 08:03:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/cpted-must-haves/"><guid isPermaLink="false">56c4ebd8-4d21-481c-9f86-2bdf8dc75657</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/cpted-must-haves/</link><title>2 CPTED Must-Haves for Multitenant Buildings</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1025-sm-multitenant-security-listicle.jpg' style='float: left' alt=''/&gt;A security engineering expert shares his top two CPTED priorities for creating welcoming and secure multitenant spaces.</description><pubDate>Mon, 10 Nov 2025 07:52:47 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/fast-facts/"><guid isPermaLink="false">a3b3a623-1128-4727-8691-8517a81291b1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/fast-facts/</link><title>How to Bypass Lobby Security with a Pizza</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-mosqueda-multitenant-bypass-lobby-security-with-pizza.jpg' style='float: left' alt=''/&gt;Without proper protocols and training, lobby security for multitenant buildings can be bypassed by anyone in the right uniform.</description><pubDate>Mon, 10 Nov 2025 07:52:47 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/layered-access-control/"><guid isPermaLink="false">8e258b08-fb60-4240-96be-4690ef118ca8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/layered-access-control/</link><title>Layered Access Control Helps Multitenant Facilities Balance Security and Efficiency</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-sidebar-kline.jpg' style='float: left' alt=''/&gt;When it comes to finding the right balance between security and tenants’ needs, multitenant buildings should consider solutions that impact every floor.</description><pubDate>Mon, 10 Nov 2025 07:52:47 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/canny-communication/"><guid isPermaLink="false">381244e9-e2f0-47c2-9f02-3f3c7f957a05</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/multitenant/canny-communication/</link><title>Canny Communication Supports Effective Multitenant Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-mosqueda-multitenant-main-article.jpg' style='float: left' alt=''/&gt;In cities, knowing how to best communicate with stakeholders in a multitenant building is a powerful tool in security’s arsenal.</description><pubDate>Mon, 10 Nov 2025 07:52:47 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/times-of-uncertainty/"><guid isPermaLink="false">9a4b62a1-f959-4418-9314-e6e697ec13e3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/times-of-uncertainty/</link><title>Geopolitical Resilience in Times of Uncertainty</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-geopolitics-resilience-in-times-of-uncertainty-youseff-khiere.gif' style='float: left' alt=''/&gt;More than being an instrument for pitting risks against opportunities, geopolitical resilience offers a platform for both business and security practitioners to speak the same language and a means for reconciling their often-diverging goals.</description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/risk-priority-mapping-erm/"><guid isPermaLink="false">f9b56137-e1f6-4e46-b0db-b50172b604f9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/risk-priority-mapping-erm/</link><title>Map Geopolitical Risk Priorities Using ERM </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-meyer-geopolitics-qa-kelly-johnstone.jpg' style='float: left' alt=''/&gt;One of the main challenges in geopolitical intelligence and resilience is narrowing the scope by determining which factors would have the most impact on the organization and focusing resources on those elements without jettisoning all other risks that may arise. </description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/global-disinformation-regulations/"><guid isPermaLink="false">a2b9e0bc-2b45-4a42-8bc5-14b2b0d6f798</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/global-disinformation-regulations/</link><title>4 Global Regulations and Guidelines to Watch on Disinformation </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-geopolitics-disinformation-frameworks-sidebar-antonio-bellorin01.jpg' style='float: left' alt=''/&gt;Governments, international organizations, and regulatory bodies are working on ways to keep people from spreading false information that could hurt societies and markets, while still letting people say what they think.</description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/truth-under-siege/"><guid isPermaLink="false">2408c7af-1daf-458c-a172-a091b5004fb7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/truth-under-siege/</link><title>Truth Under Siege: How Disinformation Threatens Corporate Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-geopolitics-disinformation-01a-v2.jpg' style='float: left' alt=''/&gt;Disinformation is no longer just a communications challenge. It is a matter of strategic resilience intelligence, where the truth itself has become a critical infrastructure asset worth protecting.</description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/top-10-risks/"><guid isPermaLink="false">b48a9d29-7651-4679-8073-76a7f5d3f2d9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/top-10-risks/</link><title>The Top 10 Global Risks for 2027 </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-meyer-geopolitics-short-10-global-risks.jpg' style='float: left' alt=''/&gt;The World Economic Forum asked people to rank the likely impact of a series of risks over a two-year period. Here’s what people are most concerned about in the near-term. </description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/certification-profile/"><guid isPermaLink="false">ab2c5bdb-bd75-4475-b547-d46f99151f62</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/certification-profile/</link><title>Certification Profile: Ana Santos, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/25-ana-santos-certification-profile.jpg' style='float: left' alt=''/&gt;“From day one, I fell in love with the industry,” says Ana Santos, CPP. “Every single day presents a new challenge, a new problem to solve, and a new opportunity to make a difference.”</description><pubDate>Wed, 05 Nov 2025 09:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/marketplace/"><guid isPermaLink="false">46b6fa41-3376-4d7e-9bd9-a5462c4583e6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/marketplace/</link><title>New Security Products: Mobile Surveillance, Brand Misuse Monitoring, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/marketplace/1125-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;The latest technology in the security industry includes rooftop surveillance, digital footprint exposure, bullet-resistant sliding doors, and more. </description><pubDate>Wed, 05 Nov 2025 08:00:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/fast-facts/"><guid isPermaLink="false">2a50b5b3-7d94-49f4-89a7-3988e15dfc8f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/fast-facts/</link><title>Fast Facts: 7 Types of Disinformation </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-meyer-geopolitics-fast-facts-disinformation.gif' style='float: left' alt=''/&gt;To determine how best to respond to false information and narratives, it’s important to clearly analyze the type of message.</description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/esrm-intelligence-geopolitics/"><guid isPermaLink="false">8c8f58fe-a98d-4384-a94c-49ca1b9a7add</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/esrm-intelligence-geopolitics/</link><title>To Find Your Footing in a Weightless Geopolitical Environment, Use Intelligence and ESRM</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-miles-geopolitics-weightless-environment-intelligence-esrm-02.gif' style='float: left' alt=''/&gt;It is critical to understand leadership’s needs when undertaking to provide effective intelligence and risk management recommendations.</description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/why-resilience-matters/"><guid isPermaLink="false">320c687a-5c7f-4691-bd06-a50bb83a4927</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/11/geopolitical-resilience/why-resilience-matters/</link><title>Q&amp;A: Why Geopolitical Resilience Matters </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/november/1125-sm-geopolitics-hotspots.jpg' style='float: left' alt=''/&gt;Your organization—no matter how small or niche—does not exist in isolation. Geopolitical factors will affect supply chains, partnerships, and customer bases that your company relies on. </description><pubDate>Sat, 01 Nov 2025 07:54:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/njit-case-study/"><guid isPermaLink="false">e68d2fcb-9379-4379-9087-08fde73e2bac</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/njit-case-study/</link><title>Matching Security with the Needs of a Cutting-Edge Research Institution </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1125-mosqueda-case-study-amag.jpg' style='float: left' alt=''/&gt;When it came time to update access control that was still relying on magnetic stripe card readers, an R1 polytechnic university opted for an AMAG solution that could handle a massive amount of turnover.</description><pubDate>Thu, 30 Oct 2025 16:11:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/cso-perspective-secure-horizons/"><guid isPermaLink="false">913e598e-3822-4b51-9fc1-aebb8aee3484</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/cso-perspective-secure-horizons/</link><title>Herschel Flowers: What I Learned at Secure Horizons 2025</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1125-flowers-secure-horizons-what-i-learned-.jpg' style='float: left' alt=''/&gt;Group exercises, dynamic presentations, and thought-provoking discussions prompted one CSO attendee at the 2025 Secure Horizons event to reevaluate how he approaches problem-solving. </description><pubDate>Mon, 27 Oct 2025 08:19:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/reframe-decision-making/"><guid isPermaLink="false">599ddb67-ecd5-4628-944f-eb1bc36be5cc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/reframe-decision-making/</link><title>Slow Down and Reframe Decision-Making for Positive Influence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-cso-secure-horizons-article-3-01.gif' style='float: left' alt=''/&gt;Reality is the combination of problems or challenges and positive opportunities and skills. Examining the positive and negative sides of an issue produces a more holistic and actionable view. </description><pubDate>Mon, 27 Oct 2025 08:19:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/industry-news/"><guid isPermaLink="false">58374613-b3a0-4b52-9e36-ff5d653b4b07</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/industry-news/</link><title>Industry News: Nashville DOT Keeps Modernizing Its Transportation Operations Center</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/sm-1025-industry-news.jpg' style='float: left' alt=''/&gt;The City of Nashville is supporting security efforts with updates to its cabinet locks for more than 1,000 boxes and cabinets that access the city’s traffic management systems. </description><pubDate>Tue, 28 Oct 2025 09:05:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/curiosity-business-challenges/"><guid isPermaLink="false">c0845a8f-de04-4108-8a12-cc45a65a3bdc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/curiosity-business-challenges/</link><title>From Problem to Puzzle: Approach Business Challenges with Curiosity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1125-meyer-secure-horizons-problem-to-puzzle.gif' style='float: left' alt=''/&gt;The way you communicate matters. Reframing your approach to business issues can produce powerful results. </description><pubDate>Mon, 27 Oct 2025 08:19:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/securing-public-spaces/"><guid isPermaLink="false">e4debc84-2463-4842-a798-1c9f0482b2cd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/securing-public-spaces/</link><title>The Unique Challenges of Securing America’s Public Spaces</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-contributed-item-yan-byalik.jpg' style='float: left' alt=''/&gt;Protecting public spaces is a delicate balancing act that must support safety while respecting and recognizing Constitutionally given rights to lawfully access these sites.</description><pubDate>Mon, 20 Oct 2025 08:14:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/gaslighting/"><guid isPermaLink="false">02cd7f5c-fe59-45bd-b95e-dc71fc736a70</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/gaslighting/</link><title>Dealing with Gaslighting at Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-sidebar-gips02.jpg' style='float: left' alt=''/&gt;While a gaslighter might not be your archenemy, they can still make the workplace a more difficult environment by causing setbacks or taking credit for your or your staff’s efforts. Here’s how you can deal with them, effectively and professionally.</description><pubDate>Mon, 20 Oct 2025 08:14:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/fast-facts/"><guid isPermaLink="false">92fe9373-64be-4dc4-80fa-e7292e1094fe</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/fast-facts/</link><title>Fast Facts: The Cost of Incivility </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/25-sm-fast-facts-disruptive-behavior-884x500.gif' style='float: left' alt=''/&gt;With an expected increase of incivility in the workplace on the horizon, what can leaders do to curb the fallout, which can include higher turnover, employee dissatisfaction, and damage to brand reputation?</description><pubDate>Mon, 20 Oct 2025 08:14:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/adversarial-personalities/"><guid isPermaLink="false">27cbde30-b651-46cb-b0fb-895b221fb1aa</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/adversarial-personalities/</link><title>10 Adversarial Personalities You Might Meet at Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-disruptive-behavior-listicle-884x500.jpg' style='float: left' alt=''/&gt;You can’t always pick your colleagues, but you can find the best way to work together—even with others whose work styles may clash with your own.</description><pubDate>Mon, 20 Oct 2025 08:14:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/employee-terminations/"><guid isPermaLink="false">551048b3-df6f-4038-91f2-c147aabd1c99</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/disruptive-behavior/employee-terminations/</link><title>The Importance of Planning, Communication, and Dignity in Employee Terminations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-disruptive-behavior-main-jones.png' style='float: left' alt=''/&gt;Firing an employee is already disruptive to the employee, other staff, and the organization at-large. But it can also escalate from a disruption into violence.</description><pubDate>Mon, 20 Oct 2025 08:14:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/water-emergencies/"><guid isPermaLink="false">ccaba432-f064-40ae-be94-d052dc796a42</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/water-emergencies/</link><title>How to Manage Water Emergencies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-flood-prep-fmj-article-on-water-emergencies.png' style='float: left' alt=''/&gt;Water emergencies are an inevitable challenge for facilities, but preparation, technology, and collaboration can mitigate their impact.</description><pubDate>Mon, 13 Oct 2025 08:56:28 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/fast-facts/"><guid isPermaLink="false">de632928-049f-44a4-b2b8-e0b95d1579a3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/fast-facts/</link><title>Fast Facts: The Cost of Multi-Hazard Disasters</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-meyer-flood-prep-cost-of-multi-hazard-disasters.gif' style='float: left' alt=''/&gt;Natural disasters seldom occur alone, and multi-hazard events can increase losses beyond the sum of their parts.</description><pubDate>Mon, 13 Oct 2025 08:56:28 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/flood-risk-assessment/"><guid isPermaLink="false">3e75c3bb-fa77-4108-b1a1-9536ad088eb4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/flood-risk-assessment/</link><title>Before the Rain: Flood Preparedness Relies on Regular Risk Reassessments </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-flood-prep-main-884x500.jpg' style='float: left' alt=''/&gt;Flood preparedness can range from the simple to the extremely complex, and a lot of the efforts involve partnerships with facility management teams.</description><pubDate>Mon, 13 Oct 2025 08:56:28 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/sustainable-landscaping/"><guid isPermaLink="false">b07af10d-b73d-42a9-87e1-ce14a4d3ed15</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/flooding/sustainable-landscaping/</link><title>How to Use Sustainable Landscaping for Water Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-sm-flood-prep-sustainable-landscaping-01.gif' style='float: left' alt=''/&gt;By using appropriate native species, efficient water management, and green infrastructure, sustainable landscapes reduce resource consumption, cut operational expenses, and support biodiversity.</description><pubDate>Mon, 13 Oct 2025 08:56:28 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/closing-the-gap-integrating-identity-into-your-detection-and-response-strategy/"><guid isPermaLink="false">5f593dfe-22c2-422a-aa75-31744cf60c27</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/closing-the-gap-integrating-identity-into-your-detection-and-response-strategy/</link><title>Closing the Gap: Integrating Identity into Your Detection and Response Strategy</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-caulfield.png' style='float: left' alt=''/&gt;To close a critical security gap, leaders need a new framework built on three pillars: visibility, adaptive defense, and identity-infused response.</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/five-key-steps-of-effective-digital-identity-risk-management/"><guid isPermaLink="false">a774cf4b-fd55-4c48-b9b6-f98e25cf4809</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/five-key-steps-of-effective-digital-identity-risk-management/</link><title>5 Key Steps of Effective Digital Identity Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-listicle.jpg' style='float: left' alt=''/&gt;Digital identities make it easier for people to access critical assets or complete transactions. The U.S. National Institute of Standards and Technology provides guidance on how to manage those identities effectively.</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/legal-report/"><guid isPermaLink="false">fe4b96a3-d87b-4a93-84a9-23ebd6f3579c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/legal-report/</link><title>Legal Report: Canada Sentences Man to 10 Years for Violent Racist Propaganda</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/1025-legal-report-image.jpg' style='float: left' alt=''/&gt;The sentence from the Ontario Superior Court reflects both Patrick MacDonald’s support of a terrorist group and the amends he made since then. </description><pubDate>Tue, 14 Oct 2025 12:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-fom-rigid-to-resilient/"><guid isPermaLink="false">65f1d71d-8584-4393-96dd-d237e74552e6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-fom-rigid-to-resilient/</link><title>Sponsored: Beyond Access… Meet PIAM</title><description>&lt;img src='http://www.asisonline.org/contentassets/e273e38de1ca4831beb147eba40b0d97/mercury.jpg' style='float: left' alt=''/&gt;As enterprises accelerate their digital transformation, physical access and identity governance is rapidly becoming a cornerstone of operational security and compliance. </description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/why-iris-biometrics-shaping-future-border-control/"><guid isPermaLink="false">13e975a6-603c-446e-912a-4b9869c808f7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/why-iris-biometrics-shaping-future-border-control/</link><title>Why Iris Biometrics Are Shaping the Future of Border Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-murad-identity-management-biometrics-border.jpg' style='float: left' alt=''/&gt;Delays, human error, and blind spots. Legacy border systems are failing fast. How can iris biometrics catch what they miss?</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-beyond-access/"><guid isPermaLink="false">b858ef82-c91d-4751-ae95-32d74ca0c9c7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-beyond-access/</link><title>Sponsored: Beyond Access… Meet PIAM</title><description>&lt;img src='http://www.asisonline.org/contentassets/c0093f2b57844541a7410179e143abc3/hid.jpg' style='float: left' alt=''/&gt;Physical access control systems have served as the backbone of physical security programs for a long time. At the same time, their limitations are now becoming more apparent as organizations grow more complex.</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/10/certification-profile/"><guid isPermaLink="false">64555132-aa75-4727-bf86-7b5bd5a4cb86</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/10/certification-profile/</link><title>Certification Profile: Kristiina Mellin, CPP, PCI, PSP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/october/25-kristiina-mellin-certification-profile.jpg' style='float: left' alt=''/&gt;Over the past 20 years, Kristiina Mellin's role within corporate security has spanned Europe, where she has trained and supported crisis teams through a variety of emergencies.</description><pubDate>Wed, 08 Oct 2025 09:00:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/the-new-security-imperative-converging-physical-and-cyber-identity-management/"><guid isPermaLink="false">e7101805-3718-4228-9726-829285c40130</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/the-new-security-imperative-converging-physical-and-cyber-identity-management/</link><title>The New Security Imperative: Converging Physical and Cyber Identity Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-shekhar.jpg' style='float: left' alt=''/&gt;Organizations have traditionally treated physical and cyber identity management as separate applications. But in an era of hybrid threats, this division no longer makes sense.</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-the-changing-landscape-of-the-physical-security-industry/"><guid isPermaLink="false">85958d9d-73fa-48fa-862b-cea5adee71e0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-the-changing-landscape-of-the-physical-security-industry/</link><title>Sponsored: The Changing Landscape of the Physical Security Industry</title><description>&lt;img src='http://www.asisonline.org/contentassets/0aa381a901364052822c6c89424c24f1/verkada_control_panel.jpg' style='float: left' alt=''/&gt;For decades, physical security for businesses was largely defined by hardware – analog cameras, Digital Video Recorders (DVRs), and incremental improvements in resolution, compression, and low-light performance.</description><pubDate>Wed, 01 Oct 2025 07:29:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/6-methods-to-use-for-identity-verification/"><guid isPermaLink="false">ece6b8d1-862a-4aef-bb00-e0cecedcdffe</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/6-methods-to-use-for-identity-verification/</link><title>6 Methods to Use for Identity Verification</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-gates-6-methods-to-use-for-identity-v.gif' style='float: left' alt=''/&gt;How do organizations know the online identity is really the person they claim to be? The U.S. National Institute of Standards and Technology shares six methods to complete this process.</description><pubDate>Wed, 01 Oct 2025 07:29:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/frictionless-access/"><guid isPermaLink="false">845ac958-9c7a-4335-9f93-f056c53d2e7b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/october/frictionless-access/</link><title>Frictionless Access: Why a London Office Building Turned to a Mobile Wallet Solution</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/1025-sectech-case-study-jj-mack-building-jack-hobhouse-01.jpg' style='float: left' alt=''/&gt;The JJ Mack Building in London wanted to create a more seamless experience for tenants accessing the building. They turned to a mobile wallet solution from Wavelynx.</description><pubDate>Wed, 01 Oct 2025 07:29:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/violent-incident-recovery/5-skills-of-effective-post-incident-security-leaders/"><guid isPermaLink="false">bb6c279e-041b-4122-928e-14a0bd11475d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/violent-incident-recovery/5-skills-of-effective-post-incident-security-leaders/</link><title>5 Skills of Effective Post-Incident Security Leaders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-5-skills-of-effective-security-leaders-post-crisis01-884x500.jpg' style='float: left' alt=''/&gt;Security managers play a critical role in the post-incident response and recovery process. We asked an expert to share the five characteristics that set effective managers apart. </description><pubDate>Mon, 22 Sep 2025 08:00:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/violent-incident-recovery/for-violent-incident-recovery/"><guid isPermaLink="false">2a90f31b-9d2e-4017-9b1a-10d9035856cb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/violent-incident-recovery/for-violent-incident-recovery/</link><title>For Violent Incident Recovery, Listen and Lead with Compassion</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925for-violent-incident-recovery.png' style='float: left' alt=''/&gt;The path forward after someone is killed or significantly injured in an act of violence at work is a rocky one. But these experts provide guidance on how to walk it, to set your team on the path to recovery. </description><pubDate>Mon, 22 Sep 2025 08:00:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/asis-news/"><guid isPermaLink="false">e8169d51-c631-46e5-9616-10b311cc1bc7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/asis-news/</link><title>ASIS News: New Executive Protection Standard, Global Events, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-asis-news-executive-protection-standard.jpg' style='float: left' alt=''/&gt;The new ASIS International Executive Protection Standard includes comprehensive needs analysis and security risk assessment methodologies, strategic program frameworks, and guidance on personnel management and operational planning.</description><pubDate>Thu, 25 Sep 2025 09:01:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/data-centers/"><guid isPermaLink="false">c496abe6-b103-414d-8297-6db77b7af2f6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/data-centers/</link><title>Protecting Data Centers with Visibility, Vision, and Viability</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-mosqueda-perimeters-protecting-data-centers.jpg' style='float: left' alt=''/&gt;Security specialist Nicholas Peloso discusses the three fundamental elements for protecting a critical infrastructure facility.</description><pubDate>Mon, 15 Sep 2025 07:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/fast-facts/"><guid isPermaLink="false">6ed86eab-ed1e-490f-8b24-b5dafd5048e2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/fast-facts/</link><title>Fast Facts: 4 Core Types of Bollards</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-mosqueda-fast-facts-bollards-02.gif' style='float: left' alt=''/&gt;Do you know what kind of bollards these are?</description><pubDate>Mon, 15 Sep 2025 07:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/vehicle-ramming/"><guid isPermaLink="false">8294c043-936a-4e84-8b8e-0d2c7dd5c6fb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/vehicle-ramming/</link><title>Mitigating Vehicle Ramming Threats with Layered Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-bollard-barriers-fencing-hesam.jpg' style='float: left' alt=''/&gt;A protective design engineering approach uses layered protection to leverage against the evolving threat of modern vehicles ramming attacks. </description><pubDate>Mon, 15 Sep 2025 07:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/project-delivery-conundrum/"><guid isPermaLink="false">3a62fe7c-e466-466e-80ba-4936b01f8c03</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/project-delivery-conundrum/</link><title>The Project Delivery Conundrum: What Method Works?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-shwom-online-exclusive-design-project-management.jpg' style='float: left' alt=''/&gt;Choosing the right project delivery method is an essential and often undervalued step in meeting a project’s goals, and it happens shortly after deciding to move a capital project forward.</description><pubDate>Mon, 15 Sep 2025 07:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/resistance-into-readiness/"><guid isPermaLink="false">8d64c8f9-2bf0-4ce8-9efc-dc7a51773d6f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/resistance-into-readiness/</link><title>Turning Resistance into Readiness with Change Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-shehzad-change-management-resistance-into-readines.jpg' style='float: left' alt=''/&gt;A change management plan empowers teams to understand and respond to potential business impacts by proactively identifying affected individuals and tailoring training and communication to their specific roles.</description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/substation-perimeters/"><guid isPermaLink="false">67493f31-11dd-4705-8512-5e21a9c15830</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/barriers/substation-perimeters/</link><title>Getting Back to Basics: Perimeter Security for Substations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-sidebar-contributed-power-station-perimeter-basics04.gif' style='float: left' alt=''/&gt;While the latest tools can supplement a perimeter security program, a strong foundation in the five D’s is crucial for protecting critical infrastructure facilities. </description><pubDate>Mon, 15 Sep 2025 07:59:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/team-management-concepts/"><guid isPermaLink="false">592d8f14-aa3e-4740-aa89-3b099828373f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/team-management-concepts/</link><title>5 Team Management Concepts for Navigating Organizational Change</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-change-management-5-team-concepts-02.gif' style='float: left' alt=''/&gt;When a disruption is caused by corporate restructuring, budget adjustments, leadership turnover, or external crises, it is time for real leaders to shine.</description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/holistic-security-change/"><guid isPermaLink="false">eec93220-2c7f-452f-93c2-36665b7a004c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/holistic-security-change/</link><title>Q&amp;A: Change Management to Achieve Holistic Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-meyer-change-management-holistic-security-research.jpg' style='float: left' alt=''/&gt;Organizational change principles can prove notably effective when pursuing partnerships for holistic security and resilience, research finds.</description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/certification-profile/"><guid isPermaLink="false">bf1a6d7d-8bbf-4e74-b624-deba69450f87</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/certification-profile/</link><title>Certification Profile: Silvia Fraser, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/25-silvia-fraser-certification-profile.jpg' style='float: left' alt=''/&gt;Although she initially aimed for a career in law enforcement, Silvia Fraser, CPP, came to appreciate the vital role private security plays in keeping communities safe and decided to fully dedicate herself to a career in the field.</description><pubDate>Wed, 10 Sep 2025 09:00:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/ai-powered-manipulation/"><guid isPermaLink="false">e4fec443-ecd7-46c5-93b6-46ab8e42fb15</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/ai-powered-manipulation/</link><title>Fake Faces, Real Damage: The Corporate Risk of AI-Powered Manipulation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-debont-deepfake-risks' style='float: left' alt=''/&gt;The widespread availability of our personal data has made open-source data the key ingredient for highly effective AI-driven deception and disruption and enabled the creation of deepfakes. </description><pubDate>Thu, 11 Sep 2025 08:01:22 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/steadily-navigate-organizations-path/"><guid isPermaLink="false">41b57aeb-e3dd-4a82-807f-cfce24706a51</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/steadily-navigate-organizations-path/</link><title>How to Steadily Navigate an Organization’s Path</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-change-management-fmj-02.jpg' style='float: left' alt=''/&gt;Like security professionals, facility managers face competing priorities in organizations’ efforts to transform processes and achieve effective results. </description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/fast-facts/"><guid isPermaLink="false">70c40cd8-0ac2-4376-aa17-116aa30a7a26</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/fast-facts/</link><title>Fast Facts: 6 Reasons People Resist Change</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/6-reasons-people-resist-change-gif-01.gif' style='float: left' alt=''/&gt;Leaders seeking to influence change often run up against resistance from employees, managers, executives, and outside stakeholders, which can endanger future-facing projects. </description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/industry-news/"><guid isPermaLink="false">412b5cbe-9611-4ea9-ae80-a3fff28a5a2c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/industry-news/</link><title>Industry News: Motorola Expands Footprint with $4.4 Billion Buy of Mission-Critical Technology Provider</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-industry-news-motorola-silvus.jpg' style='float: left' alt=''/&gt;Catch up with the latest security sector awards, announcements, mergers, and partnerships in this edition of Industry News.</description><pubDate>Thu, 04 Sep 2025 13:52:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/cia-change-management/"><guid isPermaLink="false">0bb68e67-9bdc-41d8-8492-0c933f3ac3a8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/cia-change-management/</link><title>Empowering Cybersecurity with Effective Change Management: Lessons Learned at the CIA</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-change-management-lessons-learned-at-the-cia03.gif' style='float: left' alt=''/&gt;To effectively integrate cybersecurity into functions across the CIA, one CISO leveraged change management training to craft a compelling story and align stakeholders.</description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/book-club/"><guid isPermaLink="false">e984b622-68fb-4d25-b45b-9410af1d1501</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/book-club/</link><title>6 Books to Guide Change Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-change-management-reading-list01.gif' style='float: left' alt=''/&gt;Welcome to the change management book club, curated by security and business professionals. </description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/security-value-proposition/"><guid isPermaLink="false">bb2a6f83-2f68-4593-be3e-16a7f66d6b97</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/09/change-management/security-value-proposition/</link><title>Redefining Security’s Value Proposition After an Acquisition </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/september/0925-sm-change-management-base-illustration.jpg' style='float: left' alt=''/&gt;When an infant formula manufacturer was acquired by a multinational consumer goods company, its corporate security team faced an uphill battle to prove its value.</description><pubDate>Mon, 01 Sep 2025 10:02:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/fast-facts/"><guid isPermaLink="false">7a2c630d-80e4-4432-b707-972d0d733221</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/fast-facts/</link><title>Fast Facts: How Do Organizations Approach Intelligence on Different Types of Incidents?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-fast-facts-threat-intelligence-research.gif' style='float: left' alt=''/&gt;A recent ASIS survey explored different incidents that can cause significant business disruptions, including civil or political unrest, economic instability, and crime. Here’s a look at the findings in those categories.</description><pubDate>Mon, 25 Aug 2025 08:13:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/farmer-donkey/"><guid isPermaLink="false">19dd6b77-3f53-4651-a7ae-49566c1938c3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/farmer-donkey/</link><title>The Farmer and the Donkey: A True Fable About Threat Intelligence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-research-farmer-and-donkey-03.gif' style='float: left' alt=''/&gt;An auto parts manufacturer with facilities throughout Central America suffered a unique civil unrest incident that crippled part of its supply chain and learned that its corporate security department was right where it needed to be.</description><pubDate>Mon, 25 Aug 2025 08:13:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/intelligence-impact-disruptions/"><guid isPermaLink="false">40da4b76-b5f0-46ec-91de-114a3d38e8a0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/research-security-intelligence/intelligence-impact-disruptions/</link><title>The Intelligence Impact on How Organizations Manage Business Disruptions</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-research-threat-intel-lead-image.gif' style='float: left' alt=''/&gt;New research from ASIS underscores the relationship between threat intelligence management and such important business functions as business continuity and organizational resilience.</description><pubDate>Mon, 25 Aug 2025 08:13:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/ai-simulations-cybersecurity-training/"><guid isPermaLink="false">7e476a5a-dd11-4275-bf97-1f9dc5c8c171</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/ai-simulations-cybersecurity-training/</link><title>How to Use AI Simulations for Cybersecurity Training</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-online-exclusive-patel-ai-for-cybersecurity-simulations01-884x500.png' style='float: left' alt=''/&gt;Simulations in the form of AI-generated video and image content can provide immersive training experiences, though they require careful vetting to ensure accuracy and relevance.</description><pubDate>Thu, 21 Aug 2025 08:50:46 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/tackling-online-radicalization/"><guid isPermaLink="false">eeac7fcb-cdf7-4eb4-b8a6-8e541ce20772</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/tackling-online-radicalization/</link><title>Tackling Online Radicalization and Extremism with Modern Threat Assessment Strategies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-threat-assessment-marble02.jpg' style='float: left' alt=''/&gt;The earliest signs of violence today often begin with fixation, which can intensify when combined with radicalizing online ecosystems.  </description><pubDate>Mon, 18 Aug 2025 08:05:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/vicarious-targets/"><guid isPermaLink="false">be6833e3-054a-4838-adad-d01fc3d415ff</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/vicarious-targets/</link><title>Are Vicarious Targets Complicating Your Threat Assessments?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-threat-assessment-vicarious-targets.gif' style='float: left' alt=''/&gt;Bystanders and witnesses of altercations and concerning behavior can have psychological reactions to the incident. Those reactions could make the situation worse in the long run. </description><pubDate>Mon, 18 Aug 2025 08:05:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/fast-facts/"><guid isPermaLink="false">02e9cedc-c251-49c4-ab42-d37ad1e32d19</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/fast-facts/</link><title>Fast Facts: Can You Decode Algospeak?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-fast-facts-threat-assesment-algo-scenarios.gif' style='float: left' alt=''/&gt;Can you break down the algospoken elements in these two scenarios and determine if there’s a risk to your organization? </description><pubDate>Mon, 18 Aug 2025 08:05:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/web-of-influence/"><guid isPermaLink="false">9e18c0d3-7560-4f87-9370-2a6b35b6d2c8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/threat-assessment/web-of-influence/</link><title>The Web of Influence: How Online Culture is Reshaping How Security Practitioners Conduct Assessments </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-threat-assessment-base-illustration-884x500.jpg' style='float: left' alt=''/&gt;Algospeak is packed with emojis, codewords, and inside jokes, discreetly crafted to prevent algorithmic detection. It can also disguise threats. </description><pubDate>Mon, 18 Aug 2025 08:05:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/debate-skills-for-ai/"><guid isPermaLink="false">897b7bf9-094c-4e9e-bdfb-209a413078cc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/debate-skills-for-ai/</link><title>In the AI Age, Debate’s Critical Thinking Skills Gain Importance </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-reed-ai-debate-skills.jpg' style='float: left' alt=''/&gt;Debate-trained professionals excel at crafting precise queries, navigating biases, and bridging the gap between technical outputs and strategic objectives.</description><pubDate>Tue, 12 Aug 2025 14:12:04 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-mototrbo-r5-portable-two-way-radios-smart-tough-ready-for-anything/"><guid isPermaLink="false">d56a1004-1914-43a9-9468-d9b1f484ac80</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-mototrbo-r5-portable-two-way-radios-smart-tough-ready-for-anything/</link><title>MOTOTRBO R5 Portable Two-Way Radios: Smart, Tough, Ready for Anything</title><description>&lt;img src='http://www.asisonline.org/contentassets/59c9a7cc47544df79cd52efca4111164/2023-elgin-manufacturing-r2-00728-884x500.jpg' style='float: left' alt=''/&gt;In fast-paced, high-pressure environments, clear communication can be the difference between safety and uncertainty. The MOTOTRBO R5 portable two-way radio is purpose-built to keep teams connected, protected, and productive, no matter the conditions.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-what-does-ai-for-critical-infrastructures/"><guid isPermaLink="false">2fd92b7a-c6ad-45c8-b050-44608d5ee25b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-what-does-ai-for-critical-infrastructures/</link><title>What Does AI for Critical Infrastructures?</title><description>&lt;img src='http://www.asisonline.org/contentassets/258f418e04264f04ac9e94f7b685ba93/54076_security-scanner__rohde_schwarz.jpg' style='float: left' alt=''/&gt;In times of evolving threat scenarios for critical infrastructures, protecting physical assets such as power plants, data centers, governmental buildings such as embassies, and even hospitals remain paramount.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/how-technology-could-help-prevent-common-workplace-injuries/"><guid isPermaLink="false">65b4f420-9e2a-47df-9f17-e31273bc409e</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/how-technology-could-help-prevent-common-workplace-injuries/</link><title>How Technology Could Help Prevent Common Workplace Injuries</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/august/0825-sectech-gates-listicle-884x500.jpg' style='float: left' alt=''/&gt;Musculoskeletal disorders (MSDs) are the most reported workplace injury. Incorporating technology into injury surveillance systems could help reduce them.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/08/guards-to-guardians/"><guid isPermaLink="false">4e015e3b-c8ad-49be-b4de-7289042a6988</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/08/guards-to-guardians/</link><title>From Guards to Guardians: Reimagining Security Work in the Age of AI and Robotics</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/august/0825-sm-online-exclusive-loyear-slotnick.gif' style='float: left' alt=''/&gt;In this evolving technology landscape, security leaders are asking a key question: Are we replacing the human element—or elevating it?</description><pubDate>Thu, 07 Aug 2025 08:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/shifting-battleground-of-cybersecurity-risk-management-for-manufacturers/"><guid isPermaLink="false">d65bdfef-ce20-405d-8f54-d74877df40a4</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/shifting-battleground-of-cybersecurity-risk-management-for-manufacturers/</link><title>The Shifting Battleground of Cybersecurity Risk Management for Manufacturers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/august/0825-sectech-krull.jpg' style='float: left' alt=''/&gt;Changes in third-party relationships may introduce new cyber vulnerabilities and operational risks that must be addressed. Here are three main steps to ensure security during vendor transitions.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/smart-lobby-solutions-help-modernize-manufacturing/"><guid isPermaLink="false">becd512a-b36c-4fa7-a9ba-7ab2d32d90f3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/smart-lobby-solutions-help-modernize-manufacturing/</link><title>How Smart Lobby Solutions Help Modernize Manufacturing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/august/0825-sectech-schreiber.gif' style='float: left' alt=''/&gt;The lobby is now a strategic hub for security, efficiency, and technological integration. This evolution is especially critical in manufacturing, where protecting personnel, products, and processes is essential.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/eyes-on-the-clock-how-iris-biometrics-reinventing-workforce-accountability/"><guid isPermaLink="false">7e8083c0-a77b-4fdb-b7a4-1ad0f2637d4b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/eyes-on-the-clock-how-iris-biometrics-reinventing-workforce-accountability/</link><title>Eyes on the Clock: How Iris Biometrics Are Reinventing Workforce Accountability</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/0825-sectech-murad-manufacturing-iris-facial-recognition-02.gif' style='float: left' alt=''/&gt;From time theft to tailgating, iris and face recognition shut down the gray areas of employee access.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/cyber-physical-convergence-using-hybrid-networks-secure-manufacturing-floor/"><guid isPermaLink="false">dd51d082-fa8d-4967-aa80-745957e4d31f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/august/cyber-physical-convergence-using-hybrid-networks-secure-manufacturing-floor/</link><title>Cyber-Physical Convergence: Using Hybrid Networks to Secure the Manufacturing Floor</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/october/0825-sectech-coton-manufacturing-listicle-hybrid-wifi.jpg' style='float: left' alt=''/&gt;Today’s dynamic manufacturing landscape requires networks to be more than just connected—they must be vigilant.</description><pubDate>Fri, 01 Aug 2025 08:53:55 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/industry-news/"><guid isPermaLink="false">1b58eec9-e6f4-4779-afb8-483dc08c1d2d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/industry-news/</link><title>Industry News: Erasing Emergency Alert Gaps for Schools and First Responders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/sm-0725-industry-news-classroom.jpg' style='float: left' alt=''/&gt;i-PRO and NovoTrax partnered to close gaps in schools’ emergency response workflows.</description><pubDate>Thu, 31 Jul 2025 12:50:00 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/asis-news/"><guid isPermaLink="false">552031c5-e37f-49c0-bc75-3b136cca5331</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/asis-news/</link><title>ASIS News: GSX Keynotes, Fitness Challenge, and New Research </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0825-asis-news.jpg' style='float: left' alt=''/&gt;Meet the keynote session speakers for GSX 2025! Also, learn about new research from the ASIS Foundation and give back while getting fit in the 2025 Fitness Challenge.</description><pubDate>Wed, 30 Jul 2025 10:17:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/retail-energy-volatility/"><guid isPermaLink="false">1136188e-530e-4e94-ae1c-68b1da3de8df</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/retail-energy-volatility/</link><title>Helping Retail Centers Navigate a Volatile Energy Landscape</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-super-market-energy.gif' style='float: left' alt=''/&gt;As energy rates soar and the grid tries to adapt, supermarkets need a way to lower their energy costs, increase profit margins, and ensure that mission-critical processes can operate uninterrupted in an increasingly volatile energy environment.</description><pubDate>Tue, 29 Jul 2025 09:13:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/timeline/"><guid isPermaLink="false">699fa984-bb10-4405-933b-2c4dd709c136</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/timeline/</link><title>Timeline of a Takeover: What Happened at the U.S. Institute of Peace</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-gates-usip-timeline-23rd-street-entrance.jpg' style='float: left' alt=''/&gt;The U.S. Department of Government Efficiency (DOGE) initiated a physical takeover of the U.S. Institute of Peace earlier this year. Here’s a timeline of the events that transpired. </description><pubDate>Mon, 21 Jul 2025 08:31:50 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/safer-youth-travel/"><guid isPermaLink="false">1083d2d3-c526-4d42-b689-da1a24f4d882</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/safer-youth-travel/</link><title>Beyond the Classroom: ISO 31031’s Blueprint for Safer Youth Travel</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-panchak-student-travel-risk-standard.jpg' style='float: left' alt=''/&gt;With trips spanning everything from educational workshops and sports competitions to cultural exchanges and community service, ensuring the safety and well-being of young travelers has never been more crucial.</description><pubDate>Wed, 23 Jul 2025 09:08:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/reviving-security/"><guid isPermaLink="false">17d7edde-d45c-4e77-9d46-382140e2ccba</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/reviving-security/</link><title>Reviving USIP Security Amidst a DOGE Takeover </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-gates-usip-timeline-lessons-learned.jpg' style='float: left' alt=''/&gt;The U.S. Institute of Peace reclaimed its headquarters site after two months during an ongoing legal battle. Here’s how it went about securing its facilities and regaining control of its security systems. </description><pubDate>Mon, 21 Jul 2025 08:31:50 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/vendor-vulnerability/"><guid isPermaLink="false">177a56a3-136c-49da-a5d7-54edb3870d9f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/usip/vendor-vulnerability/</link><title>How a Vendor Vulnerability Enabled a Takeover at the U.S. Institute of Peace</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-gates-institute-of-peace-feature.gif' style='float: left' alt=''/&gt;The U.S. Department of Government Efficiency used aggressive tactics to physically take over the U.S. Institute of Peace’s headquarters, including leveraging the institute’s former contract security provider. </description><pubDate>Mon, 21 Jul 2025 08:31:50 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/outdoor-surveillance-trends/"><guid isPermaLink="false">558ae570-ef80-44da-a0f9-fc233eeb5589</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/outdoor-surveillance-trends/</link><title>Beyond the Stadium: Surveillance Trends at Outdoor Venues</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-sidebar-king-3.gif' style='float: left' alt=''/&gt;Venue operators can reduce risk and create a safer and more welcoming environment for all when they find surveillance technology that aligns with goals and complements existing restraints. </description><pubDate>Mon, 14 Jul 2025 11:49:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/legal-report/"><guid isPermaLink="false">4a052f1a-7db9-4eb6-8881-2cddb6105e1a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/legal-report/</link><title>Legal Report: Italy Criminalizes Some Protest Activities </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/sm_legal-report_3.jpg' style='float: left' alt=''/&gt;Italy’s Security Decree not only increases the penalties to certain criminal activities during protests but also criminalizes some forms of non-violent protest.</description><pubDate>Wed, 16 Jul 2025 14:58:04 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/live-event-risk-management/"><guid isPermaLink="false">48d307ad-7ce2-4a8f-8ed8-227c70713cdb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/live-event-risk-management/</link><title>The Need for Security Risk Management at Live Events </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-spence-concert-festival-security-sidebar.jpg' style='float: left' alt=''/&gt;When it comes to live events, do you know the different risks and security measures that each type is likely to face?</description><pubDate>Mon, 14 Jul 2025 08:02:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/fast-facts/"><guid isPermaLink="false">3f451f9d-e622-4cda-9150-cac3ff8104bf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/fast-facts/</link><title>Fast Facts: 7 Primary Manmade Hazards for Outdoor Venues</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-mosqueda-venues-fast-facts-manmade-hazards.gif' style='float: left' alt=''/&gt;Outdoor venue owners and operators face a wide range of threats from motivated attackers. </description><pubDate>Mon, 14 Jul 2025 08:02:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/outdoor-event-security/"><guid isPermaLink="false">d75da026-1a89-4d0c-acfb-65e275c252d1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/concerts/outdoor-event-security/</link><title>Open Arms and Open Eyes: Best Practices for Outdoor Event Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-main-mosqueda-01.gif' style='float: left' alt=''/&gt;Outdoor events face unique threats that require an adaptable mindset, communication skills, and partnerships with all stakeholders.</description><pubDate>Mon, 14 Jul 2025 08:02:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/upskilling-professional-growth/"><guid isPermaLink="false">60672758-075e-4f6d-9978-d80cb1b47467</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/upskilling-professional-growth/</link><title>Q&amp;A: Upskilling Equips Future Professional Growth</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-career-competencies-ama-qa02-884x500.jpg' style='float: left' alt=''/&gt;Unlike role-specific training, upskilling helps professionals build a resilient, dynamic, and rewarding career, even as conditions change. </description><pubDate>Tue, 01 Jul 2025 08:41:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/fast-facts/"><guid isPermaLink="false">e9b1a294-501d-4259-9f62-fc3d2ae32ffe</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/fast-facts/</link><title>Fast Facts: Core Soft Skills to Withstand Disruption</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/sm-0725-career-competencies-core-soft-skills-to-withstand-disruption.gif' style='float: left' alt=''/&gt;The long-term impact of generative AI is disrupting the core skills employers need from their workers. Amid the shift, soft skills rise to the top. </description><pubDate>Tue, 01 Jul 2025 08:39:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/what-csos-prioritize/"><guid isPermaLink="false">221b380f-aff6-4021-a0bf-80837c1278da</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/what-csos-prioritize/</link><title>Which Core Competencies CSOs Prioritize</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-base-image-career-competencies-884x500.jpg' style='float: left' alt=''/&gt;Interested in reaching a senior security leadership position someday? Make the time to prioritize growth in executive skills, collaboration, and business savvy, as well as security proficiency. </description><pubDate>Tue, 01 Jul 2025 08:39:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/self-assessment/"><guid isPermaLink="false">bc705f57-870b-42db-82b1-342c74fc68d3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/07/career-competency/self-assessment/</link><title>5 Categories for Your Senior Security Leadership Self-Assessment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/july/0725-sm-career-competencies-assessing-your-skill-gaps01-884x500.jpg' style='float: left' alt=''/&gt;Honest self-assessments can be effective starting points for professional development and upskilling choices. </description><pubDate>Tue, 01 Jul 2025 08:39:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/fast-facts/"><guid isPermaLink="false">e4408d82-22a7-4df5-9178-4c57e9cace62</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/fast-facts/</link><title>Fast Facts: 4 Factors for Inclusive Emergency Planning</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-inclusive-security-fast-facts-480x270-v3.gif' style='float: left' alt=''/&gt;During an evacuation, emergency planning can help employees safely escape from a dangerous situation. But has the planning accounted for everyone?</description><pubDate>Mon, 23 Jun 2025 08:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/federal-regulations-access/"><guid isPermaLink="false">1394ffeb-ef9f-4def-aafe-6df573acc034</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/federal-regulations-access/</link><title>3 Key U.S. Federal Regulations on Facility Access</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/sm-0625-inclusive-security-policies-listicle.jpg' style='float: left' alt=''/&gt;Certain federal regulations in the United States mandate building codes and emergency exits, aiming to improve staff safety.</description><pubDate>Mon, 23 Jun 2025 08:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-egress/"><guid isPermaLink="false">9aed5cde-62e8-4cfc-8f02-70b39c4cccc7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-egress/</link><title>Inclusive Security Policies: Emergency Egress Considerations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/sm-0625-seagriff-inclusive-security-policies-sidebar-02.jpg' style='float: left' alt=''/&gt;</description><pubDate>Mon, 23 Jun 2025 08:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/inclusive-mindset/"><guid isPermaLink="false">c66a9faf-9548-4f43-a16d-900b6a8dca77</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/inclusive-mindset/</link><title>How to Use an Inclusive Mindset to Achieve Workplace Safety for All</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/sm-0625-rhatigan-inclusive-security-policies-sidebar-01.jpg' style='float: left' alt=''/&gt;Spotting your own biases in your approach to security presents teams with an opportunity to shift to an environment that better protects the whole organization.</description><pubDate>Mon, 23 Jun 2025 08:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/asis-news/"><guid isPermaLink="false">bc815fd0-a594-4a07-b50f-cafc7d6cbfb8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/asis-news/</link><title>ASIS News: The New Investigations Standard, GSX Translations, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-asis-news-01.jpg' style='float: left' alt=''/&gt;The newly updated ASIS International Investigations Standard delivers a solid foundation for security practitioners in all sectors of the industry, outlining the principles, processes, and best practices needed for robust and compliant investigations. </description><pubDate>Fri, 27 Jun 2025 09:00:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/industry-news/"><guid isPermaLink="false">4a9a460f-d0dd-429e-bb7f-b58e6c9b2006</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/industry-news/</link><title>Industry News: Prepping for Smoother Flights in the Canary Islands with Multifocal Sensor Cameras </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-industry-news.jpg' style='float: left' alt=''/&gt;A Canary Islands airport found a solution to minimize installing surveillance infrastructure while keeping an eye on ground operations.</description><pubDate>Thu, 26 Jun 2025 10:01:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/broaden-threat-assessments/"><guid isPermaLink="false">938a0625-0be0-493a-a746-efb03e991e5e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/broaden-threat-assessments/</link><title>How to Broaden Digital Threat Assessments for Executive Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-overall-creative-brief-ep-for-female-execs-vips-884x500.jpg' style='float: left' alt=''/&gt;Where digital harassment and threats are concerned, female VIPs face more emotionally manipulative, sexualized threats, including ones that include their family members. Traditional protective intelligence gathering must shift to keep up. </description><pubDate>Mon, 16 Jun 2025 08:21:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/legal-report/"><guid isPermaLink="false">664c8126-f3ce-420a-9782-25c834b38db9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/legal-report/</link><title>Legal Report: U.S. Supreme Court Rulings on Firearm Cases</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-legal-report.jpg' style='float: left' alt=''/&gt;The U.S. Supreme Court made a few decisions on cases involving firearms, including ghost gun kits, a Maryland ban on semiautomatic rifles, and Mexico’s lawsuit against U.S. gun manufacturers and a wholesaler.</description><pubDate>Tue, 24 Jun 2025 09:00:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-response-plans/"><guid isPermaLink="false">574f34bd-8c4a-4e73-b17c-44917051dc52</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-response-plans/</link><title>5 Steps to Build an Inclusive Emergency Response </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-main-feature-mosqueda-884x500.gif' style='float: left' alt=''/&gt;People with disabilities are at higher risk during emergencies. Security teams can craft inclusive emergency and evacuation plans to keep employees, visitors, and organizations safer. </description><pubDate>Mon, 23 Jun 2025 08:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/considerate-executive-protection/"><guid isPermaLink="false">384851b4-cabf-47e4-b1b5-146195ce39a6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/considerate-executive-protection/</link><title>Add EP Value for Female Principals by Being Considerate</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-ep-for-female-vips-considerate-security-measures03-884x500-v2.jpg' style='float: left' alt=''/&gt;When a woman needs a security presence, a little added consideration can go a long way to ensure the protection is accepted and valued.</description><pubDate>Mon, 16 Jun 2025 08:21:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/fast-facts/"><guid isPermaLink="false">32e3a227-9562-4b6b-bd37-43ed886f96e8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/fast-facts/</link><title>Fast Facts: With Cyber Options, Stalking Methods Converge</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-meyer-ep-women-vips-fast-facts-cyberstalking-02.gif' style='float: left' alt=''/&gt;Celebrities, newscasters, politicians, and public figures are often high-profile victims of stalking incidents, but millions of people are stalked each year, including through technology.</description><pubDate>Mon, 16 Jun 2025 08:21:18 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/six-months-executive-protection/"><guid isPermaLink="false">234b8e37-42ee-4189-b935-025e6f7cb89d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/six-months-executive-protection/</link><title>6 Months After Brian Thompson’s Murder, What’s Changed About Executive Protection?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-joelson-gibson-ep-female-vips-6-months-after-uhc.gif' style='float: left' alt=''/&gt;What troubles leaders and security planners alike is how to balance the accessibility of executive teams and the desire to reduce their risk surface.</description><pubDate>Mon, 16 Jun 2025 08:21:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/orders-of-protection/"><guid isPermaLink="false">92bf6898-f92f-4c01-9fe6-f0a7a174b262</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/executive-protection/orders-of-protection/</link><title>Orders of Protection Limitations Vary Across U.S. States</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-ep-for-female-vips-oop-01.gif' style='float: left' alt=''/&gt;Civil restraining order rules vary across U.S. states, complicating executive protection and threat assessment efforts.</description><pubDate>Mon, 16 Jun 2025 08:21:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/how-to-make-a-weapon-selection-when-arming-your-security-team/"><guid isPermaLink="false">48c0b20f-b233-4948-be53-5bfe55dae817</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/how-to-make-a-weapon-selection-when-arming-your-security-team/</link><title>How to Make a Weapon Selection When Arming Your Security Team</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/june-sectech/0624-sectech-jones-cover-02.gif' style='float: left' alt=''/&gt;In some instances, it’s appropriate for security officers to be armed. Here are some aspects to consider and train for when arming personnel.</description><pubDate>Sun, 01 Jun 2025 09:01:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/training-armed-security-personnel/"><guid isPermaLink="false">be7bc549-580a-4219-aecf-60d36c966526</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/training-armed-security-personnel/</link><title>Training Builds Frameworks of Support for Armed Security Personnel</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/june/0625-sectech-gates-weapons-selection-qa.jpg' style='float: left' alt=''/&gt;Armed security officers are trained to respond to threats in seconds. We spoke with an expert on firearms training to learn more about what this entails and how to provide support for your team when an incident occurs.</description><pubDate>Fri, 13 Jun 2025 13:41:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/always-armed-rarely-drawn-rethinking-firearms-in-executive-protection/"><guid isPermaLink="false">7dba9393-a9bd-45e1-8996-792e5b65c6c7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/always-armed-rarely-drawn-rethinking-firearms-in-executive-protection/</link><title>Always Armed, Rarely Drawn: Rethinking Firearms in Executive Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/june/0625-sectech-ludke-884x500.jpg' style='float: left' alt=''/&gt;Today’s protection professionals are far more likely to blend into the background than dominate it. And while many of them are armed, the weapon is seldom used and that is 100 percent by design.</description><pubDate>Sun, 01 Jun 2025 09:01:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/certification-profile/"><guid isPermaLink="false">f817363e-1bf1-4cec-a91d-b9b343503ab1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/certification-profile/</link><title>Certification Profile: Ricardo Torres, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0626-ricardo-torres-certifcation-profile.jpg' style='float: left' alt=''/&gt;Through his membership, Ricardo Torres, CPP, was able to connect with other security professionals both in his community and across the globe.</description><pubDate>Tue, 10 Jun 2025 06:56:53 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/the-5-steps-in-a-use-of-force-continuum/"><guid isPermaLink="false">28007721-2f64-4e9d-8d24-0660db9d5926</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/the-5-steps-in-a-use-of-force-continuum/</link><title>The 5 Steps in a Use-of-Force Continuum</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/june/0625-sectech-5-steps-in-a-use-of-force-continuum.gif' style='float: left' alt=''/&gt;Private security officers can use force in some situations. Here’s a look at the type of policy that outlines how officers can use force.</description><pubDate>Sun, 01 Jun 2025 09:01:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/hartford-rtcc-case-study/"><guid isPermaLink="false">7af210b6-d3de-4c52-8e24-74a0ed994439</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/hartford-rtcc-case-study/</link><title>Technology and Talent Boost Crime Solvability in Hartford  </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-sm-case-study-884x500.jpg' style='float: left' alt=''/&gt;The combination of effective analysts, technology, and processes enabled the city of Hartford, Connecticut, to quadruple its crime solvability, especially around nonfatal shooting cases. </description><pubDate>Thu, 05 Jun 2025 10:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/06/teaching-cybersecurity-book/"><guid isPermaLink="false">95385782-0175-42b1-b9b3-95989c41052d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/06/teaching-cybersecurity-book/</link><title>Book Review: Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/june/0625-book-review-teaching-cybersecurity.jpg' style='float: left' alt=''/&gt;This book is meant for teachers who don’t have a background in information technology or cybersecurity but are tasked with incorporating it into their lesson plans. </description><pubDate>Tue, 03 Jun 2025 09:00:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/5-nonlethal-weapons-used-by-security/"><guid isPermaLink="false">7a7ee853-b6ec-4047-a59c-c37093ca65cb</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/5-nonlethal-weapons-used-by-security/</link><title>5 Nonlethal Weapons Used by Private Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/june/0625-sectech-listicle-weapons-non-lethal-malinois.jpg' style='float: left' alt=''/&gt;Firearms aren’t the only weapons available to private security personnel. Here we take a look at five of the most commonly used nonlethal weapons that a range of officers might use in the course of their work.</description><pubDate>Sun, 01 Jun 2025 09:01:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/leveraging-lockers-the-future-of-weapons-storage-is-here/"><guid isPermaLink="false">0138fdec-5b52-492d-bc3d-0d529237c7c3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/june/leveraging-lockers-the-future-of-weapons-storage-is-here/</link><title>Leveraging Lockers: The Future of Weapons Storage is Here</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/june/0625-sectech-atkinson-weapons-intelligent-lockers.jpg' style='float: left' alt=''/&gt;Intelligent weapons lockers represent the future in managing weapons, and departments that leverage them are investing in operational efficiency.</description><pubDate>Sun, 01 Jun 2025 09:01:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/asis-news/"><guid isPermaLink="false">8defde89-f991-4f8a-b110-9b2462053683</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/asis-news/</link><title>ASIS News: Explore 200+ Education Sessions at GSX 2025</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-asis-news-focus-on-gsx-education-884x500.jpg' style='float: left' alt=''/&gt;Build your GSX 2025 educational schedule online now, with hundreds of sessions available throughout the event. </description><pubDate>Thu, 29 May 2025 10:15:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/industry-news/"><guid isPermaLink="false">39729287-6c45-40c9-95d7-049023eb2a38</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/industry-news/</link><title>Industry News: Texas A&amp;M Modernizes Campus Parking with License Plate Recognition</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/sm-0525-industry-news.jpg' style='float: left' alt=''/&gt;Texas A&amp;M’s parking division opted for a modern and virtual solution from Genetec to support its security and monitoring of more than 36,000 parking spaces. </description><pubDate>Wed, 28 May 2025 12:12:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/what-responsible-ai-means-in-the-modern-security-industry/"><guid isPermaLink="false">24f8d114-2f64-4368-8390-a10d630b0267</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/what-responsible-ai-means-in-the-modern-security-industry/</link><title>What ‘Responsible AI’ Means in the Modern Security Industry</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-online-exclusive-what-responsible-ai-means-in-the-modern-security-industry02-884x500.jpg' style='float: left' alt=''/&gt;Responsible use doesn’t just cover illegal and inappropriate use cases. It also encompasses prioritizing openness and transparency to ensure end users understand how AI technology works.</description><pubDate>Thu, 22 May 2025 12:30:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/fast-facts/"><guid isPermaLink="false">daeb207e-a902-4e8d-942d-e3e53ac58f1b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/fast-facts/</link><title>Fast Facts: Identifying Heat-Related Illnesses</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-mosqueda-fast-facts-heat-illnesses.gif' style='float: left' alt=''/&gt;How can you tell if someone has been outside in extreme heat for too long? Here’s how to identify and respond to heat-related illnesses.</description><pubDate>Mon, 12 May 2025 07:33:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/certification-profile/"><guid isPermaLink="false">0e6693a3-4074-4a91-8628-c8676d24e38f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/certification-profile/</link><title>Certification Profile: Ranjiv Abraham, CPP, PSP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-ranjiv-certification-profile.jpg' style='float: left' alt=''/&gt;“I was drawn to the critical role security plays in safeguarding people, assets, and information, and I saw it as a field where I could make a meaningful impact,” says Ranjiv Abraham, CPP, PSP. </description><pubDate>Fri, 16 May 2025 08:36:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/heat-standards-regulations/"><guid isPermaLink="false">72d1ac03-c841-4bc1-876f-302a82784df9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/heat-standards-regulations/</link><title>Understanding U.S. States’ Heat Illness Prevention Standards</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-extreme-temps-workplace-heat-regulations01-884x500.jpg' style='float: left' alt=''/&gt;What do employers need to know about new and potential workplace standards on heat illness prevention?</description><pubDate>Mon, 12 May 2025 07:33:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/extreme-heat-effects/"><guid isPermaLink="false">a68121dc-4d8f-4851-ae61-3ca9270c3a7c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/extreme-heat-effects/</link><title>How Heat Hits Hard</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-extreme-temps-heat-related-stress.gif' style='float: left' alt=''/&gt;Warmth is necessary for survival. But extreme heat poses serious threats to human life, communities, and infrastructure.</description><pubDate>Mon, 12 May 2025 07:33:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/heat-safety-patrols/"><guid isPermaLink="false">565d8b8b-aa13-4242-b2bf-639f4e0fc16c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/extreme-temperatures/heat-safety-patrols/</link><title>New Extremes: Heat Safety Amid Rising Temperatures</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-extreme-temps-main-story-mosqueda02-884x500.jpg' style='float: left' alt=''/&gt;Working in high temperatures can be inevitable, especially in campus patrols, manufacturing facilities, and outdoor operations. But changing temperature ranges can make jobs increasingly dangerous without appropriate mitigation strategies.</description><pubDate>Mon, 12 May 2025 07:33:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/campus-protest-slu/"><guid isPermaLink="false">65ed45c4-22a4-46d6-a4d2-2e05a1156977</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/campus-protest-slu/</link><title>Campus Protests: Working Together to Meet Peace with Peace</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-heikkinen-mass-protests-st-louis-university-01.jpg' style='float: left' alt=''/&gt;The October 2023 Hamas attack in Israel and its aftermath sparked a new era of campus free expression and protest. Many institutions, including Saint Louis University, had to grapple with how to respond.</description><pubDate>Wed, 30 Apr 2025 12:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/graffiti-protocols/"><guid isPermaLink="false">749190dd-bf84-41c3-9645-f7af85433300</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/graffiti-protocols/</link><title>Protocols to Guard Against Graffiti </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/sm-graffiti-prevention-removal-especially-on-college-buildings.gif' style='float: left' alt=''/&gt;As college campuses cope with damaging building graffiti, university teams are searching for effective ways to protect their schools’ valued structures from vandalism’s costly impact and the safe removal of the structural pollutants.</description><pubDate>Wed, 30 Apr 2025 12:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/fast-facts/"><guid isPermaLink="false">e680627f-b1b3-440e-b93d-c5f9f8e7615d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/fast-facts/</link><title>Fast Facts: How to Stay Safe in a Crowd</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-mass-protest-fast-facts02-480x270.gif' style='float: left' alt=''/&gt;Whether you’re participating in a mass march or protest or if you happen to be nearby when a flash mob congregates, it’s important to know the basics of crowd safety. </description><pubDate>Wed, 30 Apr 2025 12:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/rules-of-engagement-document/"><guid isPermaLink="false">c9eee94c-5b2a-4f89-8eb2-d61fba49b476</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/rules-of-engagement-document/</link><title>What to Add to a Rules of Engagement Document</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-miles-mass-protests-rules-of-engagement.gif' style='float: left' alt=''/&gt;The ROED should outline the overall security strategy for marches and rallies, providing health and safety recommendations and identifying a communication plan for emergencies.</description><pubDate>Wed, 30 Apr 2025 12:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/security-for-marches-rallies/"><guid isPermaLink="false">885a3189-d0e5-477f-970d-27f31263c7ac</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/05/mass-protests/security-for-marches-rallies/</link><title>The Other Side of the Looking Glass: Providing Security for Marches and Rallies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/may/0525-sm-mass-protest-miles--elliot-protecting-protests02-884x500.gif' style='float: left' alt=''/&gt;Organizations often participate in marches and rallies for causes that align with their values. Security leaders need to leverage a different set of diplomatic skills to keep those activities safe. </description><pubDate>Wed, 30 Apr 2025 12:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/measure-sustainability/"><guid isPermaLink="false">9d975906-d025-42fd-b48c-9e9b9aed7ce0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/measure-sustainability/</link><title>How to Measure and Boost Sustainability in Security Systems</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-p_1.jpg' style='float: left' alt=''/&gt;Learn how to measure sustainability in your security systems and align with ESG goals to secure stakeholder support and budget approval.</description><pubDate>Mon, 21 Apr 2025 07:47:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/fast-facts/"><guid isPermaLink="false">c53097a1-1a20-4b22-826b-d2d656f4b16c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/fast-facts/</link><title>Fast Facts: Who Drives Security Purchasing Decisions in 2025? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-budgets-fast-facts-480x270-v2.gif' style='float: left' alt=''/&gt;IT professionals continue to play a bigger role in physical security system management decisions, outranking most physical security departments when it comes to purchasing decisions. </description><pubDate>Mon, 21 Apr 2025 07:47:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/industry-news/"><guid isPermaLink="false">5a5e7ca7-e54a-4028-a625-95f9e3e79142</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/industry-news/</link><title>Industry News: Surveillance Upgrade Supports Crime Prevention at Bristol’s Temple Quay and Glass Wharf</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/sm-0425-industry-news---bristol-city-center.jpg' style='float: left' alt=''/&gt;A new end-to-end video surveillance upgrade helps security overcome challenges at Temple Quay and Glass Wharf in England.</description><pubDate>Wed, 30 Apr 2025 08:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/data-backed-proposals-that-resonate/"><guid isPermaLink="false">7b2c9679-0126-4d18-8d47-11654379b63b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/data-backed-proposals-that-resonate/</link><title>How to Create Data-Backed Proposals That Resonate</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-alsayed-proposals-that-resonate01-884x500.gif' style='float: left' alt=''/&gt;To create a truly impactful proposal, security leaders must customize and target it to fit the unique dynamics and goals of the project or organization.</description><pubDate>Mon, 21 Apr 2025 07:47:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/csuite-language/"><guid isPermaLink="false">ab5af101-215d-43de-96e5-fa7c7f97b379</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/csuite-language/</link><title>Speaking the C-Suite Language: A Strategic Approach to Security Budgeting</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-budgets-schonfeld-c-suite-language-01.gif' style='float: left' alt=''/&gt;Security leaders still face growing pressure to justify their budget needs while demonstrating clear business value.</description><pubDate>Mon, 21 Apr 2025 07:47:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/asis-news/"><guid isPermaLink="false">332ecd8f-d87a-48d1-92cf-cb76e712e3b5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/asis-news/</link><title>ASIS News: Improve Your Project Management Skills</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-asis-news-project-management-03.gif' style='float: left' alt=''/&gt;A new ASIS certificate program delves into the details of project management, from project initiation to closure.</description><pubDate>Tue, 29 Apr 2025 11:42:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/legal-report/"><guid isPermaLink="false">889faf71-4fea-4b7c-9af3-2132a2ecb55e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/legal-report/</link><title>Legal Report: Greenpeace to Pay Oil Company $667 Million in Defamation Suit</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/sm_legal-report_10.jpg' style='float: left' alt=''/&gt;A jury in North Dakota ordered Greenpeace International to pay a hefty fine for its involvement in protests against the Dakota Access Pipeline.</description><pubDate>Tue, 22 Apr 2025 10:25:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/beyond-greenwashing/"><guid isPermaLink="false">bbfd466e-82ba-4dba-8bda-3cffee01c431</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/beyond-greenwashing/</link><title>Beyond Greenwashing: How to Identify Sustainable Security Vendors and Gain a Competitive Edge</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-budgets-shanelaris-greenwashing02-884x500.jpg' style='float: left' alt=''/&gt;Corporate decision-makers committed to achieving sustainability goals must distinguish between vendors who genuinely practice sustainability and those that engage in greenwashing.</description><pubDate>Mon, 21 Apr 2025 07:47:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/asis-upskill-finances/"><guid isPermaLink="false">6c4b0f43-bd3e-4e5e-864f-0f362d7cdfa1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/budgets/asis-upskill-finances/</link><title>Befuddled by Budgets? Leverage ASIS Upskill Sessions </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/sm-0425-budgets---upskill-2-brighter.jpg' style='float: left' alt=''/&gt;If budgets and financial reports are hampering your professional growth as a security leader, it might be time to review the basics. </description><pubDate>Mon, 21 Apr 2025 07:47:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-facilities-managers/"><guid isPermaLink="false">495f1d4d-293b-4d7f-b6ca-bf4d48a4a30e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-facilities-managers/</link><title>Q&amp;A: Building Safety into the Schoolhouse Walls</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-schools-facilities-qa03-884x500.gif' style='float: left' alt=''/&gt;For Brandon Payne, executive director of the National Council on School Facilities, school security demands training, planning, maintenance, and support from everyone.</description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-safety-directors/"><guid isPermaLink="false">ebf7d38c-f5c4-4516-95cd-e00d15a278b2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-safety-directors/</link><title>Q&amp;A: School Safety Directors Offer Perspective and Scope</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-schools-school-safety-directors-qa.gif' style='float: left' alt=''/&gt;Jason Stoddard, chair of the National Council of School Safety Directors, lists four free efforts that can make all the difference in school safety and security.</description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-psychologists/"><guid isPermaLink="false">436bd74c-ba61-47aa-9941-d4a577859fcc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-psychologists/</link><title>Q&amp;A: A Psychologist's View of School Security Highlights the Value of Collaboration</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-schools-psychologists.gif' style='float: left' alt=''/&gt;Emilie Ney, a director for the National Association of School Psychologists, looks for holistic solutions to tackle a range of threats to school communities. </description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-nurses/"><guid isPermaLink="false">44b56f95-493e-4e89-b013-994fbe216dfd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-nurses/</link><title>Q&amp;A: Why School Nurses Should Get a Seat at the School Safety Table</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-schools-school-nurses-qa.jpg' style='float: left' alt=''/&gt;Terri Hinkley, CEO for the National Association of School Nurses, sees value in bringing nurses to teams developing school emergency response plans.</description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-resource-officers/"><guid isPermaLink="false">dcdd2a51-4f13-4b5f-9f67-5a5c6723d3d9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-resource-officers/</link><title>Q&amp;A: Training and the Right Personality are Essential for SROs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-schools-officers.gif' style='float: left' alt=''/&gt;Mo Canady sees a high bar set for school resource officers—they must make crucial connections with students, staff, and the community at large.</description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/fast-facts/"><guid isPermaLink="false">f31456a8-6ba9-431a-bdee-71f16d055da3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/fast-facts/</link><title>Fast Facts: 4 Building Blocks of Supportive School Communities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-mosquesa-k-12-fast-facts-supportive-communities.gif' style='float: left' alt=''/&gt;Building supportive school communities can help decrease negative behaviors in schools while establishing positive relationships between students, staff, and administrators. </description><pubDate>Mon, 14 Apr 2025 07:59:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-security-partners/"><guid isPermaLink="false">b15db57b-b252-4b7c-8d64-1a84ce524dbe</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/k12/school-security-partners/</link><title>Essential Security Lessons from Partners Across K-12 Education</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-sm-schools-intro-to-qa-series02-884x500-v2.gif' style='float: left' alt=''/&gt;When looking at K-12 schools, security and safety stakeholders from across the sector—facilities, nurses, psychologists, safety directors, and school resource officers—touch on notable gaps and strengths.</description><pubDate>Mon, 14 Apr 2025 07:59:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/old-guard-new-tech-modernizing-travel-risk-management-mature-security-operations/"><guid isPermaLink="false">e2be7923-fb60-44f4-a539-ab09de5b174d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/old-guard-new-tech-modernizing-travel-risk-management-mature-security-operations/</link><title>Old Guard vs. New Tech: Modernizing Travel Risk Management within Mature Security Operations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-delgado-travel-security-trm-system-transition-884x500.gif' style='float: left' alt=''/&gt;Without a thoughtful integration strategy for a new TRM system, misaligned expectations and operational bottlenecks can cause serious disruption. Here are some steps to consider for an effective transition.</description><pubDate>Tue, 01 Apr 2025 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/certification-profile/"><guid isPermaLink="false">03e0e790-0907-485d-9a7a-a0fa7bc34cdb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/certification-profile/</link><title>Certification Profile: Selbourne Webb, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/april/0425-certifcation-profile-selbourne-webb.jpg' style='float: left' alt=''/&gt;Along with certification, one of the things Selbourne Webb values most about being an ASIS member is the opportunity to connect with peers in the industry both locally and across the globe. </description><pubDate>Wed, 09 Apr 2025 08:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/dont-wait-for-a-tragedy-to-implement-proactive-executive-travel-security/"><guid isPermaLink="false">4bc82d7f-ef33-4906-8e1f-7524246236ae</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/dont-wait-for-a-tragedy-to-implement-proactive-executive-travel-security/</link><title>Don’t Wait for a Tragedy to Implement Proactive Executive Travel Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-jeapes-884x500.jpg' style='float: left' alt=''/&gt;Geopolitical changes, criminal groups’ adoption of artificial intelligence (AI) tools, and the ability to send money quickly via digital currencies are changing the threat landscape for executive travel.</description><pubDate>Tue, 01 Apr 2025 06:00:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/taking-a-closer-look-key-management-schiphol-airport-security/"><guid isPermaLink="false">f30dfbd8-5a9e-41f3-a186-11a94a57fe46</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/taking-a-closer-look-key-management-schiphol-airport-security/</link><title>Taking A Closer Look at Key Management and Schiphol Airport Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-traka-case-study-on-schopel-airport-884x500.jpg' style='float: left' alt=''/&gt;In 2005, Schiphol’s security team recognized the need for a more sophisticated key management system to integrate security innovations into its ecosystem. The solution continues to evolve to adapt to new security challenges.</description><pubDate>Tue, 01 Apr 2025 06:00:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/where-wrongful-detention-is-on-the-rise/"><guid isPermaLink="false">b6b9dbe6-834d-4cfa-b384-9050865ffb09</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/where-wrongful-detention-is-on-the-rise/</link><title>Where Wrongful Detention is on the Rise</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-wrongful-detention.jpg' style='float: left' alt=''/&gt;Fifty-four Americans were wrongfully detained or held hostage overseas in 17 countries in 2024, according to an annual report from the James Foley Foundation.</description><pubDate>Tue, 01 Apr 2025 06:00:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/how-to-design-an-entrepreneur-travel-risk-management-framework/"><guid isPermaLink="false">d3c558b1-1749-4dd7-a65f-9ee5065700d6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/how-to-design-an-entrepreneur-travel-risk-management-framework/</link><title>How to Design an Entrepreneur Travel Risk Management Framework in the Face of the Current VUCA World</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-li-884x500.jpg' style='float: left' alt=''/&gt;In a volatile, uncertain, complex, and ambiguous world, multinational companies should design a structured, multi-layered travel risk management framework that covers the entire travel cycle.</description><pubDate>Tue, 01 Apr 2025 06:00:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/wrongful-detention-an-ermging-travel-risk-for-2025/"><guid isPermaLink="false">e6f4954f-f32f-4329-b480-9090e3cb2f79</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/wrongful-detention-an-ermging-travel-risk-for-2025/</link><title>Wrongful Detention: An Emerging Travel Risk for 2025</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-dodge-884x500.jpg' style='float: left' alt=''/&gt;The world has become a more dangerous place for business travelers, who are at heightened risk of being wrongfully detained in transit. </description><pubDate>Tue, 01 Apr 2025 06:00:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-pretrave-steps-for-safer-work-trips/"><guid isPermaLink="false">0c6060fa-a797-4338-9850-65212c8da57d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-pretrave-steps-for-safer-work-trips/</link><title>5 Pretravel Steps for Safer Work Trips</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-gastesfast-facts-5-pretravel-steps-for-safer-work-trips.gif' style='float: left' alt=''/&gt;Before you step out the door for your next work trip, the UK Foreign, Commonwealth, and Development Office suggests taking these steps to stay safe abroad.</description><pubDate>Tue, 01 Apr 2025 06:00:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-takeaways-from-asis-europe/"><guid isPermaLink="false">5fac7240-63f5-4fb5-bab2-5df3905f8877</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-takeaways-from-asis-europe/</link><title>5 Takeaways from ASIS Europe’s Future of Travel Risk Management Workshop</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/april/0425-sectech-gates03-884x500.jpg' style='float: left' alt=''/&gt;Security practitioners gathered in Dublin, Ireland, in March to discuss trending security topics and challenges. One top-of-mind issue was travel risk management.</description><pubDate>Tue, 01 Apr 2025 06:00:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/industry-news/"><guid isPermaLink="false">841cff88-925e-4d65-a874-017877d3a917</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/industry-news/</link><title>Industry News: Historic Helsinki Rail Station Locks in Added Access Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/sm-0325-industry-news-helsinki-railway-station.png' style='float: left' alt=''/&gt;One of Finland’s iconic landmarks looked to an Assa Abloy solution to update its locking system.</description><pubDate>Fri, 28 Mar 2025 11:56:22 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/workplace-violence-fatalities/"><guid isPermaLink="false">2dee53c4-91ab-498d-8cf6-9b4fdc9765ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/workplace-violence-fatalities/</link><title>Research: Characteristics of Fatal Workplace Violence Incidents</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0425-briscoe-active-assailant-research-fatality.jpg' style='float: left' alt=''/&gt;Security professionals whose organizations had a workplace violence fatality felt confident that they successfully interacted with first responders, but effective communication is another matter.</description><pubDate>Mon, 24 Mar 2025 08:13:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/legal-report/"><guid isPermaLink="false">ef706fa1-cd4b-4b41-b2d5-e9835b0724b0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/legal-report/</link><title>Legal Report: New York Prison Officers Charged with Murder of Inmate</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-legal-report.jpg' style='float: left' alt=''/&gt;Six corrections officers were charged with the murder and manslaughter of Robert Brooks, whose beating and death were recorded on the officers’ body-worn cameras.</description><pubDate>Thu, 27 Mar 2025 08:37:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/critical-element-time/"><guid isPermaLink="false">0e0ff2ba-e086-423a-b932-dd16dda12ffc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/critical-element-time/</link><title>Time is the Critical Element in Active Assailant Preparation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0425-briscoe-active-assailant-research-time-factor.gif' style='float: left' alt=''/&gt;While prevention is incredibly important, security professionals cannot afford to ignore the critical need to prepare their organizations in case an active assailant incident occurs.</description><pubDate>Mon, 24 Mar 2025 08:13:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/asis-news/"><guid isPermaLink="false">9ce67f54-a8a8-4868-b7d1-f00d815d7086</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/asis-news/</link><title>ASIS News: Boost Your Professional Development with Scholarships and Upskill Education</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0425-asis-news-03-884x500.jpg' style='float: left' alt=''/&gt;ASIS members can now access free content powered by ASIS and the American Management Association (AMA) designed to sharpen your business skills.</description><pubDate>Wed, 26 Mar 2025 08:50:53 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/fast-facts/"><guid isPermaLink="false">36ff10d8-86b8-4e30-ab37-33a10f655968</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/fast-facts/</link><title>Fast Facts: 4 Features that Improve Active Assailant Preparedness</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-fast-facts-active-assailant-research-480x270.gif' style='float: left' alt=''/&gt;The disparity between the “dos” and “do nots” in this active assailant preparedness research was stark and showed the key areas that correlate to feeling prepared. </description><pubDate>Mon, 24 Mar 2025 08:13:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/proactive-active-assailant-intervention/"><guid isPermaLink="false">6a43fdee-af7b-4bbd-838f-a57b7f95124a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/research-active-assailants/proactive-active-assailant-intervention/</link><title>Empowering Employees to Report Concerns for Proactive Active Assailant Intervention</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0425-petrino-active-assailant-research-reporting-concerning-behaviors.jpg' style='float: left' alt=''/&gt;Early intervention of potentially volatile situations can help organizations avoid tragedies and underscores the importance of devoting attention and resources to creating an environment where prevention can thrive.</description><pubDate>Mon, 24 Mar 2025 08:13:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/responsible-technology/"><guid isPermaLink="false">f443f34a-64b6-4d4b-a136-98efa1a84c03</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/responsible-technology/</link><title>Quantifying Commitment: The Value of Responsible Technology in Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-responsile-technology-security-03.gif' style='float: left' alt=''/&gt;Recent market research reveals that 85 percent of technology buyers believe that responsible innovation and the use of artificial intelligence, video analytics, and video security systems will be a prerequisite in the future. </description><pubDate>Fri, 21 Mar 2025 08:37:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/how-to-measure-roi/"><guid isPermaLink="false">d91a90e7-0ea2-4a0f-b460-f0e4517052a6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/how-to-measure-roi/</link><title>How to Measure Your Security and Resilience ROI </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-sidebar-wood04-884x500.gif' style='float: left' alt=''/&gt;You can leverage a return on investment to help others understand security and how it supports the whole organization.</description><pubDate>Mon, 17 Mar 2025 08:23:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/shine-beyond-numbers/"><guid isPermaLink="false">1620b0b5-a033-4628-aabb-3c5483c86625</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/shine-beyond-numbers/</link><title>Metrics to Make Security Shine Beyond the Numbers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0525-rhatigan-metrics-sidebar.gif' style='float: left' alt=''/&gt;When it comes to communicating performance, metrics and common terminology can help sell security’s worth and sing its praises.</description><pubDate>Mon, 17 Mar 2025 08:23:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/data-journalism/"><guid isPermaLink="false">0703b952-cec7-47b6-a05d-50a780fb8be4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/data-journalism/</link><title>Data Journalism 101: How to Tell a Story with Data</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-metrics-listicle-data-journalism.jpg' style='float: left' alt=''/&gt;It’s not enough to have metrics—you have to have the skills to tell the story within the data.</description><pubDate>Mon, 17 Mar 2025 08:23:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/fast-facts/"><guid isPermaLink="false">a172ef10-0b68-46e1-b34f-d221b33a8441</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/fast-facts/</link><title>Fast Facts: 3 Core Types of Metrics</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-metrics-fast-facts-3-core-types-of-metrics.gif' style='float: left' alt=''/&gt;There are different ways of generating data. Which type would be the most useful for you?</description><pubDate>Mon, 17 Mar 2025 08:23:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/crafting-metrics-story/"><guid isPermaLink="false">1ea2597e-a852-4fac-b1bb-ce2d62cde772</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/metrics/crafting-metrics-story/</link><title>From Hard Numbers to a Value Proposition: Crafting a Story for the C-Suite with Metrics </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-metrics-main-article.jpg' style='float: left' alt=''/&gt;Connecting metrics with a human-centric narrative can make security’s value proposition harder to refute. </description><pubDate>Mon, 17 Mar 2025 08:23:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/polarized-distrustful-culture/"><guid isPermaLink="false">367b4c87-2335-4803-a11e-c7a98e4d0dfb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/polarized-distrustful-culture/</link><title>Unwell: National Survey Finds Americans Are Polarized and Distrustful </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-gates-pandemics-distrust-about-public-health-main.jpg' style='float: left' alt=''/&gt;The State of the Nation Project surveyed about 1,000 U.S. adults on trust, national security, and daily life. It found that “a gnawing sense of angst seems to have descended” on Americans.</description><pubDate>Mon, 10 Mar 2025 08:38:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/national-security-pandemics/"><guid isPermaLink="false">6f42ae43-18b3-4dfa-89e7-1cfdd41cfa59</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/national-security-pandemics/</link><title>The Widening Gap in Pandemic Prevention Measures</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-pandemics-gates.jpg' style='float: left' alt=''/&gt;Five years after the COVID-19 pandemic began, public health is facing a mounting crisis that could pose significant ramifications for national security.</description><pubDate>Mon, 10 Mar 2025 08:38:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/04/isc-west-2025-product-showcase/"><guid isPermaLink="false">2d04c2ca-6424-44aa-88b1-7cd45a83aa04</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/04/isc-west-2025-product-showcase/</link><title>ISC West 2025 Product Showcase</title><description>&lt;img src='http://www.asisonline.org/contentassets/709e6bad9cd247ccbcf9d3370b9222f5/fp.jpg' style='float: left' alt=''/&gt;What can you expect to see at ISC West 2025? Check out the latest product showcase for a preview.</description><pubDate>Thu, 13 Mar 2025 11:50:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/certification-profile-okpala/"><guid isPermaLink="false">a60015aa-5afd-4b87-b2e5-ece2a34ef23d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/certification-profile-okpala/</link><title>Certification Profile: Felix Uchenna Okpala, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-felix-uchenna-certifcation-profile.jpg' style='float: left' alt=''/&gt;Felix Uchenna Okpala, CPP, started his career as an electrical engineer, but he always admired the hard work and dedication of security personnel. </description><pubDate>Wed, 12 Mar 2025 08:55:37 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/world-health-organization/"><guid isPermaLink="false">b6773c76-285f-47e1-9581-73d1b7784c63</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/world-health-organization/</link><title>Looking Forward: How is the WHO Strengthening Pandemic Preparedness Measures?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-pandemics-who-sidebar-884x500.jpg' style='float: left' alt=''/&gt;Five years after the World Health Organization declared COVID-19 a pandemic, it continues to monitor the disease while improving its abilities to be better prepared to respond to public health emergencies.</description><pubDate>Mon, 10 Mar 2025 08:38:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/fast-facts/"><guid isPermaLink="false">aafc93f9-d4b6-48ab-b46f-61e91b6b49e7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/fast-facts/</link><title>How to Create an Effective Workplace Health Program</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-pandemics-fast-facts-about-workplace-health-programs.gif' style='float: left' alt=''/&gt;Workplace health promotion programs have benefits for both employers and employees. Here are the steps to consider when creating your program to ensure it has buy-in and remains effective.</description><pubDate>Mon, 10 Mar 2025 08:38:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/post-covid-security/"><guid isPermaLink="false">28b44719-2d65-4a3f-87bd-7e123662c599</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/pandemic-readiness/post-covid-security/</link><title>Five Years Later: Security in a Post-COVID World</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-pandemics-gates-second-feature-lessons-learned-from-covid-19-03-884x500.jpg' style='float: left' alt=''/&gt;The COVID-19 pandemic had wide-reaching ramifications for security and public health professionals worldwide, and it continues to present lessons for the future of risk management.</description><pubDate>Mon, 10 Mar 2025 08:38:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/workplace-safety-training/"><guid isPermaLink="false">a6b64e66-2236-488a-9111-27a8363e7e0c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/workplace-safety-training/</link><title>Fostering Employee Success and Retention Through Inclusive Workplace Safety Training</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-inclusion-epstein-inclusive-workplace-safety-training01-884x500.gif' style='float: left' alt=''/&gt;Language barriers can impact the effectiveness of safety training, leaving non-native speakers at a disadvantage and reducing overall training retention.</description><pubDate>Sat, 01 Mar 2025 08:00:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/ally-leadership/"><guid isPermaLink="false">14caa65a-e08a-41c1-8ddc-560aa10eebf3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/ally-leadership/</link><title>How Ally Leaders Boost Belonging and Business Outcomes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-inclusion-sidebar-being-an-ally-at-work04-884x500.jpg' style='float: left' alt=''/&gt;Allies can keep an eye out for disrespectful or unfair behavior toward all employees and correct it, ensuring workplaces remain a safe place for merit-based achievement for all.</description><pubDate>Sat, 01 Mar 2025 08:00:24 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/executive-order-compliance/"><guid isPermaLink="false">25c50f79-5fc1-42b7-96dc-2dcd44f866a0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/executive-order-compliance/</link><title>Responding to Executive Orders, Organizations Evolve Their Inclusion and Workforce Development Efforts </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-meyer-inclusion--what-you-can_cant-do-around-inclusion.gif' style='float: left' alt=''/&gt;Employment lawyers, HR advisors, and other experts recommend that organizations scrambling to determine the future of DEI initiatives seek ways to evolve, not eliminate, inclusion efforts. </description><pubDate>Sat, 01 Mar 2025 08:00:23 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/editors-note/"><guid isPermaLink="false">752535ef-4aaa-44e9-a2be-465d7ec3d4f5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/editors-note/</link><title>Editor’s Note: Staying the Course </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-meyer-inclusion-editors-note.gif' style='float: left' alt=''/&gt;Changing political headwinds and breaking news can easily knock a journalist—or a security leader—off their game. </description><pubDate>Sat, 01 Mar 2025 08:00:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/rto-wellbeing/"><guid isPermaLink="false">851e474d-2007-40ff-8777-aac4f6b473c5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/rto-wellbeing/</link><title>How Well-Being Can Bring Value Back to In-Office Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-inclusion-rto-884x500-1.jpg' style='float: left' alt=''/&gt;By acknowledging and accommodating the variety of styles through which people accomplish their jobs, companies foster a culture of inclusivity and respect, creating an environment where employees feel valued for their unique contributions.</description><pubDate>Sat, 01 Mar 2025 08:00:23 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/prioritize-belonging-inclusion/"><guid isPermaLink="false">14f8d772-f415-46b6-a651-4054a0915c4c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/03/inclusion/prioritize-belonging-inclusion/</link><title>Amid DEI Challenges, Organizations Choose to Focus on Inclusion </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/march/0325-sm-inclusion-meyer-inclusivity-01.gif' style='float: left' alt=''/&gt;Inclusive workplaces are proven to produce greater retention, engagement, and innovation, which organizations desperately need in the face of complex threats.</description><pubDate>Sat, 01 Mar 2025 08:33:43 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/fast-facts/"><guid isPermaLink="false">3f4a9349-3212-423d-9c8f-5b3f0ee7671d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/fast-facts/</link><title>Fast Facts: Benefits of Business-Enabling Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0224-sm-business-enabling-security.gif' style='float: left' alt=''/&gt;Security leaders’ work to demonstrate that their mission extends well beyond the “guns, guards, and gates” stereotype is paying off. But there’s still room to grow. </description><pubDate>Mon, 24 Feb 2025 07:43:58 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-news/"><guid isPermaLink="false">c23ea1bc-9e4c-48c1-a093-2ae5d0754401</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-news/</link><title>ASIS News: 2025 Highlights So Far and Looking Ahead</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-asis-news.jpg' style='float: left' alt=''/&gt;What's new with ASIS International? Take a look at the association's 2024 accomplishments and 2025 opportunities, including research, events, and more. </description><pubDate>Thu, 27 Feb 2025 09:05:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/bonus-trends/"><guid isPermaLink="false">f67cb52b-cc96-4abf-87fc-736f02043f1b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/bonus-trends/</link><title>Bonus Trends: Consultant Perceptions, Increasing Threats, and Wish Lists </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-briscoe-trends-research-consultants.gif' style='float: left' alt=''/&gt;Get an inside look at findings from ASIS’s 2025 Security Trends research that did not make it into the final report.</description><pubDate>Mon, 24 Feb 2025 07:43:58 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/curious-about-ai/"><guid isPermaLink="false">dd4591b0-21f2-4c52-98b9-70c5b480cc57</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/curious-about-ai/</link><title>Corporate Security Is Curious about AI, But Is It Useful Yet?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-briscoe-trends-research-ai-sidebar.gif' style='float: left' alt=''/&gt;Data from the 2025 ASIS Security Trends study shows security professionals have begun dabbling in artificial intelligence applications and think there is great potential in the near future.</description><pubDate>Mon, 24 Feb 2025 07:43:58 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/measuring-security-business-role/"><guid isPermaLink="false">45e0d604-9a53-41e8-bc31-e0f6c1058281</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/asis-research-security-trends/measuring-security-business-role/</link><title>ASIS Research Aims to Measure Security’s Evolving Business Role </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-briscoe-trends-research-main-feature.gif' style='float: left' alt=''/&gt;ASIS research shows security has made significant strides toward becoming strategic business enablers.</description><pubDate>Mon, 24 Feb 2025 07:43:58 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/industry-news/"><guid isPermaLink="false">09d54a4a-1883-41ab-ad64-5c882d9944e9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/industry-news/</link><title>Industry News: UK Teaching Hospital Adopts AI-Enabled Camera Technology </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-industry-news-emergency-department.jpg' style='float: left' alt=''/&gt;The hospital aimed to enhance the security of its large campus by using artificial intelligence-enabled camera technology to extend the capabilities of existing surveillance devices.</description><pubDate>Thu, 20 Feb 2025 10:51:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/legal-report/"><guid isPermaLink="false">67c22bec-0e31-4e18-8023-9ba0b7163e41</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/legal-report/</link><title>Legal Report: Attacker of British Dance Studio Handed Life Sentence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/sm-0225-legal-report.jpg' style='float: left' alt=''/&gt;The teenager attacked a dance class in July 2024 with a knife, killing three children and wounding several other children and adults before being subdued.</description><pubDate>Wed, 19 Feb 2025 08:34:26 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/premier-ciso-book-review/"><guid isPermaLink="false">e9dd4ced-661a-4a56-b9d9-b3a9ddc6eaa3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/premier-ciso-book-review/</link><title>Book Review: Premier CISO—Board &amp; C-Suite: Raising the Bar for Cybersecurity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-book-review-premier-ciso-featured-image.jpg' style='float: left' alt=''/&gt;Premier CISO—Board &amp; C-Suite: Raising the Bar for Cybersecurity focuses on pragmatic and practical strategies CISOs can use to help them succeed in their role. </description><pubDate>Mon, 17 Feb 2025 10:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/orellana-mcbride/"><guid isPermaLink="false">92a1ba7d-ef9f-48d9-bce9-0a1484c46085</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/orellana-mcbride/</link><title>Certification Profile: Alvar Daniel Orellana McBride, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-orellana_mcbride_alvar-certification-profile.jpg' style='float: left' alt=''/&gt;After completing seven years of military service, Alvar Daniel Orellana McBride, CPP, wanted to find new horizons, so he turned to the security industry. </description><pubDate>Fri, 14 Feb 2025 10:04:56 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/sheetz-convenience-coordination/"><guid isPermaLink="false">4127a60d-9036-4842-b3da-dd9535c88346</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/sheetz-convenience-coordination/</link><title>Making Coordination with Law Enforcement More Convenient</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0224-mosqueda-convenience-stores-case-study.jpg' style='float: left' alt=''/&gt;Convenience stores like Sheetz offer customers gas, grab-and-go items, and made-to-order food before getting back on the road. They now also offer law enforcement an easier and faster way to investigate incidents. </description><pubDate>Mon, 10 Feb 2025 07:43:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-security-improvement/"><guid isPermaLink="false">79a453ca-25fb-4cea-88e9-606206887ac8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-security-improvement/</link><title>Keeping Convenience Stores Safe from Physical Threats </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-mosqueda-convenience-stores-main-feature.jpg' style='float: left' alt=''/&gt;Physical attacks on convenience stores range from theft to destruction, accidental to intentional. Experts weigh in on how to make the stores safer.</description><pubDate>Mon, 10 Feb 2025 07:43:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/fast-facts/"><guid isPermaLink="false">13d480fa-82f6-42f4-aa80-b645ffd651db</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/fast-facts/</link><title>Head-On Collision: Storefronts Are No Stranger to Vehicle Crashes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-convenience-stores-fast-facts-480x270-v3.gif' style='float: left' alt=''/&gt;What is the cause of vehicles ramming storefronts? Research finds most—but not all—are unintentional. </description><pubDate>Mon, 10 Feb 2025 07:43:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/artificial-intelligence-navigating-dual-edged-sword-digital-threats/"><guid isPermaLink="false">63a74a14-fca2-4ebe-8f7d-4d6dd96ae731</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/artificial-intelligence-navigating-dual-edged-sword-digital-threats/</link><title>Artificial Intelligence: Navigating the Dual-Edged Sword of Digital Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/february/0225-sectech-centrella-884x500.jpg' style='float: left' alt=''/&gt;The fight against AI-driven crime will be a continuous journey of learning, innovation, and collaborative defense. Those who remain static will become obsolete; those who adapt will emerge as guardians of our increasingly complex digital future.</description><pubDate>Sat, 01 Feb 2025 07:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-incidents/"><guid isPermaLink="false">b8c261eb-b01a-4a10-9fc7-2a19850828c0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-incidents/</link><title>Convenience, Negligence, and Vehicle Accidents Combine in Convenience Store Incidents</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/february/0225-sm-convenience-stores-legal.jpg' style='float: left' alt=''/&gt;Vehicle collisions and other security incidents at convenience stores and quick service restaurants can result in expensive outcomes. </description><pubDate>Mon, 10 Feb 2025 07:43:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-ways-to-boost-fraud-detection/"><guid isPermaLink="false">bc401111-e30d-4d03-95de-f524c8a326ed</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-ways-to-boost-fraud-detection/</link><title>8 Ways to Boost Fraud Detection with Video Surveillance and Analytics</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/february/0225-sectech-corrall-884x500.jpg' style='float: left' alt=''/&gt;Video surveillance can play a vital role in detecting fraud. Here are eight technologies that financial institutions can leverage to prevent fraud.</description><pubDate>Sat, 01 Feb 2025 07:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/too-good-be-true-how-crypto-investment-scam-works/"><guid isPermaLink="false">5691e426-c72d-4624-ad44-0d0e3107d429</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/too-good-be-true-how-crypto-investment-scam-works/</link><title>Too Good to Be True: How a Crypto Investment Scam Works</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/february/0225-sectech-gates-fast-facts-crypto-scams.gif' style='float: left' alt=''/&gt;Cryptocurrency investment scammers raked in at least $3.96 billion in 2023. Here’s how these scams work, and red flags you can look for to keep your finances safe.</description><pubDate>Sat, 01 Feb 2025 07:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-major-fraud-cases-from-2024/"><guid isPermaLink="false">91b6c093-9539-4b05-a64e-eb4fc8ef98e7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-major-fraud-cases-from-2024/</link><title>Looking Back: 8 Major Fraud Cases from 2024</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2025/february/0225-sectech-major-cases-884x500.jpg' style='float: left' alt=''/&gt;The U.S. Department of Justice’s Fraud Section is in the business of bringing down large-scale fraudsters. And in 2024, business was booming.</description><pubDate>Sat, 01 Feb 2025 07:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/redefining-security-screening-with-the-power-of-ai/"><guid isPermaLink="false">1f2d582a-47f3-4d56-84a7-7b98607c4364</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2025/february/redefining-security-screening-with-the-power-of-ai/</link><title>Redefining Security Screening with the Power of AI</title><description>&lt;img src='http://www.asisonline.org/contentassets/df76c4b8859b45818b449e9282701774/rohde_schwarz_ai.gif' style='float: left' alt=''/&gt;In today’s complex security landscape, traditional screening methods—such as manual pat-downs and metal detectors—are increasingly inadequate. These conventional techniques are not only time-consuming and invasive but also limited in their ability to detect a wide range of concealed items.</description><pubDate>Sat, 01 Feb 2025 07:46:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/family-executive-protection/"><guid isPermaLink="false">ee7c17b4-9c26-4fb7-8eff-a86924ad69f3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/family-executive-protection/</link><title>How to Cultivate EP Allies in Executives’ Families </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/sm-article-image-how-to-cultivate-ep-allies-in-executives-families-01.gif' style='float: left' alt=''/&gt;An executive’s spouse has the power to make or break a home executive protection program. Are you connecting in the right way to keep them onboard? </description><pubDate>Fri, 31 Jan 2025 08:32:30 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/asis-news/"><guid isPermaLink="false">f4f08647-39c0-4aad-a6d1-589006c18a2b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/asis-news/</link><title>Welcome to the New 2025 ASIS International Boards </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-asis-news.jpg' style='float: left' alt=''/&gt;Meet the new ASIS International Global Board of Directors for 2025! Also, learn about scholarship opportunities to attend the IE Business School's security management program. </description><pubDate>Thu, 30 Jan 2025 09:35:36 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/social-media-crisis-response/"><guid isPermaLink="false">ce029011-20f6-41f7-abb6-ccb5c7f6514a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/social-media-crisis-response/</link><title>Has Social Media-Based News Changed How People React to Crises?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-social-media-and-mental-health-884x500.jpg' style='float: left' alt=''/&gt;Raw images from conflict zones and disasters spread rapidly through social networks, creating a direct emotional pipeline to local communities.</description><pubDate>Tue, 28 Jan 2025 08:50:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/ideological-violence/"><guid isPermaLink="false">9a152525-b4b5-4eb7-995d-5449eec7cf99</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/ideological-violence/</link><title>Where Does Ideological Violence Fit into OSHA’s Violence Typology? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-crimando-workplace-violence-prevention-osha.gif' style='float: left' alt=''/&gt;In an era marked by increased concerns about violent extremism, and the possibility of extremism infiltrating the workplace, it may be time to revisit OSHA’s four-part typology.</description><pubDate>Mon, 27 Jan 2025 08:37:29 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/cornerstone-enterprise-risk-management/"><guid isPermaLink="false">ccdb4370-934c-45b9-b0c0-1643a4aaa3ba</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/cornerstone-enterprise-risk-management/</link><title>Incident Reporting: Is This Cornerstone of Your Enterprise Security Risk Management Sound?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-incident-report-miles-884x500.jpg' style='float: left' alt=''/&gt;Just as a solid foundation is crucial for a resilient home, a well-functioning incident reporting system increases the likelihood that the structure it supports will withstand the test of time and scrutiny.</description><pubDate>Mon, 20 Jan 2025 09:13:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/incident-reporting-form-sections/"><guid isPermaLink="false">26267a62-bb62-4016-9bcc-018dce8d799f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/incident-reporting-form-sections/</link><title>The 4 Sections Your Incident Reporting Form Should Include </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-incident-reports-gates-listicle-about-sections-to-include-in-incident-reporting-forms-884x500.jpg' style='float: left' alt=''/&gt;Creating a straightforward template for security officers to document unusual activity can assist in collecting accurate data about security incidents. Here’s how to get started.</description><pubDate>Mon, 20 Jan 2025 09:13:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/public-private-partnerships/"><guid isPermaLink="false">eb4ea8ab-ce90-43e5-a620-5fcb1a67a1f2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/public-private-partnerships/</link><title>Well-Written Incident Reports are an Essential Element of Effective Public-Private Partnerships</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0124-sm-incident-report-conley.gif' style='float: left' alt=''/&gt;The ability of security officers to write clear, accurate, and complete case incident reports is a core part of their job and essential for credibility.</description><pubDate>Mon, 20 Jan 2025 09:13:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/industry-news/"><guid isPermaLink="false">13064e22-c7d9-425e-88d1-59416f1aad0e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/industry-news/</link><title>Industry News: MetLife Stadium Implements Bespoke Surveillance System </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-industry-news-metlife-stadium-resized.jpg' style='float: left' alt=''/&gt;Security leaders at of the largest NFL stadiums decided it was time to upgrade their video surveillance solutions, but didn’t want an out-of-the-box product.</description><pubDate>Tue, 21 Jan 2025 08:54:18 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/watergate-incident-report/"><guid isPermaLink="false">54884220-bd72-43d9-86ad-b09ca3ee60c1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/watergate-incident-report/</link><title>Security History: The Watergate Break-in Incident Report</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0124-gates-incident-reports-water-gate-report.jpg' style='float: left' alt=''/&gt;Security officer Frank Wills was on duty at the Watergate Complex in 1972 when five burglars broke into the Democratic National Committee’s office. His actions would spur a police investigation that ultimately led U.S. President Nixon’s resignation.</description><pubDate>Mon, 20 Jan 2025 09:13:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/ai-incident-reports/"><guid isPermaLink="false">0e954f3c-397c-4ef3-9530-333c9e395de5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/incident-reports/ai-incident-reports/</link><title>AI Meets Incident Reports: Considerations and Cautions for Field Use</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/sm-0125---incident-reports-gates-ai-and-incident-report-writing-02.gif' style='float: left' alt=''/&gt;Law enforcement agencies in the United States are beginning to use artificial intelligence to write police reports. The practice could soon make its way into the private security sector.</description><pubDate>Mon, 20 Jan 2025 09:13:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/fast-facts/"><guid isPermaLink="false">cd1745c1-8875-4a33-a2be-fad274f908cc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/fast-facts/</link><title>Fast Facts: 5 Top Car Park Crime Areas in the UK</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-mosqueda-top-car-park-crime-areas-in-the-uk.gif' style='float: left' alt=''/&gt;While garages and car parks are necessary, in some areas they have also become hubs for opportunistic crimes, such as theft, property damage, and even violent assaults. </description><pubDate>Mon, 13 Jan 2025 07:48:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/joe-olivarez-asis-president/"><guid isPermaLink="false">14fca15f-3621-45c4-9075-9dbea46be372</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/joe-olivarez-asis-president/</link><title>Joe Olivarez, Jr.: Opening the Aperture for Community and Collaboration</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-meyer-joe-olivarez-interview.jpg' style='float: left' alt=''/&gt;As 2025 ASIS International president, Joe Olivarez, Jr., aims to bring his philosophy around global leadership, kindness, duty of care, and connection to the association as a whole.  </description><pubDate>Wed, 15 Jan 2025 08:58:42 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/lighting-standards/"><guid isPermaLink="false">1c28d476-3346-4271-8342-5e321dea6358</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/lighting-standards/</link><title>Lighting Standards for Parking Facilities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-parking-lots-listicle-about-lighting-requirements-884x500.jpg' style='float: left' alt=''/&gt;Perhaps one of the simplest and most cost-efficient improvements owners and operators of parking garages and lots can make to increase safety is ensuring the locations have proper lighting. </description><pubDate>Mon, 13 Jan 2025 07:48:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/marcelo-wilson/"><guid isPermaLink="false">b3676f6e-c107-4356-80a1-dcb9d97c85f7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/marcelo-wilson/</link><title>Certification Profile: Marcelo Wilson, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-marcelo-wilson-certifcation-profile.jpg' style='float: left' alt=''/&gt;Marcelo Wilson, CPP, has always felt drawn to the mission of defense and protection. Even playing sports in his youth, Wilson always preferred to play defense. This inclination naturally drew him towards a career in security and defense. </description><pubDate>Tue, 14 Jan 2025 15:54:26 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/legal-report-parking-liability/"><guid isPermaLink="false">b1f706da-d2d4-4a02-8abb-f9c35b6631d2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/legal-report-parking-liability/</link><title>Legal Report: Parking Lot Legal Risks and Cases</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-parking-lots-sidebar.jpg' style='float: left' alt=''/&gt;Whether it’s a slip and fall, an assault, or anything in between, owners of and businesses relying on parking areas are often liable for security incidents. </description><pubDate>Mon, 13 Jan 2025 07:48:13 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/parking-security-solutions/"><guid isPermaLink="false">32a4e951-7983-45cd-b941-0e7ce3614bb2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/garages/parking-security-solutions/</link><title>Parking Security: Modern Solutions for Timeless Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-mosqueda-parking-lots-main-article.jpg' style='float: left' alt=''/&gt;Parking areas, like lots and garages, are the first and last place that a customer has an experience when dealing with a business. Owners and operators have modern solutions to make that impression a positive one.</description><pubDate>Mon, 13 Jan 2025 07:48:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/space-exploration-resilience/"><guid isPermaLink="false">2c90d919-2490-4092-8efc-bab2ab5a7118</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/space-exploration-resilience/</link><title>What Space Exploration Teaches Us About Resilience and Leadership</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/sm-0125-space-exploration-resilience.jpg' style='float: left' alt=''/&gt;Analog missions enable space agencies to test equipment, probe for procedure weaknesses, and evaluate how humans can survive and thrive with each other in challenging situations. </description><pubDate>Fri, 03 Jan 2025 07:37:13 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/tackling-burnout/"><guid isPermaLink="false">2d20e587-da12-4c30-a695-c7d5d5a721d5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/tackling-burnout/</link><title>Tackling Burnout in the High-Stakes World of Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-burnout-davoine-analyst-burnout-risks03-884x500.jpg' style='float: left' alt=''/&gt;The security industry, often characterized by its stoic guardians and vigilant protectors, now faces a silent but pervasive threat: burnout.</description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/jungle-of-trust/"><guid isPermaLink="false">32401a47-1aa6-40f1-92f9-02eacba7d892</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/jungle-of-trust/</link><title>In the Jungle of Trust, Resilience Begins with You</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-burnout-mckenna-jungles-of-trust-884x500-v1.jpg' style='float: left' alt=''/&gt;Resilient systems are trusted systems, and resilient leaders are trusted leaders. </description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/fast-facts-polycrisis/"><guid isPermaLink="false">7d48bace-7784-4f8b-9315-d20b5dbd8cb9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/fast-facts-polycrisis/</link><title>Fast Facts: How Polycrisis Affects Mental Health</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0125-sm-fast-facts-burnout.gif' style='float: left' alt=''/&gt;Polycrisis stressors can be economic, societal, geopolitical, climate-related, or even security incidents, and the combination of stressors can produce a perfect storm for burnout.</description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/editors-note/"><guid isPermaLink="false">a3929f48-6903-43cb-ba88-fcde97a018b9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/editors-note/</link><title>Editor’s Note: Recalibrating Your Resilience</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/1224-meyer-mental-health-and-burnout-editors-note.jpg' style='float: left' alt=''/&gt;Researchers dive into rabbit holes of gruesome, vicious, and manipulative online content to uncover the nature of contemporary extremism. It has long-term effects on their wellbeing. </description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/surveillance-review/"><guid isPermaLink="false">d6fadf0d-9f76-4027-9304-cbd4ee7833b3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/surveillance-review/</link><title>How Surveillance Review Affects Your Brain </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0124-sm-burnout-concannon.gif' style='float: left' alt=''/&gt;Organizations and managers can leverage science to keep security professionals who regularly review video evidence and surveillance footage safe and resilient.</description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/polycrisis-behavioral-consequences/"><guid isPermaLink="false">c6eab5eb-7709-4e60-afe7-6b67733d0036</guid><link>http://www.asisonline.org/security-management-magazine/articles/2025/01/burnout/polycrisis-behavioral-consequences/</link><title>A Flock of Black Swans: Preparing for the Behavioral Consequences of a Polycrisis</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2025/january/0124-crimando-burnout-effect-of-permacrisis.jpg' style='float: left' alt=''/&gt;Security practitioners are living in a truly dizzying operating environment, with simultaneous, overlapping crises putting their operational and personal resilience at risk.  </description><pubDate>Wed, 01 Jan 2025 08:39:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/influence-philosophy/"><guid isPermaLink="false">adec2ebf-a999-4168-9773-8b51ef346439</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/influence-philosophy/</link><title>The Philosophy Behind Successful Influence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-cso-horizons-philosophy.jpg' style='float: left' alt=''/&gt;If you find that your attempts to influence other business leaders fall flat, reevaluate your approach in three persuasive areas: ethos, logos, and pathos. </description><pubDate>Mon, 30 Dec 2024 14:06:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/coaching-critical-thinking/"><guid isPermaLink="false">0d815470-66f7-4e25-b7a9-17e72cd3610c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/coaching-critical-thinking/</link><title>How to Coach Employees—and Yourself—on Critical Thinking </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-cso-horizons-coach-employees.jpg' style='float: left' alt=''/&gt;By collating information effectively, corporate leaders can bridge gaps between individual contributors’ knowledge and produce a more holistic recommendation to enable the business.</description><pubDate>Thu, 26 Dec 2024 18:18:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/travel-risk-concerns/"><guid isPermaLink="false">f8aa42f6-53d2-48a7-9c7c-8cc27f4a12fa</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/travel-risk-concerns/</link><title>The Kidnapping and Killing of Two Chinese Executives in the Philippines Spurs Heightened Travel Risk Concerns</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-travel-risk-concerns-04.jpg' style='float: left' alt=''/&gt;Two Chinese medical device company executives were abducted and later murdered in the Philippines in June 2024, sending shockwaves through the Chinese business community and straining diplomatic relations between the two countries.</description><pubDate>Thu, 19 Dec 2024 09:37:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/asis-news/"><guid isPermaLink="false">30760a72-7ad8-4187-9140-1418cc6ab864</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/asis-news/</link><title>ASIS News: Upcoming Events and Member Renewals</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/25-events-leadership-exchange-884x500.jpg' style='float: left' alt=''/&gt;Leadership Exchange 2025 will feature 90-minute sessions each day, designed to help ASIS volunteers grow as leaders, connect with peers, and learn more about the ASIS support network. </description><pubDate>Thu, 19 Dec 2024 09:37:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/fast-facts/"><guid isPermaLink="false">5bc976d3-8301-49e9-acb6-7a1306bf1907</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/fast-facts/</link><title>Fast Facts: Red, Blue, or Purple Team Exercises?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-meyer-fast-facts-red-blue-or-purple-team-exercises.gif' style='float: left' alt=''/&gt;Do you know the participants in a red teaming exercise and what roles they play? </description><pubDate>Mon, 16 Dec 2024 07:33:37 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/industry-news/"><guid isPermaLink="false">593f36a6-030f-4549-b93d-83d955fef653</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/industry-news/</link><title>Industry News: ALPR Cameras Help New Orleans Secure Historic Districts</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-industry-news.jpg' style='float: left' alt=''/&gt;</description><pubDate>Tue, 17 Dec 2024 11:08:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/hybrid-architecture/"><guid isPermaLink="false">5911392f-6dec-4560-ad49-1c4359eaebd0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/hybrid-architecture/</link><title>The Importance of Cybersecurity in the Shift to Hybrid Architecture</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-pen-tests-dorris-hybrid-architecture03-884x500.jpg' style='float: left' alt=''/&gt;Now that the scope of data that security systems capture has broadened, so have the potential vulnerabilities.</description><pubDate>Mon, 16 Dec 2024 07:33:37 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/lock-design-rules/"><guid isPermaLink="false">906d4d04-02c7-446a-b5e6-25ab81390990</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/lock-design-rules/</link><title>11 Design Rules for More Secure Locks </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-pen-test-tobias-01.gif' style='float: left' alt=''/&gt;Locks are integral to any access control system but are often vulnerable to different attack methods.</description><pubDate>Mon, 16 Dec 2024 07:33:37 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/cross-silo-red-team-findings/"><guid isPermaLink="false">4987e9a5-1617-44c2-99da-4f7ccc453f0a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/red-team/cross-silo-red-team-findings/</link><title>The Blame Game: Tensions Rise When Red Team Findings Cross Silos</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-sm-pen-test-meyer-04.gif' style='float: left' alt=''/&gt;Although vulnerabilities and threats blend cyber and physical security, siloed security teams often cast blame rather than find solutions after a red teaming exercise. </description><pubDate>Mon, 16 Dec 2024 07:33:37 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/robin-hood-effect/"><guid isPermaLink="false">f6c788fb-84b5-4435-b3d6-524aac894379</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/robin-hood-effect/</link><title>Copycat, Contagion, and the Robin Hood Effect as Risk Enhancers in Targeted Violence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-meyer-copy-cat-crime.jpg' style='float: left' alt=''/&gt;After the killing of UnitedHealthcare CEO Brian Thompson, threat assessment and security professionals should be concerned about the possibility of copycats, contagion, and the Robin Hood Effect.</description><pubDate>Thu, 05 Dec 2024 16:54:35 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/legal-report/"><guid isPermaLink="false">03d81ec6-c78f-49ae-93df-1dbb167be3c0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/legal-report/</link><title>Legal Report: An 18-Year-Old Pleads Guilty to Making More than 375 Swatting Calls, Faces Up To 20 Years in Prison</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/24-sm-legal-report-884x500-12.jpg' style='float: left' alt=''/&gt;Plus, Paraguay enacts law to allow further audits of NGOs, and New York City enacts a hotel safety law for all hotels operating within the city.</description><pubDate>Mon, 09 Dec 2024 11:34:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/data-driven-video-technology-enhances-medevac-helicopters-safety/"><guid isPermaLink="false">32d79ffb-b480-465b-b34b-247ceb2831aa</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/data-driven-video-technology-enhances-medevac-helicopters-safety/</link><title>Data-Driven Video Technology Enhances Medevac Helicopters' Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/december/1224-sectech-johnson-transportation-medevac-helicopter-safety.jpg' style='float: left' alt=''/&gt;Medevac operations play a crucial role in emergency medicine. But they also come with inherent risks that jeopardize the safety of patients, medical staff, and flight crews. New technology may help mitigate some of these risks.</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/transportation-ratings-what-they-mean-for-security-cameras/"><guid isPermaLink="false">73eb8f89-3fdf-45c7-8c52-b3722b871fcc</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/transportation-ratings-what-they-mean-for-security-cameras/</link><title>Transportation Ratings: What They Mean for Security Cameras and IoT Devices</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/december/1224-sectech-lowenstein-884x500.gif' style='float: left' alt=''/&gt;Railway environments are subject to constant vibrations, high humidity, extreme temperatures, and fire risks. Video cameras should meet these five standards to effectively operate in these areas.</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/leveraging-under-vehicle-inspection-tech/"><guid isPermaLink="false">420ee73b-35b0-4011-b782-06ce4c36e850</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/leveraging-under-vehicle-inspection-tech/</link><title>Beneath the Surface: Leveraging Under-Vehicle Inspection Tech to Detect Hidden Dangers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/december/1224-sm-sectech-powell-03.gif' style='float: left' alt=''/&gt;Threats presented by vehicle-borne attacks necessitate the need for a better vehicle screening solution.</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/12/terry-owens-certification-profile/"><guid isPermaLink="false">0259d0b5-5f48-494f-8ba0-58b91a37679c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/12/terry-owens-certification-profile/</link><title>Certification Profile: Terry Owens, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/december/1224-terry-owens-certification-profile.jpg' style='float: left' alt=''/&gt;Studying for and earning his CPP certification helped Terry Owens broaden his horizons as a security professional and improve his knowledge, skill set, and perspective. </description><pubDate>Wed, 04 Dec 2024 08:47:12 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/maritime-industry-considers-cybersecurity-be-greatest-risk/"><guid isPermaLink="false">817bb428-0992-4fc7-ba94-2c568732f45f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/maritime-industry-considers-cybersecurity-be-greatest-risk/</link><title>All Hands on Deck: Maritime Industry Considers Cybersecurity to Be Greatest Risk</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/december/1224-gates-transportation-maritime-cybersecurity-01.jpg' style='float: left' alt=''/&gt;A new survey of the maritime industry finds that seven in 10 professionals say their leaders consider “cybersecurity to be the greatest risk their organization faces.”</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/how-a-proposed-tsa-regulation-might-change-rail-security/"><guid isPermaLink="false">111f7d5e-8dd9-41bd-bf9f-8af8b27bce74</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/how-a-proposed-tsa-regulation-might-change-rail-security/</link><title>How a Proposed TSA Regulation Might Change Rail Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/december/1224-sectech-cover-story-884x500.gif' style='float: left' alt=''/&gt;The U.S. Transportation Security Administration (TSA) issued a Notice of Proposed Rulemaking in November 2024 that would change the way some freight and passenger rail systems conduct their security practices. We spoke to stakeholders to understand why the rule is necessary and what its ramifications might be for the industry.</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/proposed-tsa-cyber-regulations/"><guid isPermaLink="false">1b950a09-4d91-4056-8f98-cccf4d7d1640</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/december/proposed-tsa-cyber-regulations/</link><title>Cyber Regulations: What a Proposed TSA Rule Means for the Transportation Industry</title><description>The Transportation Security Administration (TSA) issued a Notice of Proposed Rulemaking in November 2024 to create new cybersecurity regulatory requirements for the transportation sector. This video looks at the new, critical elements.</description><pubDate>Mon, 02 Dec 2024 08:13:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/asis-news/"><guid isPermaLink="false">04ef26bb-2dfa-4124-9b41-a7299b72ef35</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/asis-news/</link><title>ASIS News: New Leadership and Partnerships </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-asis-news-apac-1.jpg' style='float: left' alt=''/&gt;In addition to the two regional conferences this month, ASIS announced new regional leadership for both the Asia Pacific and Latin American and Caribbean regions. </description><pubDate>Wed, 27 Nov 2024 09:51:19 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/loan-fraud-detection/"><guid isPermaLink="false">21326f31-23dc-4a73-8bf4-7ee45f5945e0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/loan-fraud-detection/</link><title>Human or AI? Detecting Loan Fraud After Fed Cuts</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-jacoby-white-collar-crime-synthetic-fraud.gif' style='float: left' alt=''/&gt;AI is making it more difficult to separate real people from fake ones. This poses significant risk for financial institutions when fraudsters apply for credit or loans that are subsequently funded. </description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/private-investigator-career/"><guid isPermaLink="false">7baff340-fdaa-4889-bbd2-8430f8c39863</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/private-investigator-career/</link><title>Q&amp;A: Takeaways from a 26-Year Career as a Private Investigator </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-sm-white-collar-crime-sidebar-qa-with-don-aviv04-884x500.jpg' style='float: left' alt=''/&gt;To better understand the world private investigators operate in, we spoke with the head of an investigations firm about building investigators’ skill sets, protecting sources, and following leads. </description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/fraud-investigation-team-roles/"><guid isPermaLink="false">efec0ed7-4313-4e53-a3f0-cd93d355b944</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/fraud-investigation-team-roles/</link><title>6 Roles to Consider for Your Fraud Investigation Team</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-sm-white-collar-crime-sidebar-884x500.jpg' style='float: left' alt=''/&gt;Fraud encompasses a wide range of activities. These six skill sets can help investigation teams understand what happened, why it happened, and how to prevent it in the future.</description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/tipline-elements/"><guid isPermaLink="false">d595c613-c641-411f-a0d3-e4b9c71ea9b1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/tipline-elements/</link><title>Fraud 101: The Elements of an Effective Hotline Program</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-gates-white-collar-crime-effective-hotlines.gif' style='float: left' alt=''/&gt;There is no way to eliminate fraud entirely. But creating effective whistleblower reporting mechanisms is a tried-and-true method to detect and mitigate the scale of fraud.</description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/state-of-occupational-fraud/"><guid isPermaLink="false">aa739aa4-6c63-42e0-bb5f-dde5054ca4be</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/state-of-occupational-fraud/</link><title>What is the State of Occupational Fraud?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-sm-white-collar-crime-infographic-the-state-of-occupational-fraud01.gif' style='float: left' alt=''/&gt;A biannual report from the Association of Certified Fraud Examiners finds that occupational fraudsters caused reported total losses of at least $3.1 billion between January 2022 and September 2023.</description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/fast-facts/"><guid isPermaLink="false">b16a873d-f1f4-44b6-8937-6dd57418349e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/fast-facts/</link><title>Fast Facts: What is Occupational Fraud?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-gates-fraud-fast-facts-what-is-occupational-fraud.gif' style='float: left' alt=''/&gt;A key area of fraud that security practitioners are often involved in investigating is occupational fraud. But what exactly is occupational fraud? How does it differ from other types of fraud?</description><pubDate>Mon, 18 Nov 2024 06:10:34 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/internal-fraud-investigations/"><guid isPermaLink="false">04ecf6bb-e1dc-4185-a37e-0499915324ce</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/white-collar/internal-fraud-investigations/</link><title>From Tiplines to Terminations: How to Handle an Internal Fraud Investigation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/white-collar-crime/1124-sm-white-collar-crime-gates-feature-handling-a-fraud-investigation04-884x500.jpg' style='float: left' alt=''/&gt;Nearly half of all internal fraud investigations are initiated by a report to a tipline. Then, the tough work of investigators begins to determine what happened.</description><pubDate>Mon, 18 Nov 2024 06:06:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/legal-report/"><guid isPermaLink="false">11643a1f-b1e1-4a47-b557-ddfa143ad435</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/legal-report/</link><title>Legal Report: A Michigan Agency Agrees to $13 Million Settlement Concerning Surprise Active Shooter Drill</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-sm-legal-report-884x500-02.gif' style='float: left' alt=''/&gt;After a state-run children’s hospital set off a surprise active shooter drill, staff and patients filed a class action suit against the Michigan Department of Health and Human Services.</description><pubDate>Fri, 15 Nov 2024 08:01:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/industry-news/"><guid isPermaLink="false">88257f8b-cb3b-4880-8b83-6b8cac455123</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/industry-news/</link><title>Industry News: Italian Convention Center Depends on Dallmeier Video Surveillance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-industry-news.jpg' style='float: left' alt=''/&gt;The Veronafiere, a leading Italian exhibition center, relies on Dallmeier’s video security system and cameras to monitor convention and events across its space.</description><pubDate>Fri, 15 Nov 2024 14:00:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/activity-generators/"><guid isPermaLink="false">a15c33f2-3852-416f-8648-cf658488be02</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/activity-generators/</link><title>How to Leverage CPTED Activity Generators on College Campuses </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-sm-cpted-jones-college-campuses.jpg' style='float: left' alt=''/&gt;College campuses are busy places. Security teams can thoughtfully apply CPTED practices to foster activities that promote safety and community buy-in. </description><pubDate>Mon, 11 Nov 2024 06:18:07 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/global-conflict-crime-prevention/"><guid isPermaLink="false">263f2263-a886-4ac6-8e9e-724dec259e6a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/global-conflict-crime-prevention/</link><title>The Impact of Global Conflicts on Local Crime Prevention Measures </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-szewczuk-cpted-global-conflicts-local-crime.jpg' style='float: left' alt=''/&gt;Societal responses to global conflicts can disproportionately affect local crime and civil unrest. CPTED principles can help reinforce the lines between public and private spaces. </description><pubDate>Mon, 11 Nov 2024 06:17:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/landscaping-cpted/"><guid isPermaLink="false">d5b762bb-6959-42b9-828a-7a262a9ad6a5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/landscaping-cpted/</link><title>In Bloom: How Greenery and Landscaping Work with CPTED</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-mosqueda-cpted-greenery-landscaping.jpg' style='float: left' alt=''/&gt;CPTED takes nature and combines it with nurture, helping create areas that discourage criminal activity and welcome stakeholders. </description><pubDate>Mon, 11 Nov 2024 06:17:44 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/hostile-vegetation/"><guid isPermaLink="false">d55432ec-1c37-4f92-a1ad-462344feb004</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/hostile-vegetation/</link><title>Hostile Vegetation: 8 Plants to Use in Your CPTED-Friendly Flower Bed</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-sm-cpted-gardening-guide-01.jpg' style='float: left' alt=''/&gt;A rose by any other name can still deter opportunistic criminals with its thorns.</description><pubDate>Mon, 11 Nov 2024 06:18:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/fast-facts/"><guid isPermaLink="false">4a1824d9-0cb2-47c7-b51d-906a7698ef09</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/fast-facts/</link><title>Fast Facts: A Landscape Designer’s Checklist for CPTED Success</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-mosqueda-fast-facts-checklist-for-cpted-success.gif' style='float: left' alt=''/&gt;If you’re working with a landscape architect or designer, keep these items in mind when incorporating CPTED elements.</description><pubDate>Mon, 11 Nov 2024 06:18:33 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/cpted-legislation-florida/"><guid isPermaLink="false">4fd31063-731b-4c95-b35c-b07350dbeeb2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/cpted/cpted-legislation-florida/</link><title>New Legislation Adds Security and CPTED Requirements for Florida Property Owners</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-sm-cpted-sidebar-mosqueda-florida-multitenant-property-law01-884x500.gif' style='float: left' alt=''/&gt;Florida property owners have until the beginning of 2025 to comply with CPTED requirements.</description><pubDate>Mon, 11 Nov 2024 06:18:45 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/certification-profile/"><guid isPermaLink="false">0b64b73d-997d-4064-8221-8321da104adb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/certification-profile/</link><title>Certification Profile: Gideon O. Soyemi, CPP, PCI</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-gideon-soyemi-certification-profile.jpg' style='float: left' alt=''/&gt;Gideon O. Soyemi, CPP, PCI, says taking advantage of all the educational resources available has kept him on top of industry changes and best practices, allowing him to continue to develop professionally. </description><pubDate>Thu, 07 Nov 2024 08:39:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/fast-facts/"><guid isPermaLink="false">3815c410-9c7d-48cf-a33f-18107753f70a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/fast-facts/</link><title>Fast Facts: Body Language That Undermines De-Escalation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-sm-deescalation-fast-facts-480x270-v1.gif' style='float: left' alt=''/&gt;If the message a person’s body language sends clashes with their verbal statements, it creates a sense of distrust, suspicion, and unwillingness to cooperate.</description><pubDate>Fri, 01 Nov 2024 07:47:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/deescalation-communication/"><guid isPermaLink="false">9015fbb5-8fb7-4bf5-a887-659536f9e0b1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/deescalation-communication/</link><title>Breaking Through to Better Communication During De-Escalation </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-meyer-feature-deescalation-03.gif' style='float: left' alt=''/&gt;Human beings are dynamic—our moods, behaviors, and states of mind can shift rapidly depending on a myriad of factors. So, responding to humans in crisis requires agility and flexibility, as well as a healthy dose of self-awareness.</description><pubDate>Fri, 01 Nov 2024 07:47:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/target-tehran-book-review/"><guid isPermaLink="false">d7686c8c-4fc8-4a6e-9622-4c55588b3d69</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/target-tehran-book-review/</link><title>Book Review: Target Tehran</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-book-review-target-tehran-featured-image.jpg' style='float: left' alt=''/&gt;In this fascinating read, the authors detail how Mossad, Israel’s national intelligence agency, has made it a priority to prevent Iran from becoming a nuclear power. </description><pubDate>Wed, 06 Nov 2024 08:34:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/editors-note-metacognition/"><guid isPermaLink="false">77af6d22-f25f-4d8c-9bb6-ce5932df980a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/editors-note-metacognition/</link><title>Editor’s Note: Correct Course with Metacognition </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2024/november/1124-sm-editors-note-november-2024-de-escalation-and-conflict-intervention-topic02-884x500.jpg' style='float: left' alt=''/&gt;Considering how you react and think during stressful situations can help you better de-escalate situations. </description><pubDate>Fri, 01 Nov 2024 07:47:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/broset-violence-checklist/"><guid isPermaLink="false">3ca36054-fc88-4f85-97e6-982b6bc1eabf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/broset-violence-checklist/</link><title>6 Behaviors That Indicate Heightened Agitation and Risk of Violence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/1124-meyer-infographic-deescalation-healthcare-checklist-01.gif' style='float: left' alt=''/&gt;The Brøset Violence Checklist helps healthcare professionals assess patients’ short-term potential to commit violence. </description><pubDate>Fri, 01 Nov 2024 07:47:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/emotional-dysregulation/"><guid isPermaLink="false">6abf3f30-acc5-44b2-b14e-2ec21b7380da</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/11/deescalation/emotional-dysregulation/</link><title>How Dysregulation Affects De-Escalation </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/november/sm-1124-deescalation-sidebar-how-to-regulate-your-emotions-during-incidents-01.gif' style='float: left' alt=''/&gt;If crisis responders are under chronic stress, their response to the incident could make matters significantly worse.</description><pubDate>Fri, 01 Nov 2024 07:47:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/industry-news/"><guid isPermaLink="false">2356155d-3c8b-4149-8ad5-bbefebbdbbb4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/industry-news/</link><title>Industry News: Securing Finland’s Prisons with Demarcated Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024---industry-news---finland.jpg' style='float: left' alt=''/&gt;Idesco has been supplying Finland’s correctional sites with effective access control solutions for roughly 30 years. </description><pubDate>Fri, 25 Oct 2024 09:33:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/culture-informed-training/"><guid isPermaLink="false">72b9abbf-33a4-455d-9b45-53899a9987a5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/culture-informed-training/</link><title>What Works? Culture-Informed Security Training Tips</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-culture-listicle-meyer-culture-informed-training-tips-884x500.jpg' style='float: left' alt=''/&gt;Check in with security leaders and researchers into how leveraging cultural awareness and knowing your audience can improve security awareness training. </description><pubDate>Mon, 21 Oct 2024 08:15:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/workplace-safety-training/"><guid isPermaLink="false">1527fa74-03a0-4489-b9c9-33bb5c84d56f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/workplace-safety-training/</link><title>Is Your Company Culture Inhibiting Effective Workplace Safety Training?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-culture-felix-nader02-884x500.gif' style='float: left' alt=''/&gt;Instead of relying on war stories, generic guidance, or compliance-centric training, organizations can leverage adult learning principles to ensure security training is more engaging and effective. </description><pubDate>Mon, 21 Oct 2024 08:15:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/asis-news/"><guid isPermaLink="false">8fbbf329-1f75-40ba-9723-f878dbb4b3cd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/asis-news/</link><title>ASIS News: Get the Most Out of Membership </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-asis-news.jpg' style='float: left' alt=''/&gt;With the calendar year coming to a close, it’s a good time to make sure you renew your ASIS membership! Find out how to check your membership status here. </description><pubDate>Thu, 24 Oct 2024 10:24:18 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/fast-facts/"><guid isPermaLink="false">6abf6aca-91ab-4753-870a-cd45b7ca443d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/fast-facts/</link><title>Fast Facts: Is Your Security Training Based on Human Risk Management?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-culture-fast-facts-480x270-v2.gif' style='float: left' alt=''/&gt;Applying a human risk management approach to security awareness, behavior, and culture can increase buy-in, improve long-term lesson retention, and boost workplace culture around security.</description><pubDate>Mon, 21 Oct 2024 08:15:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/new-technology-security-culture/"><guid isPermaLink="false">ccb863cf-fa6b-4ea2-98cc-fea6b215d709</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/new-technology-security-culture/</link><title>7 Ways to Educate Employees on New Security Technology and Foster Security Culture</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-measom-security-culture-technology-adoption.jpg' style='float: left' alt=''/&gt;Incorporating safety into your organizational culture requires a continuous dedication to educating your personnel on what is paramount to your operation. </description><pubDate>Mon, 21 Oct 2024 08:15:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/cultura-diferenciador/"><guid isPermaLink="false">741ed349-4bcb-4a65-898c-7d6e67109ddb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/cultura-diferenciador/</link><title>Cómo Influir en la Cultura es el Diferenciador para los Líderes de Seguridad</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/sm-1024-culture-john-rodriguez-03.gif' style='float: left' alt=''/&gt;El arte de la conexión humana es fundamental para un programa de seguridad integral que los líderes empresariales adoptarán y considerarán invaluable para el éxito de su negocio.</description><pubDate>Mon, 21 Oct 2024 08:15:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/culture-security-differentiator/"><guid isPermaLink="false">95e15159-0edd-434f-85b3-649b157298e3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/culture/culture-security-differentiator/</link><title>How Influencing Culture is the Differentiator for Security Leaders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/sm-1024-culture-john-rodriguez-01.gif' style='float: left' alt=''/&gt;The art of human connection is foundational to a holistic security program that business leaders will embrace and consider invaluable to their business success. </description><pubDate>Mon, 21 Oct 2024 08:15:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/legal-report/"><guid isPermaLink="false">7564a3f8-1bea-46e9-ac28-f5537f99e28e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/legal-report/</link><title>Legal Report: Canadian Court Finds Border Searches of Electronic Devices Are Unconstitutional</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-legal-report.gif' style='float: left' alt=''/&gt;Also in this month’s legal roundup, South Korea calls for greater climate change efforts, and a former CIA officer receives prison sentence for the sexual assault of dozens of women.</description><pubDate>Thu, 17 Oct 2024 11:31:54 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/fast-facts/"><guid isPermaLink="false">cb942740-f7fe-403e-8c03-29bf66c211ce</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/fast-facts/</link><title>Fast Facts: Who and What is at Risk in Politically Charged Environments?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-fast-facts-elections-01.jpg' style='float: left' alt=''/&gt;It’s not just politicians in the crosshairs. Violent actors motivated by a polarized political landscape have cast a wider net, aiming at targets that normally lie outside the limelight.</description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/polling-place-security/"><guid isPermaLink="false">8515357d-c4f4-4339-a27e-ca9b71363966</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/polling-place-security/</link><title>Q&amp;A: Analyze, Accept, and Adapt to Polling Place Security Risks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-elections-sidebar-mosqueda-884x500.jpg' style='float: left' alt=''/&gt;Schools, places of worship, and other soft target facilities often pull double duty as polling places during elections. </description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/foreign-influence-attacks/"><guid isPermaLink="false">302c56d2-652e-4c8b-806b-aa25a957fb5b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/foreign-influence-attacks/</link><title>How Malicious Actors Carry Out Foreign Influence Attacks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-elections-listicle-884x500.jpg' style='float: left' alt=''/&gt;Hostile foreign influence operations targeting democratic elections leverage various tactics and techniques.</description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/election-riot-concerns/"><guid isPermaLink="false">983b52d1-8807-48ba-aaa4-d638a22fe7af</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/election-riot-concerns/</link><title>2024 U.S. Elections Spark Concerns About Widespread Riots and Significant Business Disruption </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-elections-blyth-884x500.gif' style='float: left' alt=''/&gt;Under the wrong circumstances, riots can spring up from peaceful demonstrations. Security and crisis management leaders are aware that internal and external factors can exacerbate and accelerate violence, especially surrounding the 2024 U.S. elections.</description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/attorney-judge-threats/"><guid isPermaLink="false">cec5ad2a-7b85-4ad5-b494-b3ac8fde1b43</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/attorney-judge-threats/</link><title>In Polarized Environments, Attorneys and Judges Face a Multitude of Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/sm-1024-elections-main-sinai-01.gif' style='float: left' alt=''/&gt;Even in a democratic society, judicial environments and interactions can become volatile, strained, and polarizing. Sometimes, they also become violent and place attorneys and judges at risk.</description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/politically-charged-threats/"><guid isPermaLink="false">26c09c1f-a960-49fe-9890-5ca663088e7c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/election-security/politically-charged-threats/</link><title>Mitigating Threats in a Politically Charged Landscape</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-sm-elections-sidebar-porter01-884x500.gif' style='float: left' alt=''/&gt;Building a proactive plan to deal with threats, organizations can position themselves to respond swiftly and effectively, minimizing impacts on operations, employees, and assets.</description><pubDate>Mon, 14 Oct 2024 08:55:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/certification-profile/"><guid isPermaLink="false">a386a9b5-424e-40ed-9cf6-f3f5ee8b298e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/certification-profile/</link><title>Certification Profile: Dimitar Atanasov, APP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-dimitar-atanasov-certification-profile.jpg' style='float: left' alt=''/&gt;Dimitar Atanasov, APP, is passionate about security because it provides an avenue for him to protect those around him. </description><pubDate>Wed, 09 Oct 2024 08:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/fast-facts-what-is-open-source-intelligence/"><guid isPermaLink="false">84ebf677-c831-4a6c-babd-4ac251f17a38</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/fast-facts-what-is-open-source-intelligence/</link><title> Fast Facts: What is Open-Source Intelligence?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/1024-gates-sectech-fast-facts-osint.gif' style='float: left' alt=''/&gt;Open-Source intelligence (OSINT) is one of the six intelligence disciplines used to gather intelligence. We take a look at what makes OSINT unique and why security practitioners are using it.</description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/the-six-steps-in-the-intelligence-cycle/"><guid isPermaLink="false">d3ce6ddc-28aa-41f3-a2e6-ed31dc06e8aa</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/the-six-steps-in-the-intelligence-cycle/</link><title>The Six Steps in the Intelligence Cycle</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/0924-sectec-infographic-intel-cycle-884x500.gif' style='float: left' alt=''/&gt;Intelligence is typically gathered by using a six-step Intelligence Cycle.</description><pubDate>Tue, 01 Oct 2024 12:30:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/tempo-tempest-facing-emergency-management/"><guid isPermaLink="false">e251bd9b-6a8a-4b28-872e-d173ad6c240f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/tempo-tempest-facing-emergency-management/</link><title>The Tempo Tempest Facing Emergency Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0924-sectech-henkey-884x500.jpg' style='float: left' alt=''/&gt;The greatest emerging problem facing homeland security and emergency management professionals is not any single challenge but rather the speed of emerging challenges.</description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/integrating-evolving-technology-intelligence/"><guid isPermaLink="false">31c106b1-98b5-40e3-8836-2cc73d2f8693</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/integrating-evolving-technology-intelligence/</link><title>Integrating Evolving Technology for Intelligence to Counter Modern Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/0924-sectech-maguire-02.jpg' style='float: left' alt=''/&gt;Integrating traditional security intelligence tradecraft with newer techniques is essential for preventing and mitigating attacks that can now be executed using hybrid kinetic and non-kinetic tactics.</description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/10/asis-news-celebrating-wins/"><guid isPermaLink="false">7ea1829c-6af7-42c4-b0a2-3058710dded0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/10/asis-news-celebrating-wins/</link><title>ASIS News: Celebrating Our Wins and Looking Ahead </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/1024-asis-news-02.jpg' style='float: left' alt=''/&gt;Don’t miss your opportunity to be a part of GSX 2025! The event will take place from 29 September to 1 October 2025 in New Orleans, Louisiana. </description><pubDate>Mon, 07 Oct 2024 07:58:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/how-ai-may-change-the-way-security-teams-use-osint/"><guid isPermaLink="false">98c0c426-eca6-42b5-8824-1e62bc35837d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/how-ai-may-change-the-way-security-teams-use-osint/</link><title>How AI May Change the Way Security Teams Use OSINT</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/1024-sectech-joelson-osint-ai-security-teams.jpg' style='float: left' alt=''/&gt;Security practitioners have increasingly turned to monitoring Open Source Intelligence (OSINT) to detect and prevent attacks. Artificial intelligence, however, may be on the cusp of changing OSINT as a discipline.</description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/countering-the-china-threat-in-the-year-of-the-dragon/"><guid isPermaLink="false">d2498961-258d-449e-9d7e-6d81fbfe4bd2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/countering-the-china-threat-in-the-year-of-the-dragon/</link><title>Countering the China Threat in the Year of the Dragon</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/1024-sectech-wicker-babel-street-884x500.png' style='float: left' alt=''/&gt;Decluttering and operationalizing the information necessary for foreign threat analysis requires access to the latest tools, technologies, and best practices.</description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/best-practices-for-minimizing-ot-threats/"><guid isPermaLink="false">790decba-0408-49d5-8db8-dc47feb90d18</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/best-practices-for-minimizing-ot-threats/</link><title>Best Practices for Minimizing OT Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/1024-sectech-armexa-ot-threats-884x500.png' style='float: left' alt=''/&gt;It is important to identify the realistic threats to OT systems and the pathways those threats could exploit that will cause the greatest damage. This is where threat intelligence comes in. </description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/building-a-team-of-teams-for-unified-threat-intelligence/"><guid isPermaLink="false">5c58af98-8bf7-43a3-bf8e-c20159119a80</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/building-a-team-of-teams-for-unified-threat-intelligence/</link><title>Building a ‘Team of Teams’ for Unified Threat Intelligence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/october/1024-sectech-borene-flashpoint-884x500.jpg' style='float: left' alt=''/&gt;Today’s threat landscape demands a unified approach to threat intelligence—one that fosters cross-functional collaboration and integrates information for various domains to effectively counter complex, multifaceted threats. </description><pubDate>Tue, 01 Oct 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/why-protecting-glass-is-of-utmost-importance-in-building-perimeter-security/"><guid isPermaLink="false">c2479336-811f-4d8e-bca2-f4fffb4501f0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/october/why-protecting-glass-is-of-utmost-importance-in-building-perimeter-security/</link><title> Bend, Don’t Break.</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/october/ngs.jpg' style='float: left' alt=''/&gt;Why Protecting Glass is of Utmost Importance in Building Perimeter Security </description><pubDate>Mon, 30 Sep 2024 08:44:31 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/james-mehta/"><guid isPermaLink="false">1987d514-1774-4600-adda-de928ac80751</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/james-mehta/</link><title>A CSO Career Change: James Mehta</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-meyer-career-transitions-cso-perspectives-mehta.jpg' style='float: left' alt=''/&gt;Most public service skills tend to translate well to the private sector since they mirror the skills desired in employees: dedicated work ethics, clear and timely communication, reliability, and integrity, says James Mehta, CSO for Acuity International, LLC. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/scott-wolford/"><guid isPermaLink="false">00d09371-2dbd-4a41-bc07-6d700206077e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/scott-wolford/</link><title>A CSO Career Change: Scott Wolford, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-meyer-career-transitions-cso-perspectives-wolford.jpg' style='float: left' alt=''/&gt;The skills Scott Wolford, CPP, developed as a state trooper were valuable to corporate America, so after an injury forced him to retire from the force, he started expanding his horizons into private security.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/atm-crime-risks/"><guid isPermaLink="false">556a9c62-f9b7-49b7-a516-e6b8f2dd7f52</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/atm-crime-risks/</link><title>Transaction Denied: How to Mitigate ATM Crime Risks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-gates-bank-robberies-atm-crime-risks.jpg' style='float: left' alt=''/&gt;Following an uptick in physical and logical attacks on ATMs, security practitioners and the vendor community are hardening machines against assault.</description><pubDate>Mon, 16 Sep 2024 08:24:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/anders-noyes/"><guid isPermaLink="false">b24cf334-f21f-46cf-9dea-2f39ef308d1a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/anders-noyes/</link><title>A CSO Career Change: Anders Noyes, CPP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-meyer-career-transitions-cso-perspectives-noyes.jpg' style='float: left' alt=''/&gt;When moving from law enforcement to private security management, Anders Noyes, CPP, had to learn how to influence others by linking their work and decisions to the success of the organization. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/editors-note/"><guid isPermaLink="false">98f0f73d-b6fb-4003-97a7-a201cc7ac6cf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/editors-note/</link><title>Editor’s Note: Beyond the Job, Who Are You?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-editors-note-career-transitions-from-public-to-private01-884x500.gif' style='float: left' alt=''/&gt;Military, law enforcement, and private security professionals often over-identify with the job. While professional pride is admirable, letting it take over your personality can be risky.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/cross-sector-culture-differences-will-knehr/"><guid isPermaLink="false">4094f60c-5a56-4a27-a70a-931b81967a62</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/cross-sector-culture-differences-will-knehr/</link><title>How to Cope with Cross-Sector Culture Differences</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-knehr-qa-career-transitions-i-pro-will-knehr.jpg' style='float: left' alt=''/&gt;Will Knehr built a successful career in the military as a cryptologist before transitioning into private sector cybersecurity. Here’s what he learned.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/1930s-robbery-investigations/"><guid isPermaLink="false">d819375d-5238-4c3d-8cc5-34f43379be7f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/1930s-robbery-investigations/</link><title>How the 1930s Changed Bank Robbery Investigations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0925-gates-how-the-1930s-changed-bank-robbery-investigations-preview.jpg' style='float: left' alt=''/&gt;At the beginning of the 20th Century, bank robbery in the United States was a state-level crime. That all changed when a slew of high-profile robbers—from John Dillinger to Bonnie and Clyde—began targeting banks.</description><pubDate>Mon, 16 Sep 2024 08:24:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/industry-news/"><guid isPermaLink="false">0fb5c082-7b11-4f0b-a6a8-ec40fe22364e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/industry-news/</link><title>Industry News: Montenegro Luxury Casino Boosts High-Definition Surveillance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-industry-news.jpg' style='float: left' alt=''/&gt;A luxury casino and hotel resort in Montenegro opted for a new end-to-end video solution to support surveillance of gaming areas.</description><pubDate>Thu, 19 Sep 2024 09:00:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/historical-heists/"><guid isPermaLink="false">700823e9-86c2-4c78-ad1b-9f5cef2fb5db</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/historical-heists/</link><title>How to Rob a Bank: 7 Major Heists from History </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-banks-listicle-7-heists-from-history01-884x500.jpg' style='float: left' alt=''/&gt;Tunnels. Kidnapping. Explosives. And a Richard Nixon connection. These seven bank crimes from history show the lengths some criminals are willing to go to achieve the perfect heist.</description><pubDate>Mon, 16 Sep 2024 08:24:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/centralized-secaas/"><guid isPermaLink="false">5c9b0042-41b4-4eb2-8235-0663cff90447</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/centralized-secaas/</link><title>A Canadian Retailer Supports its Cyber Response Team with a Centralized Security-as-a-Service Solution</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-mosqueda-socs-case-study.jpg' style='float: left' alt=''/&gt;When a technology and eCommerce team found they needed a centralized solution to help handle numerous alerts and investigations, the solution they found provided monitoring, filtering, and analysis.  </description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/create-an-effective-soc/"><guid isPermaLink="false">007fc60a-d32a-4e22-87e4-b30af9a7d186</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/create-an-effective-soc/</link><title>How to Create and Maintain an Effective SOC</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-mosqueda-socs-main-article.jpg' style='float: left' alt=''/&gt;When you’re considering whether your organization needs a SOC, here’s a handy guideline to keep in mind for a SOC that not only has the right equipment, but also the best support for your team.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/legal-report/"><guid isPermaLink="false">56776178-5077-4c93-b523-07fbfe6ce878</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/legal-report/</link><title>Legal Report: Australia Establishes a Right to Disconnect Rule</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/24-sm-legal-report-884x500-10.jpg' style='float: left' alt=''/&gt;Also in this month’s legal roundup, an asphalt company settles a racial discrimination lawsuit, a voting machine tampering case resolves, and New York state establishes new retail security laws.</description><pubDate>Tue, 17 Sep 2024 09:00:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/robbery-data-infographic/"><guid isPermaLink="false">57e5a303-eb60-4e37-af43-3df8ec8211b9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/robbery-data-infographic/</link><title>FBI Data Illustrates Criminal Commonalities in Bank Robberies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-banks-infographic-how-people-robbed-banks-in-2022-01.png' style='float: left' alt=''/&gt;Each year in the United States, the FBI collects data about reported bank crimes—including robberies. Here’s what the 2022 data tells us about the state of this activity and the security solutions in play.</description><pubDate>Mon, 16 Sep 2024 08:24:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/robbery-deterrence/"><guid isPermaLink="false">45cc91b2-02c3-4663-a6ec-a1fec1057be2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/banks/robbery-deterrence/</link><title>Protecting Payday: How Commercial Banks Enhance Robbery Deterrence and Investigations </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-banks-robbery-practices-03.gif' style='float: left' alt=''/&gt;As long as there have been banks, there have been bank robbers. But training, security technology, and enhanced relationships between the private sector and law enforcement can all play a role in deterring opportunistic criminals looking for a quick cash score.</description><pubDate>Mon, 16 Sep 2024 08:24:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/why-ergonomics-matter-in-socs/"><guid isPermaLink="false">3efec721-8bc5-454e-8e7f-589b14eb5cc5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/why-ergonomics-matter-in-socs/</link><title>Why Ergonomics Matter for SOC Design</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-mosqueda-socs-listicle.jpg' style='float: left' alt=''/&gt;When designing or reviewing the function of a workspace, it’s important to consider the space’s functions and then consider them from the perspective of design and ergonomics. This can better support how personnel can operate effectively.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/in-house-virtual-soc/"><guid isPermaLink="false">e7d851bd-01ee-41c7-b114-29a79708fd26</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/in-house-virtual-soc/</link><title>Weighing the Options: In-House Vs. Virtual GSOC</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-newman-socs-in-house-vs-virtual-gsoc.jpg' style='float: left' alt=''/&gt;While a GSOC offers an organization significant security benefits, it’s worth taking the time to consider if an internal GSOC or one provided by a third-party vendor can generate the best results.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/fast-facts-resumes/"><guid isPermaLink="false">c3eb1dd6-c860-456c-b360-e3e45c9c5f95</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/fast-facts-resumes/</link><title>Fast Facts: How to Develop an Effective Private Sector Résumé</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0923-sm-career-transitions-preview.gif' style='float: left' alt=''/&gt;For security professionals changing from the public to the private sector, their résumés often fall flat with recruiters and HR professionals.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/ali-nomais/"><guid isPermaLink="false">3bb5df7e-77ea-4156-b7fe-f3dbd9a51b0c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/ali-nomais/</link><title>Certification Profile: Ali Nomais, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0925-ali-nomais-certifcation-profile.jpg' style='float: left' alt=''/&gt;Motivated by his enriching experience at 2018 ASIS Middle East Conference, Ali Nomais, CPP, PCI, PSP, became involved with the local Dhahran chapter in Saudi Arabia. </description><pubDate>Wed, 11 Sep 2024 13:49:50 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/gsoc-evolution/"><guid isPermaLink="false">d740eff0-0ec9-4b93-be77-c086e699685d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/gsoc-evolution/</link><title>From Reactive to Proactive: Why GSOCs Must Evolve</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-socs-sidebar-buckner05-884x500.jpg' style='float: left' alt=''/&gt;The world and its threats are more dynamic. Global security operations centers need to evolve from responding to an event to having operational capabilities that elevate security.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/modernizing-socs/"><guid isPermaLink="false">4a3b6770-79f9-4d76-9717-1214fad388f3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/modernizing-socs/</link><title>How to Modernize Security Operations Centers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-gsocs-mehta-884x500.gif' style='float: left' alt=''/&gt;Highlighting vulnerabilities, financial risks, and reputational risks can emphasize the need to modernize a GSOC and secure buy-in.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/transitioning-from-police-work-to-business-world/"><guid isPermaLink="false">34afa633-3064-4605-99ad-2b9ee6975e5b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/transitioning-from-police-work-to-business-world/</link><title>A Strategic Approach to Transitioning from Police Work to the Business World</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-flores-bailey-qa-career-transitions-police-to-business.jpg' style='float: left' alt=''/&gt;Before embarking on the transition from police work to the private sector, it's crucial to undertake thorough preparation and self-assessment. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/two-year-map-for-career-transitions/"><guid isPermaLink="false">f1fd352d-92d8-4cd4-9e0d-60ce12806550</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/two-year-map-for-career-transitions/</link><title>Your Two-Year Map for Public to Private Career Transitions </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-career-transitions-kready03-884x500.gif' style='float: left' alt=''/&gt;How you choose to prepare or not to prepare for the end of your public service will become evident on your very first day as a civilian.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/what-to-avoid-soc-planning/"><guid isPermaLink="false">486a9e41-239b-4fbc-bf80-44faa6723234</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/what-to-avoid-soc-planning/</link><title>What to Avoid When Planning a SOC</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-socs-sidebar-thomas03-884x500.jpg' style='float: left' alt=''/&gt;Security operations centers can be a significant business enabler for any organization, but ignoring a few key considerations can hinder their effectiveness.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/fast-facts-socs/"><guid isPermaLink="false">52a26a0c-20ee-4e64-b9c7-bcccf9d122de</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/soc/fast-facts-socs/</link><title>Understanding the Alphabet Soup: What Each Type of SOC Does</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-mosqueda-fast-facts-types-of-socs.gif' style='float: left' alt=''/&gt;Security operations centers (SOCs) are responsible for monitoring, managing, and responding to threats to an organization. But there’s more than one kind.</description><pubDate>Mon, 09 Sep 2024 07:00:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/corporate-vernacular-translated/"><guid isPermaLink="false">b5f97832-0cb3-45e2-9009-9cbeefa9f50e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/corporate-vernacular-translated/</link><title>Corporate Vernacular, Translated</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-listicle-career-transitions-884x500.gif' style='float: left' alt=''/&gt;Just as the military and law enforcement professions have specific jargon, the corporate world has a language of its own, too. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/drive-private-sector-employee-growth/"><guid isPermaLink="false">fea3e75b-7ae6-48b6-937e-53ae4edc71de</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/drive-private-sector-employee-growth/</link><title>4 Ways Leaders Can Drive Private-Sector Employee Growth</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0824-gordon-career-transitions-career-transitions-employee-growth.jpg' style='float: left' alt=''/&gt;Helping employees grow beyond their roles allows them to understand the bigger picture, fostering a deeper connection to the company’s mission and goals.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/public-sector-experience-for-security-technology/"><guid isPermaLink="false">a4336dbc-cfaa-46c7-93a5-c7176e127b33</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/public-sector-experience-for-security-technology/</link><title>Q&amp;A: How Public Sector Experience Can Benefit Security Technology Development</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-career-transitions-lorentsen-qa-on-how-public-sector-experience-benefits-security-tech-development02-884x500.gif' style='float: left' alt=''/&gt;For professionals in law enforcement and the military, transitioning to a career in the private security sector can present opportunities and challenges. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/steps-to-prepare-for-new-position/"><guid isPermaLink="false">069d6c5b-b374-45c5-beca-ff19a1994729</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/steps-to-prepare-for-new-position/</link><title>3 Steps to Prepare for A New Position in Security Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-career-transitions-cloney-01.gif' style='float: left' alt=''/&gt;This three-step approach is an excellent way to get hiring managers and prospective employers to see how you are professionally engaged and active.</description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/adjust-your-expectations/"><guid isPermaLink="false">f68af168-bd31-47ed-bc45-fb04fc2f56c2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/09/career-transition/adjust-your-expectations/</link><title>Adjust Your Expectations: Tough Truths About Cross-Sector Career Transfers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/september/0924-sm-career-transition-meyer-884x500.jpg' style='float: left' alt=''/&gt;People changing sectors will need to reset their career trajectory to account for hiring practices, organizational cultures, and a rapid tempo of work. </description><pubDate>Sun, 01 Sep 2024 09:11:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/asis-news/"><guid isPermaLink="false">78900ccb-c6c1-41a2-9258-1e9d02d29f1f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/asis-news/</link><title>ASIS News: GSX Know Before You Go</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0924-sm-gsx-convention-center.jpg' style='float: left' alt=''/&gt;This year, GSX will feature more than 200 sessions tackling vital issues in the security profession. For an overview of what to expect at GSX, check out our schedule-at-a-glance. </description><pubDate>Thu, 29 Aug 2024 09:08:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/industry-news/"><guid isPermaLink="false">0f611b06-6f83-456e-a738-b960ddfdf901</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/industry-news/</link><title>Industry News: World’s Largest Office Building Streamlines Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-industry-news-diamond-district.jpg' style='float: left' alt=''/&gt;The Surat Diamond Bourse in India selected Gallagher’s security platform to help manage and streamline surveillance and access management. </description><pubDate>Wed, 28 Aug 2024 09:10:37 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/gsx-2024-product-showcase/"><guid isPermaLink="false">340ac568-7bea-471c-a285-543d9460e7a9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/gsx-2024-product-showcase/</link><title>GSX 2024 Product Showcase</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-gsx-product-showcase-2024.jpg' style='float: left' alt=''/&gt;Check out the latest security technologies, services, and solutions to be displayed at GSX 2024 in this special edition product showcase.</description><pubDate>Fri, 23 Aug 2024 08:29:54 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/5-reasons-security-gets-sued/"><guid isPermaLink="false">056a7d3e-ff2d-4dd8-a4e8-6ca61918aedc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/5-reasons-security-gets-sued/</link><title>5 Key Reasons Security Gets Sued</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-sm-infographic-mosqueda-preview.gif' style='float: left' alt=''/&gt;What are the larger reasons why a victim or a victim’s family might file a lawsuit against a security company? </description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/who-owns-sb553-implementation/"><guid isPermaLink="false">c553f76f-f15c-42d9-857d-d72ae0520066</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/who-owns-sb553-implementation/</link><title>Who Owns Implementation of California’s New Workplace Violence Prevention Law?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-marble-why-security-gets-sue-california-sb-553-compliance.jpg' style='float: left' alt=''/&gt;When it comes to compliance with California SB 553—the new mandate for workplace violence prevention programs at companies in the state—security is in the best position to lead the way. </description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/security-company-litigation-protection/"><guid isPermaLink="false">a6f6685e-e3e4-4e73-a57c-af1c3c4a57a3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/security-company-litigation-protection/</link><title>How Security Companies Can Protect Themselves from Litigation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/24-sm-why-security-gets-sued-ziegler-884x500.gif' style='float: left' alt=''/&gt;Security companies aim to protect others, but these organizations—especially those operating in healthcare, entertainment venues, and retail environments—also need to protect themselves from liability. </description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/training-documentation-checklist/"><guid isPermaLink="false">fb12aa25-c49c-4da2-b4b6-0ae430709ccb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/training-documentation-checklist/</link><title>Keep Training Documentation Streamlined with a Checklist</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-miles-listicle-training-documentation-checklist.jpg' style='float: left' alt=''/&gt;The key to all training is documentation. Recording what has been trained and the performance results needs to be a regular part of the program.</description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/security-guard-risk-mitigator/"><guid isPermaLink="false">8bf56791-c38c-4b29-bb14-0e6d37d6880f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/security-guard-risk-mitigator/</link><title>Security Guards: Are They Your Forgotten Risk Mitigator?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-why-security-gets-sued-main-miles03-884x500.gif' style='float: left' alt=''/&gt;Interested in taking your security guard force from a potential liability to force multiplier? Focus on the basics. </description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/mitigating-active-shooter-risk/"><guid isPermaLink="false">be6414db-d83b-480e-9a06-8b0b4a173a36</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/mitigating-active-shooter-risk/</link><title>Mitigating Active Shooter Risks Through Lessons Learned and Existing Standards </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-sm-why-security-gets-sued-sidebar-ranucci03-884x500.gif' style='float: left' alt=''/&gt;Should organizations approach workplace violence the same way they do a potential fire emergency?</description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/fast-facts/"><guid isPermaLink="false">eeb9a1c8-e9b9-42dc-beb4-69030b9a0d58</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/lawsuits/fast-facts/</link><title>Fast Facts: What You Need to Know About California’s Senate Bill 553</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-smosqueda-fast-facts-why-security-gets-sued.gif' style='float: left' alt=''/&gt;If they aren’t already, employers in California need to be ready for the new workplace violence prevention law.</description><pubDate>Mon, 19 Aug 2024 08:14:33 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/presentation-attack-detection/"><guid isPermaLink="false">ea5534d8-f617-499a-beb5-70b0a1c27dc0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/presentation-attack-detection/</link><title>No Spoofing: An Introduction to Presentation Attack Detection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-sm-infographic-biometrics-preview.png' style='float: left' alt=''/&gt;The methods of tricking biometric systems vary widely, from the sophisticated to the simple. Software developers and security leaders need to stay one step ahead of malicious actors’ disguises. </description><pubDate>Mon, 12 Aug 2024 08:18:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/brooke-hopperstad-app/"><guid isPermaLink="false">77ac36b5-f722-41e7-9706-bfc8beafb345</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/brooke-hopperstad-app/</link><title>Certification Profile: Brooke Hopperstad, APP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-hopperstad-certifcation-profile.jpg' style='float: left' alt=''/&gt;Through studying for the Associate Protection Professional (APP) certification, Brooke Hopperstad was able to reaffirm that she was on the right track with her experience thus far, while learning new tools and knowledge that could improve her company’s security posture in the future.</description><pubDate>Thu, 15 Aug 2024 08:40:36 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/fast-facts/"><guid isPermaLink="false">267dab38-6dac-4cb2-abb5-11fd321dbba1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/fast-facts/</link><title>Fast Facts: 4 Primary Types of Biometrics for Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-sm-fast-facts-biometrics-480x270-v1.gif' style='float: left' alt=''/&gt;Hand, eyes, or face—which access control biometric would be the right fit for your application?  </description><pubDate>Mon, 12 Aug 2024 08:18:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/employee-resistance-biometrics/"><guid isPermaLink="false">4b8d071d-8ad9-4384-8f81-fd42673f6077</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/biometrics/employee-resistance-biometrics/</link><title>How to Overcome Employee Resistance When Adopting Biometric Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/0824-biometrics-main-article.jpg' style='float: left' alt=''/&gt;How can security leaders leverage people’s appetite for convenience or a bargain to increase biometric buy-in in the workplace?</description><pubDate>Mon, 12 Aug 2024 08:18:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/08/legal-report/"><guid isPermaLink="false">8c0a26fc-7123-4db6-8f39-eb8fd54df841</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/08/legal-report/</link><title>Legal Report: Meta to Settle Biometric Use Lawsuit for $1.4 Billion</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/august/24-sm-legal-report-884x500-07.jpg' style='float: left' alt=''/&gt;Texas Attorney General Ken Paxton argued that Facebook’s Tag Suggestions feature used Texans’ biometric data without their consent, violating a 2009 state law.  </description><pubDate>Mon, 05 Aug 2024 09:54:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/revolutionizing-security-rise-future-security-robots/"><guid isPermaLink="false">4d3fa47e-b7fa-4f05-a668-9ada32845d06</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/revolutionizing-security-rise-future-security-robots/</link><title>Revolutionizing Security: The Rise and Future of Security Robots</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-plante-rise-future-security-robots.jpg' style='float: left' alt=''/&gt;What exactly do we expect from today's security robots, and what might the future hold for them—and us?</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/securing-today-with-tomorrows-tech/"><guid isPermaLink="false">960ee184-6dc6-4b9a-8c04-0b37e278696d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/securing-today-with-tomorrows-tech/</link><title>Securing Today with Tomorrow’s Tech: The Human and Robotic Security Synergy</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-okerstrom-884x500.gif' style='float: left' alt=''/&gt;It is essential to blend these new security technologies with trained professionals capable of responding to advanced security operations. Here's how some practitioners are doing this today.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/how-to-prepare-implement-technically-driven-security-model/"><guid isPermaLink="false">bda299ad-ce21-4c69-b8ef-edb75ba0cd68</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/how-to-prepare-implement-technically-driven-security-model/</link><title>How to Prepare to Implement a Technically Driven Security Model</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/24-sectech-korm-six-steps-security-model-robots-drones.gif' style='float: left' alt=''/&gt;Transitioning to a technically driven security model that leverages robots or drones requires a mindset shift. Here are six steps to help you get started.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/modernizing-security-with-robotics-process-automation/"><guid isPermaLink="false">289301c5-980e-44e9-9c13-95810b162224</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/modernizing-security-with-robotics-process-automation/</link><title>Modernizing Security with Robotics Process Automation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-cobalt-ai-884x500.gif' style='float: left' alt=''/&gt;Robotics Process Automation (RPA) enables organizations to achieve greater efficiency and cost savings by automating repetitive and rule-based tasks.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/the-rise-of-drones-and-counter-drone/"><guid isPermaLink="false">e4b87752-771f-495d-a8e1-84db6b472ec9</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/the-rise-of-drones-and-counter-drone/</link><title>The Rise of Drones and Counter-Drone: A Double-Edged Sword in the Skies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-starr-884x500.gif' style='float: left' alt=''/&gt;The urgent need for effective counter-drone solutions has become increasingly apparent as malicious actors exploit these devices for nefarious purposes.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/what-technologies-are-employers-using-to-keep-workers-safe/"><guid isPermaLink="false">137ac6ca-6199-4fb5-a38b-46f5f5024fd5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/what-technologies-are-employers-using-to-keep-workers-safe/</link><title>What Technologies are Employers Using to Keep Workers Safe?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-infographic-01.gif' style='float: left' alt=''/&gt;The International Labor Organization estimates that nearly 3 million workers die each year because of work-related accidents and diseases. New technology, however, could be used to reduce the risk of catastrophic injuries on the job.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/what-are-the-six-most-common-robot-types/"><guid isPermaLink="false">bff4e38b-2fcb-4536-b3f3-b7ba1a6db321</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/what-are-the-six-most-common-robot-types/</link><title>What are the Six Most Common Robot Types?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-fast-facts-6-robot-types.gif' style='float: left' alt=''/&gt;From C-3PO to the Boston Dynamics dog to the Roomba vacuuming your floor, robots come in all shapes and sizes to perform various tasks. Here are the six defining robot types you should know about.</description><pubDate>Wed, 31 Jul 2024 13:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/lessons-learned-from-letting-the-dronedogs-out/"><guid isPermaLink="false">4b9a36ed-f88f-4503-b331-912dab4259ba</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/august/lessons-learned-from-letting-the-dronedogs-out/</link><title>Lessons Learned from Letting the DroneDogs Out</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/august/0824-sectech-gates-884x500.jpg' style='float: left' alt=''/&gt;Asylon Robotics’ DroneDog system has completed more than 100,000 missions. COO Brent McLaughlin shares how the system has changed as client needs evolve.</description><pubDate>Wed, 31 Jul 2024 14:04:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/fast-facts/"><guid isPermaLink="false">f5ab11fb-ea2c-4804-be67-c267d6cb86c3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/fast-facts/</link><title>Fast Facts: Vocabulary for Risk Management Influence </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-fast-facts-risk-management-research-480x270.gif' style='float: left' alt=''/&gt;When communicating about risk management and security, try swapping out some of these key words to achieve a different connotation. </description><pubDate>Mon, 22 Jul 2024 08:37:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/consultant-risk-management-shortcomings/"><guid isPermaLink="false">031259b1-445a-40ee-9d3e-6b28c8f935ad</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/consultant-risk-management-shortcomings/</link><title>Security Consultants See Shortcomings in the State of Security Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0723-briscoe-risk-management-consultants-results.gif' style='float: left' alt=''/&gt;Consultants find security professionals do not have as much influence in the organization as they need, and organizations do not perform basic security risk management functions particularly well.</description><pubDate>Mon, 22 Jul 2024 08:37:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/security-job-descriptions-risk-management/"><guid isPermaLink="false">095e22ea-59b0-40d4-9208-9bbfa0869d9a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/security-job-descriptions-risk-management/</link><title>How to Make Security Less Tactical and More Strategic? Start with a New Description</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-risk-management-briscoe-02.gif' style='float: left' alt=''/&gt;It is a deceptively simple suggestion: If you want security directors to be seen primarily as strategic business enablers instead of tactical responders and rule monitors, then change the position’s job description.</description><pubDate>Mon, 22 Jul 2024 08:37:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/asis-news-research-gsx/"><guid isPermaLink="false">a08b32d0-0c68-4093-bf8d-4902c0cde17d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/asis-news-research-gsx/</link><title>ASIS News: Register for GSX and Read the Latest Research </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-asis-news.jpg' style='float: left' alt=''/&gt;GSX will host more than 200 education sessions on topics ranging from actionable ESRM strategies to diversity in security to integrating artificial intelligence (AI).</description><pubDate>Fri, 26 Jul 2024 09:03:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/research-summary/"><guid isPermaLink="false">c5337eed-7fb2-4b0e-ba1b-3560351a80b4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/research-summary/</link><title>Summarizing the State of Security Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-briscoe-risk-management-summary.jpg' style='float: left' alt=''/&gt;A new ASIS research project focused on understanding how security risk management is undertaken in organizations and how it fits into organizations’ wider risk management portfolio.</description><pubDate>Mon, 22 Jul 2024 08:37:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/risk-management-infographic/"><guid isPermaLink="false">280ce1fd-f41d-4b40-9364-630548b7ef07</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/risk-management-research/risk-management-infographic/</link><title>Research: Risk Management Plans Help Organizations Cope with Some Incidents, But Not All </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-risk-management-infographic-01.gif' style='float: left' alt=''/&gt;New ASIS research asked which security threats presented the most risk, what threats manifested into actual significant incidents that had to be managed, and how well risk planning performed against different categories of security incidents.</description><pubDate>Mon, 22 Jul 2024 08:37:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/diversifying-supply-chains/"><guid isPermaLink="false">ef7aecbf-e14b-429d-bdcc-27bc9b70f9ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/diversifying-supply-chains/</link><title>How to Foster Resilience When Diversifying Supply Chains </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-biggs-diversifying-supply-chains-china.jpg' style='float: left' alt=''/&gt;Developing a supply chain security program at a new supplier site is often challenging, but it becomes even more so when adding logistical, cultural, travel, labor, and other factors associated with a new overseas site.</description><pubDate>Mon, 15 Jul 2024 08:08:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/fast-facts-crisis-management/"><guid isPermaLink="false">988261df-5a09-4adf-a2b0-01053b98a336</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/fast-facts-crisis-management/</link><title>Fundamental Definitions: Understanding the Differences Between Crisis Management and Business Continuity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-mosqueda-fast-facts-crisis-management-and-business-continuity.gif' style='float: left' alt=''/&gt;While there are several terms that appear interchangeable when it comes to dealing with a crisis, their meanings have nuanced differences.</description><pubDate>Mon, 15 Jul 2024 08:08:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/book-review-private-security/"><guid isPermaLink="false">47465296-3ce8-40eb-88f7-171c271087bb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/book-review-private-security/</link><title>Book Review: Private Security: An Introduction to Principles and Practice, 2nd Edition</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-book-review-private-security-2nd-edition-featured-image.jpg' style='float: left' alt=''/&gt;Your first feeling after reading Private Security: An Introduction to Principles and Practice, 2nd Edition, should be amazement that a single author could corral so many details about private security.</description><pubDate>Wed, 17 Jul 2024 14:04:00 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/value-of-resilience/"><guid isPermaLink="false">ab6a61b1-9749-4b11-b4da-af271c8cc05c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/value-of-resilience/</link><title>How Important is Resilience?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-resilience-infographic05-884x500.gif' style='float: left' alt=''/&gt;A resilience program can make all the difference in the face of a crisis, helping an organization maintain business operations. </description><pubDate>Mon, 15 Jul 2024 08:08:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/create-crisis-managment-team/"><guid isPermaLink="false">7e553de1-c90a-4e7b-8fff-0b75336cbfc4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/create-crisis-managment-team/</link><title>How to Create and Support a Crisis Management Team</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-resilience-and-antifragility-antons02-884x500.gif' style='float: left' alt=''/&gt;Businesses aiming to be more resilient and more competitive need to be more prepared. Here’s how and why you should be prepared for a crisis with a crisis management team.</description><pubDate>Mon, 15 Jul 2024 08:08:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/legal-report-scotus-rulings/"><guid isPermaLink="false">27fa9292-4e48-4193-a8d2-3fda59be6a2e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/legal-report-scotus-rulings/</link><title>Legal Report: How the 2024 U.S. Supreme Court Decisions Affect Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/sm_legal-report_6.jpg' style='float: left' alt=''/&gt;SM summarizes the U.S. Supreme Court’s decisions from this latest busy term. Security-related topics include presidential immunity, the lessening of regulatory powers, and a development in lawsuits related to the opioid epidemic.</description><pubDate>Tue, 16 Jul 2024 09:58:43 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/disaster-medicine-resilience/"><guid isPermaLink="false">8fb26326-ac86-49de-8746-246ace8f400f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/disaster-medicine-resilience/</link><title>Building Resilience in High-Stakes Environments: 5 Key Lessons From Disaster Medicine Specialists</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-tin-resilience-disaster-medicine-specialists-02.gif' style='float: left' alt=''/&gt;In the field of disaster medicine, the intersection of health and security is becoming increasingly significant amid diverse and growing threats. </description><pubDate>Mon, 15 Jul 2024 08:08:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/crisis-response-playbook/"><guid isPermaLink="false">e82cb439-7cd4-428a-8d43-446cb089daea</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/resilience/crisis-response-playbook/</link><title>Strategies for Success: Preparing Practical Crisis Response and Resilience Plans</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-resilience-and-antifragility-buckner04-884x500.gif' style='float: left' alt=''/&gt;Sometimes the way to work faster and smarter so everyone on your team can handle a crisis is by getting to the heart of a resilience plan.</description><pubDate>Mon, 15 Jul 2024 08:08:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/oswald-smiley-certification/"><guid isPermaLink="false">a990b95c-0f4a-4a4c-9c3f-de7c724b97e2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/oswald-smiley-certification/</link><title>Certification Profile: Oswald Smiley, CPP, PSP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-osmiley-certifcation-profile.jpg' style='float: left' alt=''/&gt;“Completing certification has really broadened my horizons, and I am now able to deliver world class service that meets the needs of my clients, colleagues and society,” says Oswald Smiley, CPP, PSP.</description><pubDate>Thu, 11 Jul 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/5-critial-controls-for-industrial-system-security/"><guid isPermaLink="false">f0ba1500-7f96-4d63-bc55-a06a095cbf0f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/5-critial-controls-for-industrial-system-security/</link><title>5 Critical Controls for Industrial System Cybersecurity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/convergence/0724-sm-convergence-infographic-884x500.gif' style='float: left' alt=''/&gt;Smaller organizations and utilities can easily feel overwhelmed and under-resourced when facing cybersecurity threats. These five controls provide a starting point. </description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/water-utility-converged-defense/"><guid isPermaLink="false">273e5b50-a09a-40b1-8415-fc46fad4a83e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/water-utility-converged-defense/</link><title>Underfunded Water Utilities Contend with Leaky Defenses </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-convergence-attacks.gif' style='float: left' alt=''/&gt;Attackers seeking money, attention, or destruction have taken aim at water utilities, seeking to cause major impacts on a minor budget through physical, cyber, or converged means. </description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/emerging-technology-asymmetric-threats/"><guid isPermaLink="false">c9facb8b-cc9b-47cb-b8b5-afa2ac6007af</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/emerging-technology-asymmetric-threats/</link><title>Emerging Technology Highlights New Converged Risks and Asymmetric Threats</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-converged-event-risks-randolph.jpg' style='float: left' alt=''/&gt;The ubiquity of technology companies in daily life today puts them in the security spotlight, with increasing media attention, political scrutiny, and complex, overlapping threats. </description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/gridex-planning/"><guid isPermaLink="false">a20cd37c-ebcd-465e-ad1b-d9f508425adb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/gridex-planning/</link><title>Mass Emergency Planning Exercise Tests Resilience to Coordinated Converged Attacks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-sm-gridex-summary-and-interview01-884x500.gif' style='float: left' alt=''/&gt;The 2023 GridEx scenarios tested electric utilities’ and government agencies’ ability to respond and recover from multi-level, converged attacks.</description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/fast-facts/"><guid isPermaLink="false">8b27e2a2-aa25-47fb-8636-89e9b6f31395</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/fast-facts/</link><title>Fast Facts: What is Security Convergence? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-meyer-fast-facts-convergence.gif' style='float: left' alt=''/&gt;Security convergence traditionally means closing the gap between previously separate security functions—usually cybersecurity and site security. </description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/editors-note-uncertainty/"><guid isPermaLink="false">92e37684-3b32-45ce-b563-a5ab466f2447</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/editors-note-uncertainty/</link><title>Editor’s Note: ‘Uncertainty is Wisdom in Motion’</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/0724-editors-note-physical-cyber-convergence-topic02-884x500.gif' style='float: left' alt=''/&gt;Uncertainty can be a counterintuitive superpower that can be fostered and encouraged.</description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/convergence-in-utilities-industry/"><guid isPermaLink="false">dfddb6a5-d61a-4391-b59c-d7221da22fb7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/convergence/convergence-in-utilities-industry/</link><title>Strengthening Infrastructure Security: Convergence in Utilities Industry</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/convergence/0724-sm-convergence-and-physical-security-challenges.gif' style='float: left' alt=''/&gt;The number of physical security incidents against U.S. electricity infrastructure increased as much as 70 percent in 2022 compared to prior years, according to the U.S. Department of Energy. </description><pubDate>Mon, 01 Jul 2024 08:31:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/07/william-tenney-asis-ceo/"><guid isPermaLink="false">e1858ab0-4797-4d91-86ae-6be424ac6527</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/07/william-tenney-asis-ceo/</link><title>Into the Spotlight: Bill Tenney Moves from CSO to ASIS CEO</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/july/9624-meyer-spotlight-bill-tenney-interview-.jpg' style='float: left' alt=''/&gt;Corporate security teams already punch above their weight, says new ASIS CEO William "Bill" Tenney. He aims to support the association to facilitate partnerships and collaboration, increasing security’s influence more openly. </description><pubDate>Mon, 01 Jul 2024 09:00:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/food/fast-facts-food-defense/"><guid isPermaLink="false">882be819-91e0-4aec-addc-50bc2e6d931d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/food/fast-facts-food-defense/</link><title>Fast Facts: What’s the Difference Between Food Safety and Food Defense? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-sm-fast-facts-food-safety-defense-480x270.gif' style='float: left' alt=''/&gt;Is there a difference between these terms? Yes! And the divisions are significant.</description><pubDate>Mon, 24 Jun 2024 08:08:27 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/asis-news/"><guid isPermaLink="false">d73aa692-8341-4e0f-a1e5-29530adfd1ed</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/asis-news/</link><title>ASIS News: Meet the New ASIS CEO, Get Fit with the Foundation, and More </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-asis-news-02.jpg' style='float: left' alt=''/&gt;William “Bill” Tenney will begin as ASIS International’s eighth executive on 1 July 2024. Tenney has been a security professional for more than 35 years, with experience in both the public and private sectors.  </description><pubDate>Thu, 27 Jun 2024 07:30:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/food/food-fraud-types/"><guid isPermaLink="false">eeab76c8-3cc2-46a4-8d10-349c2aab3b06</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/food/food-fraud-types/</link><title>7 Common Types of Food Fraud</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-mosqueda-food-fraud-7-common-types-of-fraud-01.gif' style='float: left' alt=''/&gt;Companies that create brand-name food and beverage products have to contend with fraud attempts from bad actors who want a piece of the pie.</description><pubDate>Mon, 24 Jun 2024 08:08:18 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/industry-news/"><guid isPermaLink="false">74773622-82a4-493b-80e3-0f709d2f30f8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/industry-news/</link><title>Industry News: Buffalo Public School District Modernizes its Security Footprint</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-industry-news-mckinley-high.jpg' style='float: left' alt=''/&gt;New York’s second-largest public school district looked for and found newer cameras to expand visual coverage of its facilities and charges.</description><pubDate>Tue, 25 Jun 2024 11:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/food/beverage-corruption-recapping/"><guid isPermaLink="false">f3100b27-a815-494a-b5b5-cea834a80d40</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/food/beverage-corruption-recapping/</link><title>Repackaging and Recapping: The Threats and Risks of Beverage Corruption</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-sm-food-safety-diego-arevalo-counterfeiting-and-repackaging-beverages03-884x500.gif' style='float: left' alt=''/&gt;The beverage industry often deals with threats as criminal actors repackage products, endangering both consumers’ health and safety, as well as a business’s reputation.</description><pubDate>Mon, 24 Jun 2024 08:08:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/food/beverage-fraud/"><guid isPermaLink="false">4c1396a4-d7e8-45bc-af04-295c9ee46345</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/food/beverage-fraud/</link><title>What’s in Your Drink? Food Fraudsters Turn to Beverages </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-food-safety-mosqueda-884x500.jpg' style='float: left' alt=''/&gt;Premium and popular beverages are often a target of fraudsters, who hope to profit from name brand recognition through a variety of tactics meant to fool consumers.</description><pubDate>Mon, 24 Jun 2024 08:08:35 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/generative-ai-crimes/"><guid isPermaLink="false">6dce6fea-cbce-450c-9500-9b60c0ac002d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/generative-ai-crimes/</link><title>Putting Generative AI to Use for Crime: Fraud, Disinformation, Exploitation, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-meyer-deepfake-feature.jpg' style='float: left' alt=''/&gt;Fake news, manipulated media, deepfakes—disinformation continues to evolve online, fueled by increasingly sophisticated generative artificial intelligence tools.</description><pubDate>Mon, 17 Jun 2024 08:05:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/deepfake-frauds-cryptocurrency/"><guid isPermaLink="false">c5b7ff2e-c2d5-4ac9-adfa-bf5ce3755504</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/deepfake-frauds-cryptocurrency/</link><title>Cryptocurrency Industry is Targeted Most in Deepfake Frauds </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-sm-deepfakes-infographic-preview.jpg' style='float: left' alt=''/&gt;The number of deepfakes detected worldwide increased 10 times from 2022 to 2023, according to a recent identity fraud report. </description><pubDate>Mon, 17 Jun 2024 08:05:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/rise-of-the-mavericks-book-review/"><guid isPermaLink="false">3d3e4a48-dddb-4635-a721-b01d56ffbc93</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/rise-of-the-mavericks-book-review/</link><title>Book Review: Rise of the Mavericks: The U.S. Air Force Security Service and the Cold War</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-book-review-rise-of-the-mavericks-featured-image.jpg' style='float: left' alt=''/&gt;Rise of the Mavericks addresses the creation of the U.S. Air Force Security Service, as well as the unfortunate bureaucratic infighting that it was forced to contend with through the years.</description><pubDate>Thu, 20 Jun 2024 08:56:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/deepfakes-in-todays-digital-landscape/"><guid isPermaLink="false">b443021c-e96f-49c1-ba2d-b56a1419fe19</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/deepfakes-in-todays-digital-landscape/</link><title>Combatting the Rising Threat of Deepfakes in Today's Digital Landscape</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-deepfakes-vekiarides-02.gif' style='float: left' alt=''/&gt;By creating the appearance of someone doing or saying something they did not, deepfakes can lead to reputational harm or financial damage.</description><pubDate>Mon, 17 Jun 2024 08:05:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/fast-facts-fake-news/"><guid isPermaLink="false">fa644149-1f8f-4e65-90d1-4aec755c5e2f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/fast-facts-fake-news/</link><title>Fast Facts: How to Avoid Falling for Fake News and Fraud</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-sm-deepfakes-fast-facts-480x270-v2.gif' style='float: left' alt=''/&gt;Could you detect a deepfake of your CEO? Apply fraud resistance techniques to slow down and detect AI-generated misinformation. </description><pubDate>Mon, 17 Jun 2024 08:05:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/crisis-preparedness-plan/"><guid isPermaLink="false">e796eed4-d5c9-4acb-a65b-8887281d8088</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/deepfakes/crisis-preparedness-plan/</link><title>Does Your Crisis Preparedness Plan Need to Change for Deepfake Threats?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-meyer-deepfakes-crisis-management-x.gif' style='float: left' alt=''/&gt;Generative AI tools are making it difficult to detect, respond to, and recover from deepfakes and other false media, especially when the fakes are designed to spark outrage and spread like wildfire online.</description><pubDate>Mon, 17 Jun 2024 08:05:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/legal-report/"><guid isPermaLink="false">f6a9de40-68dc-482e-bdaa-43c048c9ee8b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/legal-report/</link><title>Legal Report: Dutch Court Finds Crypto App Developer Guilty of Money Laundering</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/sm_legal-report_8.jpg' style='float: left' alt=''/&gt;A panel of judges in The Netherlands found crypto app Tornado Cash cofounder Alexey Pertsev guilty of money laundering. The court determined that the app allowed criminals and terrorists to launder $1.2 billion in stolen funds.</description><pubDate>Thu, 13 Jun 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/security-perimeters-for-the-paris-olympic-games/"><guid isPermaLink="false">258b1ce0-eb99-44c0-91d2-a1d8228a042a</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/security-perimeters-for-the-paris-olympic-games/</link><title>Infographic: The 4 Security Perimeters Paris will Put in Place for the Olympic Games</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-infographic-01.gif' style='float: left' alt=''/&gt;Paris will host Olympic competitions in 25 venues, the streets, and on the Seine River. Here’s how the city will create layers of security to promote a safe fan and athlete experience.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/06/certification-francisco-hernandez-cpp/"><guid isPermaLink="false">d3155cfc-a141-42d7-b357-07bf2523a883</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/06/certification-francisco-hernandez-cpp/</link><title>Certification Profile: Francisco Hernandez, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/june/0624-francisco-hernandez-certifcation-profile.jpg' style='float: left' alt=''/&gt;The experience and knowledge Francisco Hernandez, CPP, acquired while serving in the military helped pique his interest in security and build a strong résumé to establish a career.</description><pubDate>Wed, 12 Jun 2024 11:39:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/low-skill-high-reward-why-vehicle-attacks-continue-effective/"><guid isPermaLink="false">6bc52e85-3b52-4275-9988-188f76ab74b0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/low-skill-high-reward-why-vehicle-attacks-continue-effective/</link><title>Low-Skill, High-Reward: Why Vehicle Attacks Continue to be Effective</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-gates-fast-facts-why-vehicle-attacks-continue-to-be-effective.gif' style='float: left' alt=''/&gt;Vehicle ramming and vehicle-borne improvised explosive device attacks can cause serious harm. They also do not require a great deal of skill or money to carry out, making them attractive to perpetrators.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/security-score-card/"><guid isPermaLink="false">f98bbf46-99fb-45c3-b697-5444117dd6bc</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/security-score-card/</link><title>The Security Scorecard: Considerations for Sport Venue and Event Managers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-allen-hall-sports-security-event-venue-score-card.jpg' style='float: left' alt=''/&gt;Sports venues face multiple challenges regarding safety and security. Venue security directors around the world must remain vigilant and prepare for similar threats and attacks.  </description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/ai-venue-security/"><guid isPermaLink="false">7fe80571-dacb-48b3-8da7-c49aa8772796</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/ai-venue-security/</link><title>AI and the Future of Venue Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-burns-ai-venue-security.jpg' style='float: left' alt=''/&gt;Advanced video surveillance and other technologies are rapidly changing the “guns, guards, and gates” approach to security in today’s stadiums and arenas.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/safeguarding-the-2024-olympics/"><guid isPermaLink="false">fc90c10c-8f33-4125-8189-97b4865cb5f7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/safeguarding-the-2024-olympics/</link><title>Safeguarding the 2024 Olympics in Paris: A Comprehensive Security Approach</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-arruda-olympics-884x500.gif' style='float: left' alt=''/&gt;With the eyes of the world turning to this iconic event, ensuring the safety and security of all participants, spectators, and infrastructure is paramount. This requires a multifaceted approach to address the various challenges and threats facing the Olympics.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/operational-security-bloom-at-td-garden-how-a-major-sporting-venue-is-improving-efficiency/"><guid isPermaLink="false">0c74bb81-a399-428e-b3a6-cf79e2c10546</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/operational-security-bloom-at-td-garden-how-a-major-sporting-venue-is-improving-efficiency/</link><title>Operational Security Blooms at TD Garden: How A Major Sporting Venue is Improving Efficiency Through Key Management </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-traka-td-garden-case-study-884x500.gif' style='float: left' alt=''/&gt;What began as a bank of nearly 1,600 users was eventually condensed to approximately 300. The consolidation improved security by reducing potential risks and simplifying the monitoring process for security administrators.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/the-forgotten-mission-of-security-operations/"><guid isPermaLink="false">e546dc05-ec4a-4dab-9cd2-ffee0142d471</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/the-forgotten-mission-of-security-operations/</link><title>The Forgotten Mission of Security Operations for Venues </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-schonfeld-884x500.jpg' style='float: left' alt=''/&gt;Security leaders for event venues and stadiums can’t afford to miss some of the key elements of protection during these “between” times. Here’s where the opportunity exists to ensure ongoing oversight.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/world-cup-perspective-sports-ticketing-enters-new-era/"><guid isPermaLink="false">383af96b-b01a-45dc-ae3b-6f2d49ef7294</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/june/world-cup-perspective-sports-ticketing-enters-new-era/</link><title>A World Cup Perspective: Sports Ticketing Enters a New Era</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/june/0624-sectech-paciello-world-cup-ticketing.jpg' style='float: left' alt=''/&gt;The intangibles of modern ticketing system deployment have become some of the most important factors influencing event success.</description><pubDate>Sat, 01 Jun 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/industry-news/"><guid isPermaLink="false">8ad5de83-724d-4b99-b016-0b2121566f63</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/industry-news/</link><title>Industry News: Enhancing Technology and Security During Renovations at Roosevelt Island</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-industry-news-sportspark.jpg' style='float: left' alt=''/&gt;Elite Design Systems completed a year-long project with the Roosevelt Island Operating Corporation, bringing communication and surveillance updates to the community.</description><pubDate>Thu, 30 May 2024 07:31:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/marketplace/"><guid isPermaLink="false">2fca5cbc-8840-44ae-a69e-2e50fd0f3280</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/marketplace/</link><title>Marketplace: Mobile Badges, Lock Status Indicators, LiDAR, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-marketplace-884x500.jpg' style='float: left' alt=''/&gt;Interested in new security technologies, products, and services? This roundup keeps track of the latest announcements and developments in the industry to keep you up-to-date and secure.</description><pubDate>Wed, 29 May 2024 11:41:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/book-review-locks-insecurity-engineering/"><guid isPermaLink="false">72281aec-d0ee-4b21-a37f-a7eeb766684f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/book-review-locks-insecurity-engineering/</link><title>Book Review: Tobias on Locks and Insecurity Engineering</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-book-review-tobias-on-locks-and-insecurity-engineering-featured-image.jpg' style='float: left' alt=''/&gt;This book offers a straightforward and level examination of security engineering principles, while urging practitioners to adopt a vigilant mindset and embrace continuous improvement in their designs.</description><pubDate>Fri, 24 May 2024 08:36:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/audio-marketplace/"><guid isPermaLink="false">e6f9c99f-e10c-4a5b-987b-1b6aa78ddc0b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/audio-marketplace/</link><title>Marketplace Special: Audio Detection and Communications</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-sidebar-marketplace-884x500-v2.jpg' style='float: left' alt=''/&gt;This special edition of SM Marketplace highlights alarm verification sensors, gunshot and aggression sensors, radio communications, and more.</description><pubDate>Mon, 20 May 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/asis-news-nominating-committee/"><guid isPermaLink="false">5fbfc591-36be-485d-a832-4fbbdeca42ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/asis-news-nominating-committee/</link><title>ASIS News: Apply for a Nominating Committee and Get Ready for GSX </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-asis-news.jpg' style='float: left' alt=''/&gt;If you are passionate about ensuring ASIS leaders will guide the organization to meet the mission of the organization and the global security profession, serving on a nominating committee will be a good fit for you. </description><pubDate>Thu, 23 May 2024 08:26:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/gunshot-detection/"><guid isPermaLink="false">525e6571-71f1-48ec-83fd-1d866725e05d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/gunshot-detection/</link><title>Using Gunshot Detection Technology to Mitigate Human Fallibility </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-mosqueda-sidebar-audio-detection-human-fallibility.jpg' style='float: left' alt=''/&gt;Audio detection technology may be able to bridge the mental gap between denial and reality during an emergency, giving people a greater chance of survival.</description><pubDate>Mon, 20 May 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/legal-report-encryption-privacy/"><guid isPermaLink="false">8cf920dc-f7e3-410c-86ba-0af9853cbbf3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/legal-report-encryption-privacy/</link><title>Legal Report: Weakening Encryption Would Threaten Right to Privacy, European Court Rules</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/sm_legal-report_7.jpg' style='float: left' alt=''/&gt;The ruling says that forcing a company to decrypt end-to-end communication for some users would threaten users’ privacy.</description><pubDate>Wed, 22 May 2024 08:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/fast-facts/"><guid isPermaLink="false">44e30c16-0a56-4b7d-ab4c-ef9880758e0d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/fast-facts/</link><title>Fast Facts: What Is Audio Detection Listening for?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0424-mosqueda-audio-detection.gif' style='float: left' alt=''/&gt;Some types of audio detection include identifying gunshots, breaking glass, and verbal aggression.</description><pubDate>Mon, 20 May 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/daily-commute-duty-of-care/"><guid isPermaLink="false">7845786a-14f9-448a-9c20-20c541c95cc6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/audio/daily-commute-duty-of-care/</link><title>The Fundamentals of Alerting Employees About Their Daily Commutes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-main-jany-884x500.gif' style='float: left' alt=''/&gt;Security leaders need to take reasonable steps to inform employees about potential threats as they head into the workplace or make their way home. </description><pubDate>Mon, 20 May 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/famous-zoo-escapes/"><guid isPermaLink="false">2e318775-d908-4d3f-a3be-2988d8c05e3d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/famous-zoo-escapes/</link><title>Sneaky Sea Lions and Humbolt Penguin Houdinis: 8 Famous Zoo Escapes </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-listicle-zoo-escapes-884x500.gif' style='float: left' alt=''/&gt;Despite best intentions and security measures, zoo animals sometimes escape their enclosures. Here are eight escapades throughout history that caught our eye.</description><pubDate>Mon, 13 May 2024 08:16:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/biosecurity-in-zoos/"><guid isPermaLink="false">cf3a542d-a9dd-424b-a78a-eb30e89cf10b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/biosecurity-in-zoos/</link><title>Clipping Bird Flu’s Wings with Biosecurity in Zoos </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-zoo-gates-avian-flu.gif' style='float: left' alt=''/&gt;A decade years ago, zoo veterinary teams worked with public health officials to respond to the threat of avian influenza. Those exercises helped create a culture of biosecurity planning that leverages strong relationships between stakeholders to rapidly respond to emerging threats.</description><pubDate>Mon, 13 May 2024 08:16:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/columbus-zoo-rekeying/"><guid isPermaLink="false">daaa74b3-2172-4f6a-8869-c5119f4e87be</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/columbus-zoo-rekeying/</link><title>Holding the Door: How the Columbus Zoo is Rekeying its Campus</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-zoos-rekeying-03.gif' style='float: left' alt=''/&gt;There are lions, tigers, bears, and about 1,500 sets of door hardware that need to be replaced. Here’s how the security team at the Columbus Zoo Family of Parks prepared to rekey its campus.</description><pubDate>Mon, 13 May 2024 08:16:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/zoo-weapon-response-teams/"><guid isPermaLink="false">db5bf6ea-3620-4592-be7c-784764586bf3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/zoo-weapon-response-teams/</link><title>How Zoos Respond When a Dangerous Animal Escapes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-gates-how-zoos-animal-escapes.jpg' style='float: left' alt=''/&gt;It’s one thing if the llamas get out. But if a tiger escapes its enclosure at a zoo, it initiates a critical response that’s a partnership between animal caretakers, veterinarian staff, and a weapons team to keep people safe.</description><pubDate>Mon, 13 May 2024 08:16:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/fast-facts-avian-influenza/"><guid isPermaLink="false">75ea090d-c8d0-47e1-9775-ecac08913dd3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/zoo/fast-facts-avian-influenza/</link><title>Fast Facts: What is Avian Influenza?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-zoo-security-fast-facts-what-is-avian-flu-480x270.gif' style='float: left' alt=''/&gt;Avian influenza, known as bird flu, is spread by wild birds and poses a major risk for birds that become infected with the disease.</description><pubDate>Mon, 13 May 2024 08:16:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/certification-profile-ben-brown/"><guid isPermaLink="false">2b536bc7-fc10-410d-ad35-751b3aaf8599</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/certification-profile-ben-brown/</link><title>Certification Profile: Ben Brown, CPP, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-ben-brown-certifcation-profile.jpg' style='float: left' alt=''/&gt;Shortly after entering the security field, Ben Brown, CPP, PSP, was introduced to ASIS through his local chapter in Washington state. Soon after, Brown immersed himself into the ASIS community, and particularly into subject-area communities.</description><pubDate>Fri, 10 May 2024 10:06:13 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/difficult-workplace-conversations/"><guid isPermaLink="false">fcf47a7f-fafd-48d4-ba74-6bdb4711ac63</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/difficult-workplace-conversations/</link><title>Tough Talk or Toxic? A Guide to Navigating Difficult Workplace Conversations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-toxic-workplaces-tough-conversations-at-work05-884x500.gif' style='float: left' alt=''/&gt;It's essential to approach tough, courageous discussions at work with care and skill to prevent them from turning toxic.</description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/infographic-employee-support/"><guid isPermaLink="false">864caf0e-3dde-4ff4-838a-4aed184fddc7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/infographic-employee-support/</link><title>Infographic: What Support Do Workers Want from Employers? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-infographic-toxic-workplaces-preview.gif' style='float: left' alt=''/&gt;Want to retain your employees and reduce the risk of your workplace culture turning toxic? It’s time to invest in workers’ psychological well-being. </description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/fast-facts/"><guid isPermaLink="false">6684100c-5da2-4b35-b89d-0a9d487dc38e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/fast-facts/</link><title>Fast Facts: What Makes a Workplace Toxic? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-meyers-fast-facts-what-makes-a-workplace-toxic.gif' style='float: left' alt=''/&gt;“Toxic workplaces” is a term that gets bandied about a lot these days, but what does it actually mean, and how can these environments hurt employees?</description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/ed-note-overcome-workplace-dysfunction/"><guid isPermaLink="false">0e0cfdd7-7f2d-459b-a565-54e407bd3098</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/ed-note-overcome-workplace-dysfunction/</link><title>Editor's Note: How to Overcome Workplace Dysfunction</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-ednote-toxic-workplaces-02.gif' style='float: left' alt=''/&gt;Inclusion may be key to countering toxicity and building a healthy workplace. </description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/confronting-weight-bias/"><guid isPermaLink="false">9d60dfcb-8a6c-4203-8e3a-336611c14e7f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/confronting-weight-bias/</link><title>Confronting Weight Bias at Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-toxic-workplaces-weight-discrimination-shrm-884x500.gif' style='float: left' alt=''/&gt;Weight discrimination can be present in different ways in the workplace, including unfair hiring practices, misconceptions about obese employees' work ethic, and harassment.</description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/is-your-workplace-toxic/"><guid isPermaLink="false">4a79fcc4-3c74-44c9-ab52-d7294f80e7b3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/is-your-workplace-toxic/</link><title>Is Your Workplace Toxic? Here's What You Need to Do</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-powel-when-how_leave-toxic-workplace.jpg' style='float: left' alt=''/&gt;When faced with a toxic work culture, your best option is often to leave, but how can you manage the situation in the short term while you look for your next opportunity? </description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/publicly-humiliating-events/"><guid isPermaLink="false">d1db37b2-d901-46e8-a932-e0aa732fdebf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/publicly-humiliating-events/</link><title>Publicly Humiliating Events: A Precursor to Workplace Violence?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-brubaker-gibson-humiliation-workplace-violence.jpg' style='float: left' alt=''/&gt;Terminations, disciplinary problems, and conflicts between co-workers can quickly escalate and amplify pre-existing feelings of animosity and rage. </description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/promote-positive-workplace-culture/"><guid isPermaLink="false">8ec4449a-8cac-4e2b-b676-dab402396e1a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/05/toxic-workplaces/promote-positive-workplace-culture/</link><title>How Security Managers Can Curb Toxicity and Promote a Positive Workplace Culture </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/may/0524-sm-toxic-workplaces-palome-884x500.jpg' style='float: left' alt=''/&gt;Within the scope of securing the workplace, security managers have a part to play in curbing any workplace toxicity that may exist and helping to promote a positive culture instead.</description><pubDate>Wed, 01 May 2024 07:29:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/a-climate-conversation-with-gpt4/"><guid isPermaLink="false">7f1a5b05-9e68-446c-a49b-5770484da4e5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/a-climate-conversation-with-gpt4/</link><title>A Climate Conversation with GPT-4 and Gemini</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-andy-bochman03-884x500.jpg' style='float: left' alt=''/&gt;The smarter AIs become, the closer they get to the next level of intelligence: general intelligence. When they get to this level of capability, AIs will be able to accomplish any intellectual task that a smart human can. Some AI experts see developers reaching this milestone as soon as 2030. </description><pubDate>Thu, 25 Apr 2024 09:33:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/book-review-privacy-leader-compass/"><guid isPermaLink="false">8fd2d982-cb83-4a3f-b303-48d0d957042b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/book-review-privacy-leader-compass/</link><title>Book Review: The Privacy Leader Compass</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-book-review-privacy-leader-compass-featured-image.jpg' style='float: left' alt=''/&gt;From privacy law, strategies, technical implementations, people, and much more, the reader comes out with an in-depth knowledge of the many aspects of this monstrosity called privacy. </description><pubDate>Fri, 26 Apr 2024 07:44:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/asis-news/"><guid isPermaLink="false">3d465440-cc36-4d70-af21-7782a0c397e3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/asis-news/</link><title>ASIS News: The Latest in Security Tech and Standards, Plus ASIS Awards </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-asis-news-autonomous-vehicles-report.jpg' style='float: left' alt=''/&gt;A new ASIS Foundation report, Autonomous Vehicles: Threats, Risks, and Opportunities, examines the changes triggered by AVs within the security realm, considering both benefits and vulnerabilities. </description><pubDate>Thu, 25 Apr 2024 10:35:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/the-art-of-concierge-guarding/"><guid isPermaLink="false">cb9f21f2-8c26-4fd5-b063-b9d4dea8adac</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/the-art-of-concierge-guarding/</link><title>The Art of Concierge Guarding: How Museums Merge Security with Visitor Services </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-mosquesda-concierge-muesum-guards.jpg' style='float: left' alt=''/&gt;Security officers in museums sometimes must double their duties to achieve the most effective and influential security—protecting artwork while representing a welcoming atmosphere.</description><pubDate>Mon, 22 Apr 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/concierge-guarding-skills-qa/"><guid isPermaLink="false">cb118e74-413f-432f-ad12-b637e2bd58e8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/concierge-guarding-skills-qa/</link><title>Q&amp;A: What Skills Turn Guards into Concierge-Minded Security Professionals? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sm-concierge-security-sidebar-qa-884x500.gif' style='float: left' alt=''/&gt;Brent O’Bryan, global senior vice president of training and talent for Allied Universal, highlights what clients want when security also faces customers, visitors, patients, and tenants.</description><pubDate>Mon, 22 Apr 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/guest-services-to-mitigate-security-risks/"><guid isPermaLink="false">def086bb-63b2-4ddc-92e2-908d1c535765</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/guest-services-to-mitigate-security-risks/</link><title>Hand in Hand: Using Guest Services to Mitigate Security Risks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sm-concierge-sidebar-venues-and-the-guest-experience04-884x500.gif' style='float: left' alt=''/&gt;Mark Herrera, director of education for the International Association of Venue Managers, discusses the value of training venue security staff in guest services.</description><pubDate>Mon, 22 Apr 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/fast-facts/"><guid isPermaLink="false">fce66ba9-346b-4cc6-950a-7847437ff103</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/fast-facts/</link><title>Fast Facts: What is Concierge Security?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-fast-facts-what-is-concierge-security-gif.gif' style='float: left' alt=''/&gt;Let’s look at the responsibilities and qualities linked to a concierge security officer’s role.</description><pubDate>Mon, 22 Apr 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/casino-safety-guidelines/"><guid isPermaLink="false">6a480195-45b7-40ea-8373-7d813f9bdd90</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/concierge/casino-safety-guidelines/</link><title>12 Safety Guidelines for Casino Patrons</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-vialpando-safety-guidelines-casino-patrons.gif' style='float: left' alt=''/&gt;Casino management and security personnel can look after their patrons by providing a few simple tips and concierge security services to keep casino winnings where they belong—with the patron.</description><pubDate>Mon, 22 Apr 2024 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/fast-facts-crash-and-grab/"><guid isPermaLink="false">1fcd6f50-1e14-4dae-ba1f-fa7d1f1c28e2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/fast-facts-crash-and-grab/</link><title>Fast Facts: What is a Crash and Grab? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-meyer-fast-facts-crash-grab-01.gif' style='float: left' alt=''/&gt;Vehicle thefts and retail robberies overlap when thieves use cars to break into their targets. </description><pubDate>Mon, 15 Apr 2024 07:58:31 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/alarming-trends-in-cannabis-crime/"><guid isPermaLink="false">704f4c16-7206-485b-ab73-2a729b48f5fc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/alarming-trends-in-cannabis-crime/</link><title>Alarming Trends in Cannabis Crime—There’s a Standard for That</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sutton-cannabis-crime-trends.jpg' style='float: left' alt=''/&gt;Using vehicles to gain entry to a building is not new and has occurred in almost every state where cannabis is legal for sale.</description><pubDate>Mon, 15 Apr 2024 07:58:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/industry-news/"><guid isPermaLink="false">7533e962-1608-497c-a249-1cf2e0bd59f0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/industry-news/</link><title>Industry News: Chile’s Port of Valparaiso Improves Video Wall Monitoring</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/in-april-2024-rgb.jpg' style='float: left' alt=''/&gt;RGB Spectrum’s video wall processor was selected to support enhanced surveillance operations at the Terminal Pacifico Sur Valparaiso’s video wall. </description><pubDate>Wed, 17 Apr 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/access-control-fundamentals/"><guid isPermaLink="false">3ad52766-85c1-4a68-b32f-702620ea71d6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/access-control-fundamentals/</link><title>Mastering Access Control Fundamentals for Cannabis Facility Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sm-cannabis-access-control.jpg' style='float: left' alt=''/&gt;In the event of a break-in attempt, the right security door can buy security staff and first responders valuable time by slowing intruders’ attempts to enter. </description><pubDate>Mon, 15 Apr 2024 07:32:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/secure-storage-cannabis-standard/"><guid isPermaLink="false">fec169d8-6126-45a0-a5ce-7cdbe94b20a7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/cannabis/secure-storage-cannabis-standard/</link><title>How to Upgrade Secure Storage in Cannabis Facilities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sm-cannabis-secure-storage-04.gif' style='float: left' alt=''/&gt;The ASIS Cannabis Security Standard offers guidance and structure around how to improve security beyond state-ordered compliance in cannabis facilities.</description><pubDate>Mon, 15 Apr 2024 07:32:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/certification-profile-gatiti/"><guid isPermaLink="false">37b2d8a7-b2fb-4849-8ea3-c0b497d8f80e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/certification-profile-gatiti/</link><title>Certification Profile: Sicily Gatiti, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-sicily-gatiti-certifcation-profile.jpg' style='float: left' alt=''/&gt;Sicily Gatiti, CPP, PCI, PSP, entered the Kenyan National Police Service as a constable in 2004 and has risen though the ranks over the course of 20 years. She now serves as the commissioner of police. </description><pubDate>Wed, 10 Apr 2024 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/unlocking-the-power-of-ai/"><guid isPermaLink="false">52fef879-a387-4199-8f27-57f53c24e9fb</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/unlocking-the-power-of-ai/</link><title>Unlocking the Power of AI: A Wake-Up Call for Physical Security Operations</title><description>&lt;img src='http://www.asisonline.org/contentassets/2d52a69195bf417c8ebe05d330d89887/david_harris.jpg' style='float: left' alt=''/&gt;The adoption of data science and artificial intelligence (AI) has emerged as a transformative force, offering new opportunities to address these challenges and unlock hidden value within organizations.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/ai-powered-saas-how-get-most-out-of-it-safely/"><guid isPermaLink="false">6409fa98-2f5f-4d20-a779-938ef2ccc3b6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/ai-powered-saas-how-get-most-out-of-it-safely/</link><title>AI-Powered SaaS: How to Get the Most Out of It, Safely</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-lubetzky-sharon-ai-powered-saas.jpg' style='float: left' alt=''/&gt;As workforces continue to adopt AI and integrate it into their organizational workflows, safeguarding sensitive data and intellectual property becomes even more critical.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-physical-security-teams-should-leverage-ai/"><guid isPermaLink="false">de931679-4504-48fd-a0cc-03d3b7f27998</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-physical-security-teams-should-leverage-ai/</link><title>A Force Multiplier: Why Physical Security Teams Should Leverage AI</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0424-sectech-david-garcia.gif' style='float: left' alt=''/&gt;While AI adoption has surged in various sectors, the physical security realm remains restrained in its incorporation of this technology. Here’s why that should change.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/infographic-how-ai-is-changing-cybersecurity-jobs/"><guid isPermaLink="false">74919b44-73ba-4969-9ab0-63e2d7c085ea</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/infographic-how-ai-is-changing-cybersecurity-jobs/</link><title>Infographic: How AI is Changing Cybersecurity Jobs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-gates-ai-cybersecurity-jobs-01.jpg' style='float: left' alt=''/&gt;A recent survey of cybersecurity practitioners shines a light on how artificial intelligence is affecting their careers and their concerns for the future. </description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/legal-report/"><guid isPermaLink="false">f3fa69e4-8385-479f-9dbe-e54bf0182c68</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/legal-report/</link><title>Legal Report: Washington Settles Suit with Opioid Producer Johnson &amp; Johnson for $149.5 Million</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/new-4.jpg' style='float: left' alt=''/&gt;The settlement ends a four-year-long lawsuit, allowing the U.S. state to provide additional funding for opioid abuse treatment programs.  </description><pubDate>Mon, 08 Apr 2024 11:39:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-soc-teams-can-best-implement-ai-as-a-security-co-pilot/"><guid isPermaLink="false">684c3c3c-f865-4900-b4aa-34f4749c2810</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-soc-teams-can-best-implement-ai-as-a-security-co-pilot/</link><title>How SOC Teams Can Best Implement AI as a Security Co-Pilot</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-james-robinson-884x500.gif' style='float: left' alt=''/&gt;We should position AI as a helpful office assistant—or a reliable co-pilot—which enables SOC staffers to streamline activities related to incident detection, alert analysis, data-set enrichment, and more.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-automated-identity-verification-is-reshaping-security/"><guid isPermaLink="false">1c38bc8c-b9c6-4ea3-b548-140a06b3c800</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-automated-identity-verification-is-reshaping-security/</link><title>How Automated Identity Verification is Reshaping Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-roy-jeunen-884x500.gif' style='float: left' alt=''/&gt;This dual-layer strategy enhances the accuracy and efficiency of determining access rights, significantly bolstering your overall security framework.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/seven-ai-applications-that-are-transforming-security-operations/"><guid isPermaLink="false">04af0b2d-1a82-4beb-aead-077f67bf931d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/seven-ai-applications-that-are-transforming-security-operations/</link><title>Seven AI Applications That Are Transforming Security Operations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/volt_st.jpg' style='float: left' alt=''/&gt;Traditionally, security measures have relied upon conventional methods such as locks, guards, and surveillance cameras. Recently, AI has emerged as a new must-have tool in security operations, reshaping the role of security cameras and transforming them into a new breed of defense systems through vision AI models.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/fast-facts-eu-ai-act/"><guid isPermaLink="false">e714348f-ea22-4896-acb4-7c0404a1b1a3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/fast-facts-eu-ai-act/</link><title>Fast Facts: How the EU AI Act will Impact Security Technology</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0424-sectech-fast-facts-eu-ai-act.gif' style='float: left' alt=''/&gt;The EU Artificial Intelligence Act will regulate AI systems, including banning some technologies being developed by the security industry.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/isc-west-2024-product-showcase/"><guid isPermaLink="false">238c1164-1500-495a-ab2a-d69294917a2a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/isc-west-2024-product-showcase/</link><title>ISC West 2024 Product Showcase</title><description>&lt;img src='http://www.asisonline.org/contentassets/bc600a3ddb0b4d898854c961b9b015cf/iscwest_2024.jpg' style='float: left' alt=''/&gt;What can you expect to see at ISC West 2024? Check out the latest product showcase for a preview.</description><pubDate>Thu, 04 Apr 2024 12:59:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/mitigating-the-rise-in-cyberattacks-on-critical-infrastructure/"><guid isPermaLink="false">f529f174-771f-4e72-ae1a-2538c8d76303</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/mitigating-the-rise-in-cyberattacks-on-critical-infrastructure/</link><title>Mitigating the Rise in Cyberattacks on Critical Infrastructure</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-morgan-dorris.gif' style='float: left' alt=''/&gt;Security experts are reporting an alarming rise in cyberattacks on U.S. critical infrastructure. Converged efforts by OT and IT teams might make operators more resilient to these assaults.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-dna-data-is-the-next-target-for-identity-theft-fraudsters/"><guid isPermaLink="false">a62d4f4a-72ec-4409-8481-aa3d13b78460</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-dna-data-is-the-next-target-for-identity-theft-fraudsters/</link><title>Why DNA Data is the Next Target for Identity Theft Fraudsters</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-ari-jacoby-dna-and-identity-theft-884x500.gif' style='float: left' alt=''/&gt;Adding DNA data to AI-generated identities could create unprecedented challenges for security technology teams.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/ai-and-elections-addressing-new-tools-to-spread-inaccurate-information/"><guid isPermaLink="false">ea7a193f-cc40-49bb-a3b9-89644c9f1b03</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/ai-and-elections-addressing-new-tools-to-spread-inaccurate-information/</link><title>AI and Elections: Addressing New Tools to Spread Inaccurate Information</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-gates-elections-ai.gif' style='float: left' alt=''/&gt;This year is an unprecedented year for elections, with voters heading to the polls in more than 50 countries and major developments in the ability of artificial intelligence tools to create and spread inaccurate election information. </description><pubDate>Tue, 02 Apr 2024 11:50:50 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/04/asis-europe-2024/"><guid isPermaLink="false">9c1f73ee-ae00-43ed-a84a-9568c7382ed1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/04/asis-europe-2024/</link><title>At ASIS Europe, Security Leaders Prepared for Unexpected Challenges—and Benefits</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/april/0424-asis-news-02.jpg' style='float: left' alt=''/&gt;Sharing information across departments, organizations, and industries enables security leaders to look further afield, develop scenarios, and plan ahead, which can enable practitioners to better support their stakeholders in uncertain times. </description><pubDate>Wed, 03 Apr 2024 08:50:30 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/the-role-ai-plays-workplace-safety-compliance/"><guid isPermaLink="false">d2237ffb-d623-47c8-a06f-ca23a0684598</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/the-role-ai-plays-workplace-safety-compliance/</link><title>The Role AI Plays in Workplace Safety and Compliance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-griffin-ai-compliance-01.gif' style='float: left' alt=''/&gt;To meet safety and compliance expectations, organizations are looking to technology investments as a force multiplier.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/pixel-litigation/"><guid isPermaLink="false">b46752da-e47b-4f4d-acd0-2a636de88e7c</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/pixel-litigation/</link><title>Pixel Litigation: How Security Professionals Can Assist with Risk Mitigation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-freedman.gif' style='float: left' alt=''/&gt;A rapidly evolving risk and compliance issue—pixel litigation—is bringing security practitioners into remediation efforts that are a surprise to them. </description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/understanding-the-eu-ai-act/"><guid isPermaLink="false">81e610ed-5517-41e2-8899-cbe76e00e351</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/understanding-the-eu-ai-act/</link><title>Understanding the EU AI Act: A Security Perspective</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0424-sectech-gates-cover-story-eu-ai-act.jpg' style='float: left' alt=''/&gt;The European Union is poised to enact the world’s first, comprehensive regulation of artificial intelligence. These new rules will create a new business and operational landscape for security practitioners in member states.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/addressing-ethical-and-privacy-issues-with-physical-security-and-ai/"><guid isPermaLink="false">5d06e662-acc1-41b5-ac66-ac7d636d00d7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/april/addressing-ethical-and-privacy-issues-with-physical-security-and-ai/</link><title>Addressing Ethical and Privacy Issues with Physical Security and AI</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/april/0423-sectech-plante-ethics-privacy.jpg' style='float: left' alt=''/&gt;AI video automates tracking and monitoring for anything it’s been programmed to do—and that can be a problem without strong privacy and ethics policies in place.</description><pubDate>Mon, 01 Apr 2024 08:07:14 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/industry-news/"><guid isPermaLink="false">c05aad87-dc2a-48ad-b9f4-b0887bef9861</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/industry-news/</link><title>Industry News: Interface and IPConfigure Solution Supports Remote SOCs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-industry-news-soc-management-integration.jpg' style='float: left' alt=''/&gt;A strategic partnership between Interface Systems and IPConfigure expands remote video management solutions for customers.</description><pubDate>Fri, 29 Mar 2024 10:58:06 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/asis-news/"><guid isPermaLink="false">f63a247b-d509-4574-8875-83ed60215bc6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/asis-news/</link><title>ASIS News: Member Appreciation Month, New Research, and Scholarships Open </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0424-asis-news-04.jpg' style='float: left' alt=''/&gt;The end of Member Appreciation Month doesn’t mean the end of member appreciation! We are honored to celebrate and appreciate our members all year round.</description><pubDate>Fri, 29 Mar 2024 10:48:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/infographic-csf-worldwide/"><guid isPermaLink="false">49684937-712b-42d1-ad8a-3b3d5dfeac65</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/infographic-csf-worldwide/</link><title>Infographic: The CSF in Action Around the World</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-nist-cybersecurity-framework-infographic01.gif' style='float: left' alt=''/&gt;The NIST Cybersecurity Framework was originally published in English in the United States. It’s since been adopted around the world.</description><pubDate>Mon, 18 Mar 2024 08:22:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/fast-facts/"><guid isPermaLink="false">d3c6e0ea-8898-45ab-a488-e19926c749f1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/fast-facts/</link><title>Fast Facts: What the New NIST Cybersecurity Framework Govern Function Means</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-fast-facts-govern-function.gif' style='float: left' alt=''/&gt;The newly updated Cybersecurity Framework adds a sixth function to its original five. Here’s how the “Govern” function complements the others.</description><pubDate>Mon, 18 Mar 2024 08:22:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/nist-top-of-your-list/"><guid isPermaLink="false">e312dd23-01f8-46ab-b7ef-05d3c2f97f4f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/nist-top-of-your-list/</link><title>Want to Be Your Organization's Cybersecurity Expert? Put NIST at the Top of Your List</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-knehr-nist-organization-cybersecurity-expert.jpg' style='float: left' alt=''/&gt;The NIST Cybersecurity Framework (CSF) can assist any business to better understand, manage, and reduce their cybersecurity risk. </description><pubDate>Mon, 18 Mar 2024 08:22:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/improving-on-a-good-thing-nist/"><guid isPermaLink="false">c158d16e-9aad-4256-8251-5ba0e7812722</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/improving-on-a-good-thing-nist/</link><title>Improving on a Good Thing: NIST’s Cybersecurity Framework Version 2.0</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-nist-cybersecurity-framework-main-feature-884x500.png' style='float: left' alt=''/&gt;The original NIST Cybersecurity Framework asked companies, government agencies, and other organizations to ask big questions 10 years ago. The new one hopes to expand its reach from critical infrastructure to help security professionals wrap their heads around today’s big risk management challenges.</description><pubDate>Mon, 18 Mar 2024 08:22:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/how-peers-use-nist-csf/"><guid isPermaLink="false">46aa818d-1492-492a-a112-fab1ee504d92</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/nist-csf/how-peers-use-nist-csf/</link><title>How Peers Are Putting the NIST Cybersecurity Framework to Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0424-sm-nist-framework-sidebar.gif' style='float: left' alt=''/&gt;In an ideal world, you’d address every issue raised by the NIST Cybersecurity Framework, minimize every threat, and make every recommendation. But companies can be hesitant to do all of it at once.</description><pubDate>Mon, 18 Mar 2024 08:22:51 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/fire-door-modifications/"><guid isPermaLink="false">14c21e94-55c3-41d6-81d9-35d00b7507cc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/fire-door-modifications/</link><title>Safeguarding Life and Property: The Dangers of Exit Device and Fire Door Modifications</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0424-merrel-exit-device-fire-door-modification-dangers.jpg' style='float: left' alt=''/&gt;Fire-rated doors are the unsung heroes of preventing damage from a fire. But when people modify these doors without understanding their purpose or construction, the consequences can be deadly.</description><pubDate>Mon, 11 Mar 2024 08:14:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/active-assailants-open-spaces/"><guid isPermaLink="false">8958c116-51db-4e58-96bd-2cce731a7afd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/active-assailants-open-spaces/</link><title>Active Assailants Increasingly Seek Open Spaces, FBI Data Finds</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-site-hardening-active-assailant.jpg' style='float: left' alt=''/&gt;Since 2016, active shooter incident data has trended upwards, as the number of events involving an active shooter in 2020 increased by 100 percent from 2016—an increase that continues today.</description><pubDate>Mon, 11 Mar 2024 08:14:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/crash-ratings-101/"><guid isPermaLink="false">ea420332-e3bc-43a0-86b7-30ddf27ecffa</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/crash-ratings-101/</link><title>Crash Ratings 101: The Cornerstone of Effective High Security Vehicle Barrier Systems</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-site-hardening-borto-crash-ratings-101-884x500.gif' style='float: left' alt=''/&gt;Crash ratings serve as a standardized measure to assess and communicate the efficacy of various vehicle barrier products. </description><pubDate>Mon, 11 Mar 2024 08:14:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/fast-facts-soft-target/"><guid isPermaLink="false">59293b1b-c780-433d-bd01-0d2b39c213d0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/fast-facts-soft-target/</link><title>Fast Facts: What is a Soft Target?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-site-hardening-fast-facts-what-is-a-soft-target-480x270-v1.gif' style='float: left' alt=''/&gt;Soft targets usually aim to attract crowds and encourage access. Assailants take advantage of that open invitation.</description><pubDate>Mon, 11 Mar 2024 08:14:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/soft-target-balancing-act/"><guid isPermaLink="false">12f193f7-8ead-493d-bde0-dffb8e11b2d4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/site-hardening/soft-target-balancing-act/</link><title>The Balancing Act: How Soft Targets Can Attract Guests While Discouraging Attacks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-mosqueda-site-hardening-feature.jpg' style='float: left' alt=''/&gt;Soft targets—especially open-air sites like parks and arenas, or outdoor events like music festivals and parades—continue to try to walk a tightrope between offering entertaining and alluring attractions to the public while simultaneously keeping attackers at bay.</description><pubDate>Mon, 11 Mar 2024 08:14:48 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/weighing-development-k12-risk-assessment/"><guid isPermaLink="false">d966f995-6ada-43c6-ae7f-02ec8cb93a63</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/weighing-development-k12-risk-assessment/</link><title>Weighing Student Development in K-12 Behavioral Threat Assessment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-meyer-behavioral-threat-assessment-884x500.jpg' style='float: left' alt=''/&gt;As children grow and learn, they often test new behaviors, push boundaries, and overreact to stressors. Behavioral threat assessment and management teams must take these growing pains into account when analyzing threats. </description><pubDate>Fri, 01 Mar 2024 09:40:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/school-principals-band-together/"><guid isPermaLink="false">d84f5d67-f06a-4a8c-8e11-ab23acb85657</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/school-principals-band-together/</link><title>School Principals Band Together to Offer Support After School Violence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-meyer-principal-recovery-network-884x500.gif' style='float: left' alt=''/&gt;A group of principals who led their K-12 schools through a post-violence recovery process are part of a network that helps connect other administrators with resources and best practices after incidents.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/jakson-phillips-certification-profile/"><guid isPermaLink="false">0b7f429e-352d-4b79-8443-7608541be9e1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/jakson-phillips-certification-profile/</link><title>Certification Profile: Jakson Phillips, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-jakson-phillips-certifcation-profile.jpg' style='float: left' alt=''/&gt;Jakson Phillips, CPP, PCI, PSP, was attracted to the security sector because of the great opportunities for growth, both personally and professionally. </description><pubDate>Thu, 07 Mar 2024 11:41:43 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/context-perception-school-security/"><guid isPermaLink="false">183afd53-d345-4fad-ae42-d7a359caa52b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/context-perception-school-security/</link><title>Context and Perception Matter in School Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-bliesner-perceptions-and-context-for-school-security04-884x500.gif' style='float: left' alt=''/&gt;School violence has fundamentally altered the modern K-12 experience in both the general perception of school safety and the operational reality of the school day.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/fast-facts-behaviors-of-concern/"><guid isPermaLink="false">91eab9ba-ba24-48c8-8021-6120cea304d3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/fast-facts-behaviors-of-concern/</link><title>Fast Facts: 4 Student Behavioral Changes That Spark Concern</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-4-student-behavioral-changes-that-spark-concern-03.gif' style='float: left' alt=''/&gt;Behavioral threat assessment for children can be challenging because they are still learning how to regulate their emotions. These four behaviors should spark further investigation. </description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/k12-safety-challenges-technology-design/"><guid isPermaLink="false">3e709e11-83bb-4708-9b35-a2f1d938f30a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/k12-safety-challenges-technology-design/</link><title>Navigating the Challenges of K-12 Safety with Technology and Design</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-tech-and-design.jpg' style='float: left' alt=''/&gt;When security design harmonizes with architectural interventions, we can proactively enhance safety and positively impact a student's educational experience.  </description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/editors-note-collaborative-teams/"><guid isPermaLink="false">e965c4c2-a547-417d-80db-8790ebf429f1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/editors-note-collaborative-teams/</link><title>Editor’s Note: The Hidden Potential of Collaborative Teams</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-anderson-editors-note-collaborative-teams-01.jpg' style='float: left' alt=''/&gt;While big problems require big solutions, getting humans to cooperate, collaborate, and move things forward is an ongoing challenge.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/case-study-key-cabinet-school-security/"><guid isPermaLink="false">28392eab-bcdc-45a6-b487-40dd2257481f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/case-study-key-cabinet-school-security/</link><title>Saving Time and Simplifying Processes with Key Cabinets in a Texas School District</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-school-security-case-study-884x500.gif' style='float: left' alt=''/&gt;For a geographically widespread school district in Texas, integrating intelligent key cabinets enables streamlined access during emergencies and community events alike.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/crisis-intervention-in-schools/"><guid isPermaLink="false">2df6a400-b060-430e-b93f-c599f6005f76</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/crisis-intervention-in-schools/</link><title>How Crisis Intervention Informs Proactive Security in Schools</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-crisis-intervention-in-schools.jpg' style='float: left' alt=''/&gt;Students—with all the stressors they face daily—can find connection-driven crisis intervention techniques supportive and comforting when personal challenges become overwhelming.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/4-strategic-steps/"><guid isPermaLink="false">c92341e3-d33f-4cf8-a152-91f4e1746dde</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/4-strategic-steps/</link><title>4 Strategic Steps to Move School Security Forward</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-hong-strategic-steps-to-move-school-safety-forward-884x500.gif' style='float: left' alt=''/&gt;According to a recent survey, 67 percent of both K-12 school parents and teachers were much more concerned about safety in 2023 than they were five years ago.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/school-security-layers/"><guid isPermaLink="false">2948bd5d-41b6-4d5e-a3cb-1c74ee177681</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/school-security-layers/</link><title>Strengthening Schools: A Look at K-12 Security Layers and Emergency Preparedness</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-sm-schools-grace-layers-of-school-security-884x500.jpg' style='float: left' alt=''/&gt;In school security, there are five layers of protection to consider: districtwide, property perimeter, parking lot perimeter, building perimeter, and classroom or interior perimeter. </description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/early-detection-privacy/"><guid isPermaLink="false">33c6b8ac-fcf3-4d42-a6c4-ee2a3663db19</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/03/schools/early-detection-privacy/</link><title>A New Approach to Early Detection and Privacy in School Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/march/0324-bolin-early-detection-in-schools.jpg' style='float: left' alt=''/&gt;Respecting the privacy of both staff and students requires a delicate balance in how a system is deployed and utilized.</description><pubDate>Fri, 01 Mar 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/fast-facts/"><guid isPermaLink="false">9fd12a10-e3f1-46c6-bd69-cf3f1ad1a5e3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/fast-facts/</link><title>Fast Facts: Security Technology and Using Staff More Efficiently</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-access-control-research.gif' style='float: left' alt=''/&gt;One of the promises of implementing security technology solutions is that they will allow organizations to use security personnel more efficiently than the status quo.</description><pubDate>Mon, 19 Feb 2024 09:01:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/infographic-visitor-management-aspects/"><guid isPermaLink="false">7a083206-497c-481d-b5a5-a1c7cadb2259</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/infographic-visitor-management-aspects/</link><title>Infographic: Examining Security Aspects of Visitor Management </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/access-control-research/0224-infographic-access-control-visitor-management-01.gif' style='float: left' alt=''/&gt;Here’s a quick look at what organizations are doing to manage visitor access control and what technology and practices contribute to overall access control effectiveness. </description><pubDate>Mon, 19 Feb 2024 09:01:42 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/ways-to-make-access-control-more-effective/"><guid isPermaLink="false">97f19f41-9bfc-4bcc-bfcc-9ea18cac6d95</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/ways-to-make-access-control-more-effective/</link><title>4 Ways to Make Access Control Systems More Effective</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/access-control-research/0224-ways-make-access-control-systems-more-effective-01.gif' style='float: left' alt=''/&gt;What practices lead to greater confidence that an access control system is highly effective at protecting an organization?</description><pubDate>Mon, 19 Feb 2024 09:01:42 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/access-control-consultants/"><guid isPermaLink="false">d4e7ade8-c9d8-4c63-9cca-660e93fc6d7b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/access-control/access-control-consultants/</link><title>What’s Important About Access Control Systems? Consultants Weigh In </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-access-control-consultants.jpg' style='float: left' alt=''/&gt;The 2023 ASIS research on access control systems asked consultants for their insights and opinions on what organizations get right and what they can improve on.</description><pubDate>Mon, 19 Feb 2024 09:01:42 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/book-review-rise-of-security/"><guid isPermaLink="false">ed820ad9-31f5-4ab6-bdbe-8832109c4878</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/book-review-rise-of-security/</link><title>Book Review: The Rise of Security and Why We Always Want More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-book-review-the-rise-of-security-featured-image.jpg' style='float: left' alt=''/&gt;What author Mike Croll brings to this well-written book is how security is an evolutionary process, interweaving with a culture of preparedness, that changes almost daily.</description><pubDate>Fri, 16 Feb 2024 09:00:24 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/industry-news/"><guid isPermaLink="false">973976b5-0642-4bf3-a8b4-a66786e4375c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/industry-news/</link><title>Industry News: Security Management Platform Eases Friction at Brazilian Airport</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224---industry-news---genetec---airport.jpg' style='float: left' alt=''/&gt;Brazil’s Hercilio Luz International Airport in Floripa selected Genetec’s unified security platform, Security Center, for support in managing the airport’s physical security infrastructure and provide operational insights.</description><pubDate>Fri, 16 Feb 2024 09:00:24 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/fast-facts-safe-retail-workers/"><guid isPermaLink="false">35f8f9a2-29e5-4798-be92-a9c1e7141ba1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/fast-facts-safe-retail-workers/</link><title>Fast Facts: What Helps Retail Workers Feel Safe?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-mosqueda-what-helps-retail-workers-feel-safe-2.gif' style='float: left' alt=''/&gt;Violence in retail stores has been on the rise for the past five years. How can retailers support staff and keep employees and customers safe?</description><pubDate>Mon, 12 Feb 2024 07:52:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/infographic-shoplifter-aggression/"><guid isPermaLink="false">94a2583a-4d8f-47c8-8fbe-b28b04306a75</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/infographic-shoplifter-aggression/</link><title>Shoplifter Aggression is on the Rise, Survey Finds </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-sm-mosqueda-infographic-01.gif' style='float: left' alt=''/&gt;Violent acts in retail stores can have widespread impacts on customers, employees, a retailer’s reputation, and the local community.</description><pubDate>Mon, 12 Feb 2024 07:52:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/soft-skills-retail-safety/"><guid isPermaLink="false">9093f27a-c923-4fcf-af97-a2859fc4333e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/wpv-retail/soft-skills-retail-safety/</link><title>Soft Skills Pay Off for Retailers Creating Safer Workplaces</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-sm-mosqueda-main-article-884x500.gif' style='float: left' alt=''/&gt;Thieves, active shooters, and abusive customers in retail stores have store staff feeling unsafe and on edge. Retailers are finding benefits in stressing that employees not confront these customers. </description><pubDate>Mon, 12 Feb 2024 07:52:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/eva-nolle-certification-profile/"><guid isPermaLink="false">e37fd836-3c27-4dfb-b0fd-0eb961fd412a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/eva-nolle-certification-profile/</link><title>Certification Profile: Eva Nolle, CPP, PCI</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/0224-eva-nolle-certifcation-profile.jpg' style='float: left' alt=''/&gt;Eva Nolle, CPP, PSP, found that certification allows her to more effectively establish a baseline of understanding with other security professionals who are certified.</description><pubDate>Fri, 09 Feb 2024 14:13:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/02/legal-report/"><guid isPermaLink="false">7622f865-7aef-40aa-bba7-929c43dcc136</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/02/legal-report/</link><title>Legal Report: Italy Increases Fines to €60,000 for Destroyed Cultural Heritage Sites</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/february/sm-0224-legal-report.jpg' style='float: left' alt=''/&gt;Also this month, a video game manufacturer settled a lawsuit about alleged discrimination against female employees; a concealed carry ban was blocked in California; and Amazon was fined for overly surveilling its workers at a warehouse.</description><pubDate>Mon, 05 Feb 2024 08:19:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/fast-facts-4-challenges-renewable-energy-transition/"><guid isPermaLink="false">ad7f1119-d746-4b13-811d-0a31f075dc33</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/fast-facts-4-challenges-renewable-energy-transition/</link><title>Fast Facts: 4 Challenges in the Renewable Energy Transition</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-sectech-fast-facts-4-challenges-in-the-renewable-energy-480x270.gif' style='float: left' alt=''/&gt;Global governments have pledged to triple their renewable energy capacity by 2030. But four challenges may disrupt their efforts.</description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/why-chinas-global-electric-project-has-national-security-experts-on-alert/"><guid isPermaLink="false">19b8fa62-5274-4055-bdc2-59c1a857a741</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/why-chinas-global-electric-project-has-national-security-experts-on-alert/</link><title>Why China’s Global Electric Project Has National Security Experts on Alert</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-sectech-gates-884x500.jpg' style='float: left' alt=''/&gt;China initiated an ambitious project in 2015: creating a global electric grid. New research assesses where the project stands and its national security ramifications for the rest of the world.</description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/whats-a-watt/"><guid isPermaLink="false">756cd074-45ae-467b-9f5f-e59cb74ffc04</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/whats-a-watt/</link><title>What’s a Watt?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-sectech-electricity-consumption-884x500.gif' style='float: left' alt=''/&gt;Snag a snapshot of how power is generated today and what the renewable energy future of tomorrow could look like. </description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/internet-of-things-increasing-threats-electric-grid/"><guid isPermaLink="false">2d5b313b-929c-4582-bd45-b589a4fcc333</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/internet-of-things-increasing-threats-electric-grid/</link><title>The Internet of Things and Increasing Threats to the Electric Grid</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-gordon-sectech-iot-power-grid.jpg' style='float: left' alt=''/&gt;Increased connectivity also increases the electric grid’s attack surface, exposing infrastructure to new vulnerabilities that cybercriminals can exploit. Once exploited, threat actors can hijack these devices to manipulate energy flows, disrupt communication networks, and cause a loss of view.</description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/meeting-living-building-challenge/"><guid isPermaLink="false">9218c34e-b40c-4c00-bb67-7d885ce619b7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/meeting-living-building-challenge/</link><title>Meeting a Living Building Challenge</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-axis-sustainable-building.jpg' style='float: left' alt=''/&gt;Engineering firm PAE relies on Axis multi-sensor cameras to monitor surrounding streets and interior hallways of its sustainable Portland headquarters. </description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/girding-the-grid/"><guid isPermaLink="false">63516ef9-1fb0-468c-89d6-ebaab31c1128</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/girding-the-grid/</link><title>Girding the Grid</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-tis-sectech-gips-and-harrell-884x500.jpg' style='float: left' alt=''/&gt;The electric power infrastructure faces a greater diversity and sophistication of threats than ever. But there are promising developments in the security industry that could mitigate them.</description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/becoming-more-reliable-resilient-enhanced-substation-security/"><guid isPermaLink="false">5ecb1f2a-490d-4576-b571-310e41be41ac</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/becoming-more-reliable-resilient-enhanced-substation-security/</link><title>Becoming More Reliable and Resilient with Enhanced Substation Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2024/february/0224-sectech-isquith-substation-security.jpg' style='float: left' alt=''/&gt;Remote and urban areas provide individuals—or groups—multiple vantage points for attacks and several escape routes. New technology solutions, however, can help.</description><pubDate>Thu, 01 Feb 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/marketplace/"><guid isPermaLink="false">a8c39c11-f529-4574-b014-dbe88ccccaea</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/marketplace/</link><title>Marketplace: Self-Service Kiosks, ONVIF Add-On, Security Scanners, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0224-sm-marketplace-884x500.gif' style='float: left' alt=''/&gt;What security solutions entered the market recently? Security Management collected a selection of new or updated solutions that you should be aware of.</description><pubDate>Mon, 29 Jan 2024 14:04:04 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/balancing-ai-innovation-and-regulation/"><guid isPermaLink="false">50e6d36b-73bd-4b8a-aaaf-e64d644f347e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/balancing-ai-innovation-and-regulation/</link><title>Balancing AI Innovation and Regulation: The Potential Impact on U.S. Security Companies and Practitioners</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-balancing-ai-innovation-and-regulation-the-potential-impact-on-us-security-companies-and-practitioners-884x500.jpg' style='float: left' alt=''/&gt;To prepare for impending AI regulations, security companies should track the implementation of the EU's AI Act and begin anticipating similar policies in the United States. </description><pubDate>Fri, 26 Jan 2024 07:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/asis-news/"><guid isPermaLink="false">41e421c4-e629-42ec-a31b-dafb45fde5f8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/asis-news/</link><title>ASIS News: Opportunities to Connect and Grow </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-asis-leadership-exchange.jpg' style='float: left' alt=''/&gt;Leadership Exchange brings together ASIS volunteers from across the globe to exchange ideas and dive deeper into ASIS’s initiatives and strategic direction.</description><pubDate>Fri, 26 Jan 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/how-to-establish-a-policy-for-using-naloxone-a-lifesaving-tool/"><guid isPermaLink="false">f70b1b07-f37b-4714-9bcc-5165ec828a29</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/how-to-establish-a-policy-for-using-naloxone-a-lifesaving-tool/</link><title>How to Establish a Policy for Using Naloxone, a Lifesaving Tool</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-how-to-establish-a-policy-for-using-naloxone-a-lifesaving-tool-884x500.jpg' style='float: left' alt=''/&gt;The administration of naloxone (Narcan) by a trained individual can save the life of a person undergoing an opioid overdose. Organizations should establish a protocol for training and administering Narcan in the event of a medical emergency.</description><pubDate>Wed, 24 Jan 2024 09:49:55 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/fast-facts-healthcare-cyberattacks/"><guid isPermaLink="false">2409f83b-fd75-461a-b637-c526e850b000</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/fast-facts-healthcare-cyberattacks/</link><title>Fast Facts: 4 Common Cyberattacks Hitting Healthcare</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-mosqueda-4-common-cyberattacks-hitting-healthcare.gif' style='float: left' alt=''/&gt;Healthcare organizations often see certain kinds of cyberattacks that target their systems. If successful, these attacks can be costly to both the bottom line and patients’ lives.</description><pubDate>Mon, 22 Jan 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/ai-automation-insider-risks/"><guid isPermaLink="false">35344233-3b5c-4b27-be0a-de62f3ffc114</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/ai-automation-insider-risks/</link><title>Minimizing Insider Risks at Hospitals With AI-Driven Automation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-healthcare-evans.jpg' style='float: left' alt=''/&gt;When healthcare organizations are managing access control for temporary staff or contractors, automated solutions and routines can support proper credentialing, onboarding, and offboarding. </description><pubDate>Mon, 22 Jan 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/cyberattack-patient-safety/"><guid isPermaLink="false">d12d5e74-84ff-4e4a-b95f-fcdd6b5530f0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/cyberattack-patient-safety/</link><title>Trending Cyberattacks that Impact Patient Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-healthcare-and-cyber-infographic-listicle-884x500.gif' style='float: left' alt=''/&gt;Certain cyberattacks are more likely to disrupt patient care and impact patient care delivery. The latest Ponemon Institute survey on this topic looks at the trending types of attacks on healthcare organizations.</description><pubDate>Mon, 22 Jan 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/healthcare-cybercriminals-patient-health/"><guid isPermaLink="false">c469dacc-6a7c-4eda-928f-9b74effcad98</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/healthcare-cybersecurity/healthcare-cybercriminals-patient-health/</link><title>What Makes Healthcare So Attractive to Cybercriminals?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-mosqueda-healthcare-what-makes-healthcare-attractive-cyberattacks.jpg' style='float: left' alt=''/&gt;While medical workers are often focused on saving lives, healthcare organizations have increasingly had to juggle attacks from the viruses wielded by cyberattackers.</description><pubDate>Mon, 22 Jan 2024 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/book-review-off-the-edge-flat-earthers-conspiracy-culture-and-why-people-will-believe-anything/"><guid isPermaLink="false">5ada65e6-18bb-4928-b879-a608357afd55</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/book-review-off-the-edge-flat-earthers-conspiracy-culture-and-why-people-will-believe-anything/</link><title>Book Review: Off the Edge: Flat Earthers, Conspiracy Culture, and Why People Will Believe Anything</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-book-review-off-the-edge-featured-image.jpg' style='float: left' alt=''/&gt;People latch onto conspiracy theories because they help believers feel safe by providing an explanation for things that feel incomprehensible, writes author Kelly Weill. </description><pubDate>Thu, 18 Jan 2024 08:06:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/video-how-dogs-noses-work/"><guid isPermaLink="false">8a2a7aab-9c5f-47aa-8c6d-08cc873bcf2a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/video-how-dogs-noses-work/</link><title>Fast Facts: How Dogs’ Noses Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-gates-how-dogs-noses-work.gif' style='float: left' alt=''/&gt;Humans generally use their sense of sight to understand the world around them. Dogs, however, depend on their robust sense of smell to give their world context. </description><pubDate>Mon, 15 Jan 2024 08:17:02 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/popular-working-dogs-for-security/"><guid isPermaLink="false">adf78945-b6b4-4e77-a7b2-281d5fd7f448</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/popular-working-dogs-for-security/</link><title>Best in Security: The Most Popular Types of Working Dogs in Action </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-gates-listicle-about-most-popular-dog-breeds-for-security-roles-884x500-v3.gif' style='float: left' alt=''/&gt;Humans have been training dogs to work alongside them for hundreds of years. Here are the breeds of dogs that you often see trained to work in the security field.</description><pubDate>Mon, 15 Jan 2024 08:17:02 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/k9-security-trauma-therapy/"><guid isPermaLink="false">7e5f561a-3b54-438a-ad49-3e97e4bab109</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/k9-security-trauma-therapy/</link><title>When Dogs Aren’t Hunting or Hurting, but Healing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-k9-therapy-dogs.jpg' style='float: left' alt=''/&gt;In some universities and organizations, K9 units are deployed to protect emotional health and safety, not just physical safety.</description><pubDate>Mon, 15 Jan 2024 08:17:02 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/cy-oatridge-cpp-aiming-for-an-inclusive-purposeful-strategy/"><guid isPermaLink="false">05fd8a9b-5622-4293-a45b-bc7254f4aa6a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/cy-oatridge-cpp-aiming-for-an-inclusive-purposeful-strategy/</link><title>Cy Oatridge, CPP: Aiming for an Inclusive, Purposeful Strategy </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-cy-oatridge-02.jpg' style='float: left' alt=''/&gt;As the 2024 ASIS Global Board of Directors President, Cy Oatridge, CPP, is guiding the development of a new strategic plan for the association and expanding the progress that ASIS members and staff have made in recent years.</description><pubDate>Tue, 16 Jan 2024 11:22:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/k9-security-detect-deter-deescalate/"><guid isPermaLink="false">7228142c-b942-4361-8fd7-23e470f22db4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/k9/k9-security-detect-deter-deescalate/</link><title>Security’s Best Friend: How K9s Detect, Deter, and De-escalate</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-feature-k9-security-training-and-use-884x500.jpg' style='float: left' alt=''/&gt;In a world of IT and drones, not-so-old-fashioned K9 units are being used more and more to detect explosives and contraband, apprehend security threats, and secure perimeters.  </description><pubDate>Mon, 15 Jan 2024 08:17:02 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/options-based-responses-to-violent-threats/"><guid isPermaLink="false">b1845e0c-9645-444f-a483-5d04fb1f4f81</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/options-based-responses-to-violent-threats/</link><title>Options-Based Responses to Violent Threats Against Schools</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-threat-to-schools-06a.gif' style='float: left' alt=''/&gt;To enhance preparedness and situational awareness, schools can leverage comprehensive all-hazards emergency preparedness programs and options-based training.</description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/dark-green-ideologies/"><guid isPermaLink="false">81392b61-1d66-4a1d-b9c2-98af5a96a803</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/dark-green-ideologies/</link><title>Climate Change and the Rise of Dark Green Ideologies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-dark-green-extremism-04-a.gif' style='float: left' alt=''/&gt;In addition to promoting individual conflict, climate change can serve as a driver of extremism, terrorism, civil unrest, and war.  Climate-related violence potential exists along the entire extremist continuum from the far-left to the far-right.</description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/impact-opportunities-geopolitical-climate/"><guid isPermaLink="false">9871d8af-65eb-4bec-8750-71d6f6bb0ca2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/impact-opportunities-geopolitical-climate/</link><title>The Impact and Opportunities of the Geopolitical Climate: Try Not to Overreact</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-concannon-current-geopolitical-climate-01.jpg' style='float: left' alt=''/&gt;When stressed again and again by an eroded sense of control, we discover that our reactions to threats become more difficult to regulate.</description><pubDate>Mon, 01 Jan 2024 09:26:49 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/leaderless-resistance/"><guid isPermaLink="false">410f9545-535d-4f5f-a627-f444739d924e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/leaderless-resistance/</link><title>Leaderless Resistance: Understanding and Countering an Amorphous Threat </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-extremism-leaderless-resistance.gif' style='float: left' alt=''/&gt;The most likely terrorist threat today comes from lone assailants and small cells operating under the principles of leaderless resistance. </description><pubDate>Mon, 01 Jan 2024 09:26:49 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/intelligence-to-address-extremism/"><guid isPermaLink="false">2ef14fe9-7b07-4822-a9cd-ac54cc713ad9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/intelligence-to-address-extremism/</link><title>Intelligence to Address Extremism: Look for What Matters Most</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-miles-extremism-intelligence-cycle.jpg' style='float: left' alt=''/&gt;Extremism and hate-related criminal activity are on the rise, threatening organizations and endangering security efforts. By employing the intelligence cycle and leveraging the resources you have at hand, it is possible to develop a better picture for you and your key stakeholders.</description><pubDate>Mon, 01 Jan 2024 09:26:49 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/mental-health-extremism/"><guid isPermaLink="false">29924c88-7ae7-4679-a44a-00f56edaf6e0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/mental-health-extremism/</link><title>What Is the Role of Mental Health in Extremism?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-hurst-mental-health-and-extremism-risk-884x500.jpg' style='float: left' alt=''/&gt;Higher exposure to trauma leads to a greater likelihood of developing post-traumatic stress disorder (PTSD), which is associated with increased anger and hostility and greater urge for revenge versus reconciliation, behaviors that increase the likelihood of supporting violent extremism. </description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/fast-facts-intelligence-gathering/"><guid isPermaLink="false">1d32e1b8-aef5-4cbb-b180-4f9dec2bc24c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/fast-facts-intelligence-gathering/</link><title>Fast Facts: 9 Methods to Gather Threat Intelligence </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-fast-facts-types-of-intel-480x270.gif' style='float: left' alt=''/&gt;OSINT, HUMINT, SOCMINT…. There are many methods of security intelligence gathering out there, but what do they all mean? </description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/levels-of-security-glass/"><guid isPermaLink="false">39dc4886-5c7c-411e-92ff-a9895d426fae</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/levels-of-security-glass/</link><title>Understanding the 3 Levels of Security Glass</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-boon-edam-3-levels-of-security-glass-884x500.jpg' style='float: left' alt=''/&gt;To help clarify terminology around the differing glass solutions, here is a quick overview of three levels of security glass.</description><pubDate>Mon, 01 Jan 2024 09:26:49 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/editors-note-untruths/"><guid isPermaLink="false">3c6d09a6-82d7-4a52-a63b-0a66b1a72c80</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/editors-note-untruths/</link><title>Editor's Note: The Proliferation of Dangerous Untruths  </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-editors-note-extremism-and-political-instability-topic-884x500.gif' style='float: left' alt=''/&gt;As people continue to want to believe conspiracy theories about the world and one another, the workplace might have a calming influence.  </description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/peace-stability-partnerships-with-communities/"><guid isPermaLink="false">027c8b29-2722-4930-85a6-9da5c0273b1c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/peace-stability-partnerships-with-communities/</link><title>Lasting Peace and Stability Require Engagement with Communities and Local Leaders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-kessels-community-engagement-884x500.jpg' style='float: left' alt=''/&gt;To effectively prevent and mitigate terrorism, we need for governments, civil society, and the private sector to work together to address the conditions of instability and injustice that allow terrorist groups and ideologies to emerge and expand in the first place.</description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/terrorism-sahel/"><guid isPermaLink="false">44e7caf7-e6ad-4a78-8280-c15e0cad93f3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/terrorism-sahel/</link><title>Infographic: How Terrorism is Growing in the Sahel </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/extremism/0124-extremism-infographic-01.gif' style='float: left' alt=''/&gt;Terrorism deaths in the Sahel region of Africa have risen by more than 2,000 percent between 2007 and 2022. </description><pubDate>Mon, 01 Jan 2024 09:26:49 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/cultural-properties-civil-unrest/"><guid isPermaLink="false">d625e3ca-f8e6-4785-a555-328d7bd4f279</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/cultural-properties-civil-unrest/</link><title>Preparing for Civil Unrest and War in Cultural Properties</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-ratliff-cultural-properties-in-wartime-884x500-v1.jpg' style='float: left' alt=''/&gt;Cultural properties are interrelated with people, and their protection is fundamental to human rights, community and social identity, and a sense of place and wellbeing. </description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/forensic-tactical-linguistics/"><guid isPermaLink="false">618469eb-7150-4ff7-9426-a648de2c8d3f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/forensic-tactical-linguistics/</link><title>Practical Forensic and Tactical Linguistics in Investigations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-kupper-extremism-forensic-linguistics.jpg' style='float: left' alt=''/&gt;Tactical linguistics is a pre-incident approach that assists in preventing crimes and that can be applied in a threat mitigation environment.</description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/golden-rules-redefining-counterterrorism/"><guid isPermaLink="false">84394d87-291e-4da1-bc47-87004c1da8de</guid><link>http://www.asisonline.org/security-management-magazine/articles/2024/01/extremism/golden-rules-redefining-counterterrorism/</link><title>6 Golden Rules for Redefining Your Counterterrorism Priorities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2024/january/0124-sm-extremism-ogbuehi-counterterrorism-priorities-884x500.jpg' style='float: left' alt=''/&gt;Security executives can help ensure that their organizations have proactive measures in place to minimize the impact of terrorist attacks.</description><pubDate>Mon, 01 Jan 2024 09:26:48 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-speed/"><guid isPermaLink="false">cf678070-122d-4373-a0a4-be7548978278</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-speed/</link><title>Vulnerabilities Aren’t New, but the Speed of Incidents Is</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-cyber-response-isbitski-speed-of-cyberattacks-884x500.gif' style='float: left' alt=''/&gt;In the wake of recent high-profile cyberattacks, organizations need faster ways to detect and respond to potential security incidents.</description><pubDate>Mon, 18 Dec 2023 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/heightened-board-involvement-cybersecurity/"><guid isPermaLink="false">e623487f-7bf9-4190-b6ad-b3fdadaada46</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/heightened-board-involvement-cybersecurity/</link><title>How to Prepare for Heightened Board Involvement in Cybersecurity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-cyber-response-qa-about-board-involvement-884x500.jpg' style='float: left' alt=''/&gt;A new SEC rule and cyber-related charges against SolarWinds are a reminder that the responsibility for cybersecurity cannot rest solely on the CISO’s shoulders.</description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/asis-news-meet-your-2024-leadership/"><guid isPermaLink="false">37e2b8df-7950-4113-ac04-67e140836c03</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/asis-news-meet-your-2024-leadership/</link><title>ASIS News: Meet Your 2024 Leadership </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1224-asis-news-02.jpg' style='float: left' alt=''/&gt;With 2024 just around the corner, ASIS welcomes a new class of security leaders to its global and regional boards.  </description><pubDate>Wed, 20 Dec 2023 08:39:05 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/infographic-proactive-incident-response/"><guid isPermaLink="false">5b3b3d5a-cb88-4f7c-9382-8adc762958ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/infographic-proactive-incident-response/</link><title>How Proactive Incident Response Planning Reduces Breach Costs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-cyber-response-infographic01.jpg' style='float: left' alt=''/&gt;Incident response plans can save an organization upwards of $232,000 on the cost of a breach, according to research from IBM. </description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/video-data-breach-costs/"><guid isPermaLink="false">83d5af34-f66b-4b8b-9565-e783ac98b3a6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/video-data-breach-costs/</link><title>Fast Facts: How Much Do Data Breaches Cost? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/how-much-do-data-breaches-cost.gif' style='float: left' alt=''/&gt;The cost to detect and escalate breaches is on the rise, especially as organizations pursue longer and more complex breach investigations.</description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/breaking-silos/"><guid isPermaLink="false">80b89ba7-7171-4c0c-810c-ba1b2305abcd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/breaking-silos/</link><title>Breaking Silos Leads to Better Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-broomhead-breaking-silos-physical-cyber.gif' style='float: left' alt=''/&gt;The efficiencies that can be gained by having a coordinated cybersecurity plan across similar teams are substantial and wide-ranging, from the selection of tools used in performing cyber hygiene to internal training of employees to having a coordinated response plan already in place.  </description><pubDate>Mon, 18 Dec 2023 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-skill-gap-ceos/"><guid isPermaLink="false">ec0aef60-a439-4cfc-800d-3a42ed98d681</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-skill-gap-ceos/</link><title>Cybersecurity is a Serious Skill Gap for CEOs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-shrm-trade-ceos-lack-knowledge-of-cybersecurity-art1.jpg' style='float: left' alt=''/&gt;Recent research suggests there’s a troubling gap in CEOs’ extensive skill sets that’s placing their organizations at risk: how to prepare and respond to the increasingly menacing problem of cybercrime.</description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/board-cyber-scrutiny/"><guid isPermaLink="false">f11bc184-4c1b-46a4-86d1-ebf82b190d8e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/board-cyber-scrutiny/</link><title>Boards' Cyber Scrutiny May Grow</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-shrm-trade-ceos-lack-knowledge-of-cybersecurity-art2.jpg' style='float: left' alt=''/&gt;A new SEC rule issued is likely to heighten boards' interest and engagement in cybersecurity even further—and raise expectations for how CEOs report to boards on their companies’ cybersecurity strategies and practices.</description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-response-escalation/"><guid isPermaLink="false">77575e3a-da43-4606-94f0-6e3e2be9351f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-response-escalation/</link><title>For Cyber Incident Response, Bad News Needs to Travel Faster </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-meyer-cyber-incident-response.jpg' style='float: left' alt=''/&gt;In IT and security incidents, teams often hesitate to escalate issues up the chain of command, trying to fix them in-house first. This delay can incur heavy costs. </description><pubDate>Mon, 18 Dec 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/legal-report-eu-member-states-allowed-to-ban-employees-religious-garb/"><guid isPermaLink="false">e1024727-cbef-4a5d-9627-94c8585fc5be</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/legal-report-eu-member-states-allowed-to-ban-employees-religious-garb/</link><title>Legal Report: EU Member States Allowed to Ban Employees’ Religious Garb</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-legal-report.jpg' style='float: left' alt=''/&gt;The EU’s Court of Justice ruled that its member states can prohibit employees from wearing religious symbols, including hijabs, while on the job.</description><pubDate>Thu, 14 Dec 2023 11:29:28 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/integration-investigation-speed-retail/"><guid isPermaLink="false">db659ad9-fb1a-4336-89a5-ea5fa2965b74</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/integration-investigation-speed-retail/</link><title>How Retailers Leverage Integration to Speed Internal Theft Investigations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-thomas-theft-investigations-884x500.jpg' style='float: left' alt=''/&gt;Even as concerns grow over organized retail crime, insider theft remains a primary concern for retailers trying to combat shrinkage. </description><pubDate>Mon, 11 Dec 2023 08:25:26 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/2022-retail-employee-theft-video/"><guid isPermaLink="false">a46c43cb-5a2b-4d0c-8b9c-e636d7a93510</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/2022-retail-employee-theft-video/</link><title>By the Numbers: Retail Employee Theft in 2022</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-mosqueda-fast-facts-retail-employee-theft.gif' style='float: left' alt=''/&gt;While some lost revenue for retailers can be attributed to shoplifters or clerical errors, a significant amount of losses are also caused by dishonest employees who steal from the stores they work in.</description><pubDate>Mon, 11 Dec 2023 08:25:26 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/book-review-1-leadership/"><guid isPermaLink="false">73db2586-a356-4a36-823d-471a44bc31c3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/book-review-1-leadership/</link><title>Book Review: 1% Leadership: Master the Small, Daily Improvements that Set Great Leaders Apart</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-book-review-1leadership-featured-image.jpg' style='float: left' alt=''/&gt;In 1% Leadership, author Andy Ellis takes the attitude that real cultural change in an organization is, in fact, a complex endeavor. And firms that try to use a large, cookie-cutter approach will inevitably fail.  </description><pubDate>Wed, 13 Dec 2023 08:00:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/retail-insiders-steal/"><guid isPermaLink="false">c3ce5692-9118-4f24-b532-000ddfd335bf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/retail-insiders-steal/</link><title>How to Steal Like a Retail Insider</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-listicle-refund-fraud.gif' style='float: left' alt=''/&gt;Dishonest retail employees have their way of cashing in on insider knowledge and access, but retailers have their methods of catching them, too.</description><pubDate>Mon, 11 Dec 2023 08:25:27 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/retail-intelligence-objectives/"><guid isPermaLink="false">2d76dffe-8e37-47d1-ba23-cef292f1cdb6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/retail-intelligence-objectives/</link><title>How Intelligence and Clear Objectives Arm Retailers to Battle Crime</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-stark-intelligence-objectives-retail-crime-03.gif' style='float: left' alt=''/&gt;Executives are starting to evaluate and implement strategies they would have never before considered to confront the current surge of retail crime and violence head on.</description><pubDate>Mon, 11 Dec 2023 08:25:27 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/technology-solutions-retail-theft/"><guid isPermaLink="false">0c9c6708-ad61-49ea-86ca-886a2e8e3635</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/technology-solutions-retail-theft/</link><title>4 Technology Solutions for Deterring Retail Theft</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-hong-retail-theft-deterrents-884x500.jpg' style='float: left' alt=''/&gt;Technological advances can address the modern demands of retailers, including surveillance, access control, customer experience, and point-of-sale. They can also help seamlessly make stores safer and less susceptible to theft. </description><pubDate>Mon, 11 Dec 2023 08:25:27 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/internal-theft-sours-retail-relationships/"><guid isPermaLink="false">3b6f1393-175d-4442-bb87-ad0b986da807</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/retail-theft/internal-theft-sours-retail-relationships/</link><title>Hello Sweetheart: Internal Theft Sours Retail Relationships</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-sm-mosqueda-retail-employee-theft-884x500.jpg' style='float: left' alt=''/&gt;Keeping employees honest isn’t just about a paycheck. Dishonest employees who steal do so for a number of reasons, from opportunity to vengeance. </description><pubDate>Mon, 11 Dec 2023 08:25:27 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/12/industry-news-remote-guard-services-provide-proof-to-arrest-missing-menaces/"><guid isPermaLink="false">891536c0-09f3-431e-ad45-95a97953b0cf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/12/industry-news-remote-guard-services-provide-proof-to-arrest-missing-menaces/</link><title>Industry News: Remote Guard Services Provide Proof to Arrest Missing Menaces </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/1223-industry-news.jpg' style='float: left' alt=''/&gt;A remote guard services provider in California helped local law enforcement resolve an assault and robbery.</description><pubDate>Fri, 08 Dec 2023 16:12:15 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/managing-digital-risk-with-social-media-governance/"><guid isPermaLink="false">481a6e30-9b61-405c-a0c6-198b46f2d7cf</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/managing-digital-risk-with-social-media-governance/</link><title>Managing Digital Risk with Social Media Governance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/december/1223-sectech-netography-monitoring-social-media-traffic-on-your-network-884x500.jpg' style='float: left' alt=''/&gt;Is it possible to eliminate the risks posed by social media entirely? Probably not, but there can be a happy medium by implementing best practices for social media governance.</description><pubDate>Thu, 30 Nov 2023 10:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/tiktok-users-increasingly-use-site-for-news/"><guid isPermaLink="false">0d44ed1b-6923-4b53-92f8-096c59b21594</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/tiktok-users-increasingly-use-site-for-news/</link><title>TikTok Users Increasingly Use the Site for News Updates</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/december/1223-sectech-gates-fast-facts-tiktok-news-users.gif' style='float: left' alt=''/&gt;In contrast to other social media sites, a growing share of users say they regularly get news on TikTok.</description><pubDate>Thu, 30 Nov 2023 10:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/the-future-of-corporate-security-a-fusion-of-innovation-and-expertise-in-2033/"><guid isPermaLink="false">84cda78c-49d2-43a4-98a7-e1837d14778b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/the-future-of-corporate-security-a-fusion-of-innovation-and-expertise-in-2033/</link><title>The Future of Corporate Security: A Fusion of Innovation and Expertise in 2033</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/december/1223-sectech-scot-walker-and-francisco-carlos-the-future-of-security-884x500.jpg' style='float: left' alt=''/&gt;By 2033, we will enter a new era of corporate security where a wide range of innovative tools and strategies will be at our disposal, from advanced robotics to cutting-edge surveillance systems. </description><pubDate>Thu, 30 Nov 2023 10:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/hateful-rhetoric-online-rises-following-outbreak-of-israel-and-hamas-war/"><guid isPermaLink="false">1983d0b1-fd9b-423a-b2d2-bf800072429c</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/hateful-rhetoric-online-rises-following-outbreak-of-israel-and-hamas-war/</link><title>Hateful Rhetoric Online Rises Following Outbreak of Israel and Hamas War</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/december/sectech-dec-2023/infographic/1223-sec-tech-infographic-monitoring-social-media.gif' style='float: left' alt=''/&gt;A new survey finds that most Americans were exposed to hateful or inflammatory content on social media following the 7 October 2023 Hamas terrorist attack on Israel.</description><pubDate>Thu, 30 Nov 2023 10:00:12 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/stopping-an-active-shooter-with-osint/"><guid isPermaLink="false">a268a13f-3099-42af-9ce3-098316b596e6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/stopping-an-active-shooter-with-osint/</link><title>Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/december/1223-sectech-daniel-clemons-shadow-dragon-case-study-884x500.jpg' style='float: left' alt=''/&gt;A global financial technology company detected an online active shooter threat. With the right process, technology, and analyst team in place, it was able to respond before anyone was harmed.</description><pubDate>Thu, 30 Nov 2023 10:00:12 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/chinese-platforms-tiktok-tip-off-shore-iceberg/"><guid isPermaLink="false">5ade74ee-04e7-423a-916c-550677d8aa1e</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/december/chinese-platforms-tiktok-tip-off-shore-iceberg/</link><title>Chinese Platforms: Is TikTok the Tip of an Off-Shore Iceberg?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/december/1223-sectech-raymond-rise-of-chinese-platforms.jpg' style='float: left' alt=''/&gt;The potential for Chinese platforms to contribute to reshaping business, power, and influence globally could be far reaching. Their prospects for doing so look good, with growth enabled by four key drivers.  </description><pubDate>Thu, 30 Nov 2023 10:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/asis-news-new-asis-research-and-upcoming-events/"><guid isPermaLink="false">56cf25f5-905b-4431-aa6a-802ed255b38d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/asis-news-new-asis-research-and-upcoming-events/</link><title>ASIS News: New ASIS Research and Upcoming Events </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-asis-news-focus-on-access-control-research-884x500.jpg' style='float: left' alt=''/&gt;A new ASIS research report can help a security team assess its existing access control policy and make improvements to align with industry best practices as needed. </description><pubDate>Thu, 30 Nov 2023 10:47:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/marketplace/"><guid isPermaLink="false">2e32b4b1-f052-4bd0-bdb3-662c9492f4c8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/marketplace/</link><title>Marketplace: Transformational AI Camera Series, Browser-Based Access, Rugged LPR, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1223-sm-marketplace05-884x500.gif' style='float: left' alt=''/&gt;What security solutions entered the market in November 2023? Security Management collected a selection of new or updated solutions that you should be aware of.</description><pubDate>Tue, 28 Nov 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/the-future-of-security-navigating-change/"><guid isPermaLink="false">0177abe9-6939-4f46-aec7-3a9b29b40b36</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/the-future-of-security-navigating-change/</link><title>The Future of Security: Navigating Change in Business</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1223-sm-future-of-security-navigating-change-and-functional-positioning-in-business03-884x500.gif' style='float: left' alt=''/&gt;As companies strive to stay ahead of the curve and adapt to new ways of working, change management will be a critical component of success.</description><pubDate>Mon, 27 Nov 2023 08:28:57 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/book-review-cybersecurity-for-executives-managers-and-leaders/"><guid isPermaLink="false">db74ea19-0bcc-419a-aa3e-c262928c0caf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/book-review-cybersecurity-for-executives-managers-and-leaders/</link><title>Book Review: Cybersecurity for Executives, Managers, and Leaders: Arcane Knowledge of the Dark Art for Superior Decision Making: The Cyber Kill Chain</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-book-review-cyber-executives-managers-leaders-featured-image.jpg' style='float: left' alt=''/&gt;In Cybersecurity for Executives, Managers, and Leaders, author Dennis Houchin has written a brief and easy-to-understand guide to the core concepts of the cyber kill chain.</description><pubDate>Wed, 22 Nov 2023 07:30:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/fasi-uddin-certification-profile/"><guid isPermaLink="false">fd40de32-b450-421a-a599-8e183aedee42</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/fasi-uddin-certification-profile/</link><title>Certification Profile: ASM Fasi Uddin, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-fasi-uddin-certifcation-profile.jpg' style='float: left' alt=''/&gt;Fasi Uddin, CPP, PCI, PSP, has found a true passion in the security industry, and he partially credits ASIS and the community he found and built there in helping him find that. </description><pubDate>Thu, 16 Nov 2023 11:22:04 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/behavioral-red-flags-potential-violence/"><guid isPermaLink="false">7730b5f3-df56-483a-a9dc-3e34231e38f8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/behavioral-red-flags-potential-violence/</link><title>What Are the 18 Behavioral Red Flags of Potential Violence? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/infographics/1123-sm-dynamic-risk-assessment-infographic-01-v2.gif' style='float: left' alt=''/&gt;Mass attackers rarely hide all warning signs of potential violence or conflict ahead of a confrontation. Instead, many present red flags or proximal warning behaviors that together form patterns of risk.</description><pubDate>Mon, 13 Nov 2023 08:07:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/device-data-risk-assessment/"><guid isPermaLink="false">95ce5c19-b810-43f9-b7ce-70c4a1879588</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/device-data-risk-assessment/</link><title>How Device Data Plays a Key Role in Dynamic Risk Assessments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-device-data-dynamic-risk-01.gif' style='float: left' alt=''/&gt;As security functions take the leap toward dynamic risk assessments and teams begin to leverage multiple streams of security data to measure risk, one pain point is proving harder to overcome than the rest: device data.</description><pubDate>Mon, 13 Nov 2023 08:07:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/continuous-physical-risk-assessment/"><guid isPermaLink="false">1319d3c2-5e7d-490c-b287-e5c1d34c0c49</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/continuous-physical-risk-assessment/</link><title>Risk is Dynamic, So Physical Risk Assessment Should Be Continuous</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-dynamic-risk-assessment-continuous-assessments-884x500.gif' style='float: left' alt=''/&gt;Weather patterns change, criminals learn from one another, and changing world events have an impact on the threats faced by different industries. Annual risk assessments are often not enough to capture these changes. </description><pubDate>Mon, 13 Nov 2023 08:07:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/fast-facts-14-questions/"><guid isPermaLink="false">00c737cc-ed12-4631-90df-0c1befd606d8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/fast-facts-14-questions/</link><title>Fast Facts: 14 Questions to Help Evaluate Your Workplace Violence Readiness </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-14-questions-risk-assessment-light.gif' style='float: left' alt=''/&gt;When conducting a needs assessment, organizations can ask a variety of questions to evaluate whether current procedures are working or if employees’ needs have changed due to a shifting workforce, new business models, or recent events. </description><pubDate>Mon, 13 Nov 2023 08:07:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/philosophy-security-risk-assessment/"><guid isPermaLink="false">94441960-f0a5-49b6-aec1-77170f264539</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/dynamic-risk-assessment/philosophy-security-risk-assessment/</link><title>The Philosophy of Security Risk Assessments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-ashford-dynamc-risk-assessment-884x500.gif' style='float: left' alt=''/&gt;Philosophy matters to security risk management. Here’s what it can mean for risk assessments and security professionals.</description><pubDate>Mon, 13 Nov 2023 08:07:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/industry-news-nycs-penn-station-gets-upgraded-audio-communications-solutions/"><guid isPermaLink="false">c8903cd1-dce6-4f78-a35b-b0475383ca46</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/industry-news-nycs-penn-station-gets-upgraded-audio-communications-solutions/</link><title>Industry News: NYC’s Penn Station Gets Upgraded Audio Communications Solutions</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123---industry-news---moynihan-hall.jpg' style='float: left' alt=''/&gt;While under construction, Pennsylvania Station’s newest expansion, Moynihan Train Hall, also received updated audio communications solutions for passenger information and security functions. </description><pubDate>Sun, 12 Nov 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/legal-report-uber-to-face-almost-80-negligence-lawsuits-from-passengers/"><guid isPermaLink="false">ce56191a-2815-4b71-99ef-01dd94169fa3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/legal-report-uber-to-face-almost-80-negligence-lawsuits-from-passengers/</link><title>Legal Report: Uber to Face Almost 80 Negligence Lawsuits from Passengers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123---legal-report---justice-scales.jpg' style='float: left' alt=''/&gt;A court ruled that dozens of cases filed by passengers alleging Uber was negligent in reasonably preventing sexual assault—ranging from groping to kidnapping to rape—are allowed to proceed to federal court.</description><pubDate>Wed, 08 Nov 2023 08:57:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/soft-skills-for-csos/"><guid isPermaLink="false">4ddedda8-1111-4863-824b-964e49cfbad5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/soft-skills-for-csos/</link><title>Power Skills: The Soft Skills CSOs Cultivate and Use Every Day</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-soft-skills-mosqueda-sidebar-cso-soft-skills03-884x500.jpg' style='float: left' alt=''/&gt;Members from ASIS International’s CSO Center discuss which soft skills they find most valuable in their current roles and which ones aspiring CSOs should hone now. </description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/fast-facts-empathy/"><guid isPermaLink="false">f28fb80f-f287-4108-910c-dfdebc7047b3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/fast-facts-empathy/</link><title>The Hardest Soft Skill: Empathy </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-sm-soft-skills-fast-facts-380x270.gif' style='float: left' alt=''/&gt;Empathy is a leadership superpower. Here’s what you need to know about it. </description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/emotional-intelligence/"><guid isPermaLink="false">a50049a0-5ce8-4398-827d-309650568a8f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/emotional-intelligence/</link><title>How Good is Your EQ?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/infographics/1123-sm-infographic-listicle-soft-skills.gif' style='float: left' alt=''/&gt;What is emotional intelligence, and why is it essential for successful leadership and team management?</description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/culture-cybersecurity-punch/"><guid isPermaLink="false">1995970e-fc51-4f94-88f8-50225632c2e4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/culture-cybersecurity-punch/</link><title>5 Fundamental Cultural Qualities Behind a Powerful Cybersecurity Punch </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1123-soft-skills-ashburn-article-re-cybersecurity-team-management-and-culture01-884x500-1.jpg' style='float: left' alt=''/&gt;Two-thirds of cybersecurity leaders are concerned about a lack of resources dedicated to an organization’s cybersecurity. But these five qualities can help refocus or further support teams with renewed confidence and pride, ready to deal with any threat.</description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/editors-note/"><guid isPermaLink="false">51d7a38f-822d-4ac1-bfd8-5da75e767701</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/editors-note/</link><title>Editor’s Note: This Is Your Brain on Soft Skills</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1023-sm-ed-note-soft-skills-03.gif' style='float: left' alt=''/&gt;By embracing a growth mindset, leaders can view challenges as opportunities. Investing in continuous learning is a way to do this.</description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/communication-lessons-crisis-negotiator/"><guid isPermaLink="false">aef986c6-f100-4abe-8a49-fee9dc5adea0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/11/soft-skills/communication-lessons-crisis-negotiator/</link><title>Workplace Communication Lessons from a Crisis Negotiator </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/november/1023-jones-soft-skills-active-listening-01.jpg' style='float: left' alt=''/&gt;While technical skills are important, the soft skills are just as crucial to security. They are also just as perishable and demand practice from security practitioners.</description><pubDate>Wed, 01 Nov 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/asis-news-time-to-renew-plus-other-association-news/"><guid isPermaLink="false">c77643a2-cde5-4a2a-93d3-24b88bca4795</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/asis-news-time-to-renew-plus-other-association-news/</link><title>ASIS News: Time to Renew, Plus Other Association News </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-asis-news.jpg' style='float: left' alt=''/&gt;Renewal season is upon us! Make sure to renew your ASIS membership before the end of the year to avoid losing your member benefits. </description><pubDate>Fri, 27 Oct 2023 09:28:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/advice-on-the-record-tips-for-csos-interacting-with-journalists/"><guid isPermaLink="false">1ea0c27a-9be6-4982-b43f-ff494f177080</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/advice-on-the-record-tips-for-csos-interacting-with-journalists/</link><title>Advice on the Record: Tips for CSOs Interacting with Journalists</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-cso-secure-horizons-interacting-with-journalists-04.gif' style='float: left' alt=''/&gt;Do you want to increase your influence in your organization, your industry, and the public at large? This is an admirable and worthwhile pursuit, but beware—you will inevitably brush up against members of the media.</description><pubDate>Thu, 26 Oct 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/3-keys-to-effective-strategic-communication/"><guid isPermaLink="false">48f52072-1e10-4bb8-9b70-539f87da317b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/3-keys-to-effective-strategic-communication/</link><title>3 Keys to Effective, Strategic Communication</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-3-keys-to-effective-strategic-communication-884x500.gif' style='float: left' alt=''/&gt;Whether security professionals are presenting information in-person, virtually, through spoken word or written communication, their message, delivery, and audience must all match up, says Lida Citroën, executive branding expert and the facilitator of the 2023 CSO Secure Horizons event at GSX.</description><pubDate>Thu, 26 Oct 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/lawful-firing-in-uk/"><guid isPermaLink="false">2722c2b3-27e9-4931-b274-60cdee58a9ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/lawful-firing-in-uk/</link><title>How to Fire Employees Lawfully in the UK </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-sidebar-shrm-uk-firings-law-01.gif' style='float: left' alt=''/&gt;Firing employees is a necessary part of running a company in the U.K., but it's important to do it in accordance with the law. </description><pubDate>Mon, 23 Oct 2023 07:58:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/key-types-terminations/"><guid isPermaLink="false">9797dfbf-0b96-4a74-822b-3475db3373d4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/key-types-terminations/</link><title>4 Key Types of Terminations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/infographics/1023-sm-infographic-types-of-terminations-preview-01.gif' style='float: left' alt=''/&gt;Employment changes and terminations happen for all sorts of reasons. But the motivation behind a staffing change can require a modified security plan.</description><pubDate>Mon, 23 Oct 2023 07:58:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/pathway-to-violence-video/"><guid isPermaLink="false">6db5e553-0fd6-4927-8836-b624091fb6e4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/pathway-to-violence-video/</link><title>Fast Facts: What is the Pathway to Violence? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023--meyer-pathway-to-violence-1.gif' style='float: left' alt=''/&gt;In targeted violence cases, potential attackers often follow a particular pathway to targeted violence, moving from thinking about an attack to executing the actions.</description><pubDate>Mon, 23 Oct 2023 07:58:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/workplace-violence-employee-separations/"><guid isPermaLink="false">d4cba826-7bb7-4dbb-a4d0-c713a1671b7b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/workplace-violence-employee-separations/</link><title>Preventing Workplace Violence: A Company’s Duty in Challenging Times</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-buckner-preventing-workplace-violence-during-firings-884x500-v1.gif' style='float: left' alt=''/&gt;External economic tailwinds are putting pressure on companies, resulting in layoffs at workplaces. In these tense times, employers need to prepare for and mitigate risks of workplace violence. </description><pubDate>Mon, 23 Oct 2023 07:58:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/effective-separations-alumni/"><guid isPermaLink="false">55db9150-8c04-4fcd-bad6-c70112ce731c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/how-to-fire-people-safely/effective-separations-alumni/</link><title>Effective Separations Turn Ex-Employees into Valuable Alumni</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-melissa-muir-how-to-say-goodbye-safely-884x500.gif' style='float: left' alt=''/&gt;An employment separation done with dignity not only reduces the risk of harm, but it also brings the benefits of a better future relationship with the organization.</description><pubDate>Mon, 23 Oct 2023 07:58:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/marketplace-mass-transit-surveillance-intercoms-and-more/"><guid isPermaLink="false">53b22e61-5e12-4991-b2fe-b677053c28cb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/marketplace-mass-transit-surveillance-intercoms-and-more/</link><title>Marketplace: Mass Transit Surveillance, Intercoms, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;What new security solutions have entered the market this month? Security Management collected a selection of new or updated solutions that you should be aware of.</description><pubDate>Fri, 20 Oct 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/book-review-the-bin-laden-papers/"><guid isPermaLink="false">b771db73-42a8-4e43-be0b-5e0e13625a76</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/book-review-the-bin-laden-papers/</link><title>Book Review: The Bin Laden Papers—How the Abbottabad Raid Revealed the Truth about al Qaeda, Its Leader, and His Family</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-book-review-the-bin-laden-papers-featured-image.jpg' style='float: left' alt=''/&gt;While not a psychological analysis, in The Bin Laden Papers—How the Abbottabad Raid Revealed the Truth about al Qaeda, Its Leader, and His Family, author Nelly Lahoud has written a fascinating book that details what went on during the last years of Bin Laden’s hermit-like life at his Abbottabad compound. </description><pubDate>Thu, 19 Oct 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/industry-news/"><guid isPermaLink="false">df950729-8b45-488b-9575-dafce246b625</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/industry-news/</link><title>Industry News: A Monaco Arts Facility Seeks Security and Seamless Visitor Experience</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-industry-news---i-pro-grimaldi-museum.jpg' style='float: left' alt=''/&gt;The Grimaldi Forum Monaco selected i-PRO solutions when upgrading its video surveillance system.</description><pubDate>Wed, 18 Oct 2023 10:49:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/fast-facts-secondary-crashes/"><guid isPermaLink="false">5476c2b4-e880-4e44-a448-1c00c62fc76b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/fast-facts-secondary-crashes/</link><title>Fast Facts: Protecting Emergency Workers from Secondary Crashes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-fast-facts-road-safety-480x270.gif' style='float: left' alt=''/&gt;Secondary crashes are a major cause of line-of-duty deaths for emergency response workers. </description><pubDate>Mon, 16 Oct 2023 08:04:16 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/road-travel-safety/"><guid isPermaLink="false">335cbdcf-c1cf-487b-8417-583205a9268e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/road-travel-safety/</link><title>Q&amp;A: Developing a Primer for Road Travel Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-road-safety-qa-about-journey-mapping-travel-plans04-884x500.gif' style='float: left' alt=''/&gt;Jeremy Prout, CPP, discusses elements of a security primer for employees setting out on the road. </description><pubDate>Mon, 16 Oct 2023 08:04:16 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/telematics-road-safety/"><guid isPermaLink="false">70536b30-7130-48af-969d-b6407c2b6974</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/telematics-road-safety/</link><title>Telematics: An Intelligent Driving Force for Road Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-antar-telematics-for-fleet-management-884x500.gif' style='float: left' alt=''/&gt;Telematics can support organizations with fleet or commercial drivers, offering real-time insight and ways to save money and lives. </description><pubDate>Mon, 16 Oct 2023 08:04:16 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/drowsy-driving-risk/"><guid isPermaLink="false">2be4b809-7736-43ae-ac4e-b541085efa5b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/drowsy-driving-risk/</link><title>How Sleep Loss Costs Lives and Costs Companies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-mosqueda-main-feature-road-safety-03.gif' style='float: left' alt=''/&gt;Whether it’s a delivery driver, a member of your security team, or any worker within an organization, sleep deprivation and fatigue are a hidden cost that’s impacting the bottom line.</description><pubDate>Mon, 16 Oct 2023 08:04:16 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/infographic-risky-roads/"><guid isPermaLink="false">88a9c932-e21f-4fdd-821c-51d10ef36310</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/road-safety/infographic-risky-roads/</link><title>Infographic: Are Roads Getting Riskier?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-sm-infographic-road-safety-preview.gif' style='float: left' alt=''/&gt;The National Safety Council estimated that more than 46,000 people were killed in motor vehicle collisions throughout 2022, an increase of almost 22 percent from 2019.</description><pubDate>Mon, 16 Oct 2023 08:04:16 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/certification-profile-chris-mckechnie-psp/"><guid isPermaLink="false">d482be7c-f16b-4045-b0de-354e13921493</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/certification-profile-chris-mckechnie-psp/</link><title>Certification Profile: Chris McKechnie, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-chris-mckechnie-certifcation-profile.jpg' style='float: left' alt=''/&gt;Despite early doubts, Chris McKechnie, PSP, found that his certification helped him better understand his role as a locksmith, and it has continued to help him grow his confidence and career.</description><pubDate>Thu, 12 Oct 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/legal-report-october-2023/"><guid isPermaLink="false">38860a82-7b2c-47d7-9892-b7faab0c0ffa</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/legal-report-october-2023/</link><title>Legal Report: JPMorgan Chase Settles for $75 Million with the U.S. Virgin Islands</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/images/legal-report/sm_legal-report_9.jpg' style='float: left' alt=''/&gt;Multinational bank JPMorgan Chase will pay the settlement to end the lawsuit and allegations that the bank supported Jeffrey Epstein’s sex trafficking business.</description><pubDate>Tue, 10 Oct 2023 09:27:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/below-waterline-the-evolution-island-hopping/"><guid isPermaLink="false">f40c0f87-0bb1-4c93-a945-2e206a041c88</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/below-waterline-the-evolution-island-hopping/</link><title>Below the Waterline: The Evolution of Island Hopping</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-kellerman-evolution-of-island-hopping.jpg' style='float: left' alt=''/&gt;There has been a dramatic increase in island hopping in 2022, with 58 percent of financial institutions saying they’ve been victimized by this type of attack.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/scale-investigations-using-open-source-intelligence/"><guid isPermaLink="false">6ace2fb4-5e6e-4191-ab3b-55dd55ddc26d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/scale-investigations-using-open-source-intelligence/</link><title>How to Scale Investigations Using Open-Source Intelligence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-daniel-clemons-shadow-dragon.gif' style='float: left' alt=''/&gt;Investigators are looking to integrate OSINT into their investigative workflows. To do so, they need to know when, where, and how to add the collection of online and publicly available information into their process to translate it into valuable intelligence.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/fast-facts-4-hubs-illicit-trade/"><guid isPermaLink="false">f6b8fdcc-dbca-48b9-8462-c48099ee88d2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/fast-facts-4-hubs-illicit-trade/</link><title>Fast Facts: 4 Hubs of Illicit Trade</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-fast-facts-4-hubs-of-illicit-trade-480x270.gif' style='float: left' alt=''/&gt;Criminal networks are gravitating to hubs of illicit trade to generate greater profits. Here are four locations around the globe where these hubs are active—and characteristics that allow them to flourish.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/understanding-the-flow-fentanyl/"><guid isPermaLink="false">761ac671-d4b4-4a59-a3e2-a15fec7d1975</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/understanding-the-flow-fentanyl/</link><title>Understanding the Flow of Fentanyl</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-gates-infographic-fentanyl-flows.gif' style='float: left' alt=''/&gt;Synthetic opioids are increasingly responsible for overdose deaths. Here’s how one of the most popular—fentanyl—flows from China into other markets for sale.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/10/the-carrot-and-the-stick-how-audits-sustain-success/"><guid isPermaLink="false">417f5491-fb37-4ade-8bc9-fe7ffe783c20</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/10/the-carrot-and-the-stick-how-audits-sustain-success/</link><title>The Carrot and the Stick: How Audits Sustain Success</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/october/1023-antons-carrot-stick-audits-01.gif' style='float: left' alt=''/&gt;Establishing a security audit program may not only help to assess the state of your program but might just be your “Hail Mary” pass attempt for salvaging it.</description><pubDate>Thu, 05 Oct 2023 08:35:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/a-romcom-worth-watching-the-threat-actors-latest-targets/"><guid isPermaLink="false">7207c571-814a-4284-810d-6ff0cdca50e0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/a-romcom-worth-watching-the-threat-actors-latest-targets/</link><title>A RomCom Worth Watching: The Threat Actor’s Latest Targets and Targets</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-dmitry-bestuzhev-romcom-884x500.jpg' style='float: left' alt=''/&gt;The threat actor behind the RomCom remote access trojan (RAT) has been carefully following geopolitical events surrounding the war in Ukraine, targeting militaries, food supply chains, and IT companies.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/changing-tactics-cargo-thieves-zero-in-on-information-from-supply-chains/"><guid isPermaLink="false">54f6f733-ff1c-4021-9229-9d934d1469c3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/changing-tactics-cargo-thieves-zero-in-on-information-from-supply-chains/</link><title>Changing Tactics: Cargo Thieves Zero in on Information from Supply Chains</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-bjorn-hartong-cpp-884x500.jpg' style='float: left' alt=''/&gt;Europol estimates that wrongfully obtained container pick up codes have helped facilitate the trafficking of hundreds of tons of drugs and increases risks to legitimate cargo if organized criminals extract more legitimate containers using the same methodology. TAPA EMEA data shows an increase in theft from cargo on board of trucks and sophisticated thefts from warehouses.</description><pubDate>Sun, 01 Oct 2023 08:12:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/digital-transformation-a-new-approach-to-organized-crime/"><guid isPermaLink="false">bffe98ff-0d56-473f-8f08-71eadba0d7d9</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/digital-transformation-a-new-approach-to-organized-crime/</link><title>Digital Transformation: A New Approach to Organized Crime</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-gunar-korman-884x500.jpg' style='float: left' alt=''/&gt;New technologies have created opportunities for companies to build innovative security layers to protect against criminal attempts and complex attacks against their assets.</description><pubDate>Sun, 01 Oct 2023 08:12:39 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/diving-beyond-boosters-into-organized-retail-crime-rings/"><guid isPermaLink="false">31f186a6-b60b-49bf-9403-d6b742ff9a0d</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/october/diving-beyond-boosters-into-organized-retail-crime-rings/</link><title>Diving Beyond Boosters into Organized Retail Crime Rings</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/october/1023-sectech-cover-story-organized-retail-crime-884x500.jpg' style='float: left' alt=''/&gt;Boosters, people who steal select merchandise, are the most visible aspect of organized retail crime. But new initiatives and investigations are attempting to shed light on the other players involved to hold them accountable and deter future criminal activity.</description><pubDate>Sun, 01 Oct 2023 08:12:39 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/asis-news-celebrating-our-achievements-and-looking-to-the-future/"><guid isPermaLink="false">793abbea-faa9-493d-aa14-94cc1e7aeef5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/asis-news-celebrating-our-achievements-and-looking-to-the-future/</link><title>ASIS News: Celebrating Our Achievements and Looking to the Future </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-asis-news.jpg' style='float: left' alt=''/&gt;Security practitioners from 95 countries flocked to Dallas, Texas, to take part in GSX, which featured more than 200 education sessions and hosted more than 470 leading innovators in the exhibit hall.</description><pubDate>Thu, 28 Sep 2023 09:33:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/irreplaceable-aspects-security-system-design/"><guid isPermaLink="false">eaa5d85c-1140-4581-af4a-cd58238878f6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/irreplaceable-aspects-security-system-design/</link><title>5 Irreplaceable Aspects of Security System Design</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-davids-security-design-101-essential-elements.jpg' style='float: left' alt=''/&gt;While the design process can be resource-intensive, the benefits of a robust security system provide peace of mind for organizations and stakeholders.</description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/what-is-cpted/"><guid isPermaLink="false">7eaec768-d866-4b26-b8f2-d3a6e8c9b4b9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/what-is-cpted/</link><title>What is CPTED? (In 5 Minutes or Less)</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-fast-facts-what-is-cpted.gif' style='float: left' alt=''/&gt;Crime Prevention Through Environmental Design combines multiple security disciplines to reduce crime and fear of crime. Often going by its acronym CPTED (pronounced sep-ted), this approach uses elements of architecture, facility management, and urban planning to discourage criminal behavior based on how a facility looks and feels. </description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marketplace-perimeter-security-ai-analytics-vandal-resistant-intercoms-and-more/"><guid isPermaLink="false">a83bdd7d-a279-4533-a7f3-f3be4aa4ed33</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marketplace-perimeter-security-ai-analytics-vandal-resistant-intercoms-and-more/</link><title>Marketplace: Perimeter Security, AI Analytics, Vandal-Resistant Intercoms, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/marketplace/0923-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;Alongside outstanding education, inspirational keynote speakers, and world-class networking, GSX 2023 brought a wave of new security products and solutions into the market. Here is a roundup of the new and updated solutions that came across Security Management’s news desk in the past month. </description><pubDate>Mon, 25 Sep 2023 10:05:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/complex-design-elements/"><guid isPermaLink="false">14453a4a-65d5-44db-9b92-b907420c1c92</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/complex-design-elements/</link><title>Security Design 101: Best Practices on Complex Design Elements</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/security-design-101/0923-sm-security-design-101-main-article-shehzad-security-design-partnerships03-884x500.gif' style='float: left' alt=''/&gt;A bespoke and effective security system is possible for any organization, but it requires a meticulous and well-planned design supported by best practices. </description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/infographic-elements-facility-risk-assessment/"><guid isPermaLink="false">d258813c-feed-4d49-b885-d7d2a1a97c21</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/infographic-elements-facility-risk-assessment/</link><title>4 Elements of Facility Risk Assessments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/security-design-101/0923-mosqueda-infographic-facility-risk-assessments-01.gif' style='float: left' alt=''/&gt;A risk assessment is a crucial step in developing a facility security design. It can determine if, how, and to what degree an organization’s objectives, results, and assets may be affected.</description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/site-survey/"><guid isPermaLink="false">7d9dcbe1-e0bb-479d-9498-3a0db0817776</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/site-survey/</link><title>The Critical Role of the Site Survey</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-security-design-101-site-survey-04.gif' style='float: left' alt=''/&gt;Site surveys are the foundation of every successful physical security system—from planning, design, installation, and system documentation to life-cycle maintenance. To avoid a burdensome process, consider these best practices for the best process.</description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/retrofit-vs-upgrade/"><guid isPermaLink="false">a8115c42-b781-4ed6-bdae-fe17eaca1247</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/security-design-101/retrofit-vs-upgrade/</link><title>Security Entrance Design 101: Retrofit vs. Upgrade</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/security-design-101/0923-mosqueda-sidebar-entrance-design-2.jpg' style='float: left' alt=''/&gt;Whether a company needs to retrofit or upgrade its facility’s entrances, there are considerations specific to the organization, its mission, personnel, and facility to weigh.</description><pubDate>Mon, 25 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/key-roles-esrm/"><guid isPermaLink="false">a9f1a02e-eae2-4e4f-a9d8-55192eaac57c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/key-roles-esrm/</link><title>Meet the 3 Key Roles Within ESRM</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-infographic-esrm-01.gif' style='float: left' alt=''/&gt;To understand the enterprise security risk management (ESRM) approach, you first need to get acquainted with the three critical roles within ESRM. </description><pubDate>Mon, 18 Sep 2023 09:05:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/fast-facts-esrm-benefits/"><guid isPermaLink="false">95dcf68c-8597-4c26-9841-971574067c9e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/fast-facts-esrm-benefits/</link><title>6 Key Benefits of ESRM</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm--fast-facts-esrm.gif' style='float: left' alt=''/&gt;For security professionals, security departments, and the organization at large, enterprise security risk management (ESRM) provides numerous benefits and helps overcome longstanding roadblocks. </description><pubDate>Mon, 18 Sep 2023 09:05:06 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/influence-in-esrm-maturity/"><guid isPermaLink="false">c58546f3-1b67-479a-a7b4-6cb193c5d05b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/influence-in-esrm-maturity/</link><title>How Your Influence Can Help or Hinder ESRM Maturity </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-esrm-sidebar-influence-and-esrm-884x500.gif' style='float: left' alt=''/&gt;There’s a catch-22 in enterprise security risk management: ESRM increases security’s influence in the organization, but security leaders need influence in order to advocate for an ESRM approach to risk management. </description><pubDate>Mon, 18 Sep 2023 09:05:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/industry-news-vms-platform-offers-utah-school-district-future-flexibility/"><guid isPermaLink="false">e1161144-a3fa-4579-9ec4-3462d8989c33</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/industry-news-vms-platform-offers-utah-school-district-future-flexibility/</link><title>Industry News: VMS Platform Offers Utah School District Future Flexibility</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-industry-news-granite-school-district.jpg' style='float: left' alt=''/&gt;Granite School District in Utah picked the CompleteView video management platform for its more than 130 school district facilities.</description><pubDate>Tue, 19 Sep 2023 13:50:00 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/esrm-maturity/"><guid isPermaLink="false">91364e51-0a53-4867-b900-c7eed64e68ff</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/esrm/esrm-maturity/</link><title>How Mature is Your ESRM Program?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-esrm-maturity-model-02.gif' style='float: left' alt=''/&gt;It can be challenging to map out a path from the initial introduction to mature implementation. Thankfully, members of the ASIS ESRM steering committee built an ESRM maturity model to measure current efforts and enable security practitioners to guide their organizations to the next level of risk management.</description><pubDate>Mon, 18 Sep 2023 09:05:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/fast-facts-incident-response-tech/"><guid isPermaLink="false">8525183e-3547-4237-87a4-0475d662ece1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/fast-facts-incident-response-tech/</link><title>9 Tech Advances in Incident Response</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-fast-facts-9-tech-advances-in-incident-response-480x270.gif' style='float: left' alt=''/&gt;In testimony before the U.S. Congress, the former Boston police commissioner during the Boston Marathon bombing shared technology advancements that are changing how security practitioners respond to incidents at mass events.</description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/boston-marathon-bombing-timeline/"><guid isPermaLink="false">d231b9f2-6be7-44e3-bf11-0f73b0093003</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/boston-marathon-bombing-timeline/</link><title>Timeline: The Boston Marathon Bombing and Response</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/marathon-mass-event-security/0923-gates-marathon-timeline-street-reopening-memorial.jpg' style='float: left' alt=''/&gt;On 15 April 2013, two bombs were detonated near the finish line as runners in the Boston Marathon completed their routes. We take a close look, using investigators’ after-action reports, at what happened that day and the security incident response that followed.</description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/steps-to-improve-situational-awareness-at-events/"><guid isPermaLink="false">929bb0be-826e-4743-b6f3-d909761d58a1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/steps-to-improve-situational-awareness-at-events/</link><title>5 Steps to Improve Situational Awareness and Public Safety at Large Events</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-maguire-improving-situational-awareness-at-large-events-with-partnerships-and-technology-884x500.gif' style='float: left' alt=''/&gt;To optimize response and mitigate the impact of an incident at a major event, security practitioners should plan on how they will respond in the face of shock, panic, and misinformation.</description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/retrospective-event-stadium-security/"><guid isPermaLink="false">b009dddb-1c05-4d33-aa8e-90e3e13ff6d4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/retrospective-event-stadium-security/</link><title>Where We Are Now: A Retrospective on Event and Stadium Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-event-technology-retrospective-submission-from-scott-dunn-884x500.gif' style='float: left' alt=''/&gt;While every event may be different, and venues certainly don’t all look the same, the precautions and steps we take to ensure safety and security have shifted dramatically in recent years. </description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/scalable-event-management-phoenix-style/"><guid isPermaLink="false">f3ac4925-3e99-4977-a85d-358aad004feb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/scalable-event-management-phoenix-style/</link><title>Scalable Event Management, Phoenix Style</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-gates-phoenix-super-bowl-cooperation.jpg' style='float: left' alt=''/&gt;As Phoenix, Arizona, has grown in population, so too have the events it hosts. We spoke with the Phoenix Police Department’s emergency management commander about how the city plans for and prepares to manage security risks during mass events.</description><pubDate>Mon, 11 Sep 2023 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/swarm-leadership-boston-marathon-bombing-response/"><guid isPermaLink="false">58d65e38-d733-42b5-970a-eef964bd08f7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/swarm-leadership-boston-marathon-bombing-response/</link><title>Swarm: The Leadership Style that Led an Effective Response to the Boston Marathon Bombing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-boston-marathon-swarm-leadership-style-884x500.gif' style='float: left' alt=''/&gt;Despite being a multi-jurisdictional response with no clear leader in charge of the entire operation, the Boston Marathon bombing incident response is largely considered a success. Swarm leadership style played a major role.</description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/training-pre-and-post-boston-bombing/"><guid isPermaLink="false">e79b1b57-c689-42b0-a8d5-f4115d1f86ea</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/training-pre-and-post-boston-bombing/</link><title>Training Pre- and Post-Boston: How the Bombing Affected Event Security Training</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-mass-events-boston-2023-1.jpg' style='float: left' alt=''/&gt;Two security experts share their approaches to security incident response training before and after the Boston Marathon bombing in April 2013.</description><pubDate>Mon, 11 Sep 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/legal-report/"><guid isPermaLink="false">1f560797-180f-434c-a315-963201f1e907</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/legal-report/</link><title>Legal Report: Employers Not Liable for COVID-19 Spread at Home</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-legal-report.jpg' style='float: left' alt=''/&gt;The California Supreme Court determined that employers are not on the hook for instances when an employee gives the people he or she lives with the COVID-19 virus. </description><pubDate>Fri, 08 Sep 2023 11:40:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/certification-profile-mykola-mikheiev-cpp-pci-psp/"><guid isPermaLink="false">f3db323e-2b4a-472d-b1b4-47da051de600</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/certification-profile-mykola-mikheiev-cpp-pci-psp/</link><title>Certification Profile: Mykola Mikheiev, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-mykola-mikheiev-certifcation-profile.jpg' style='float: left' alt=''/&gt;After more than 21 years of government service, Mykola Mikheiev decided to retire from public service and begin a career in the private sector. Years later, he was the first ASIS member in Eastern Europe to achieve the ASIS certification triple crown. </description><pubDate>Thu, 07 Sep 2023 11:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/translate-language-security-career-transition/"><guid isPermaLink="false">d21e6e50-5b18-49c3-b296-b3e8af56cf61</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/translate-language-security-career-transition/</link><title>How to Translate Language During Your Transition from Public to Private Security </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-workforce-dev-herbert-clay-01.gif' style='float: left' alt=''/&gt;While hard skills might translate straightforwardly from a military career to a private security role, the soft skills needed to succeed differ significantly.</description><pubDate>Thu, 31 Aug 2023 08:00:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/professional-coach-hybrid-work-challenges/"><guid isPermaLink="false">e2bdfe1f-02a0-432f-8712-dd400b913456</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/professional-coach-hybrid-work-challenges/</link><title>Leveraging a Professional Coach to Navigate Hybrid Work Challenges </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-qa-women-in-the-workplace-and-remote-work-flexibility-v1-884x500.gif' style='float: left' alt=''/&gt;While hybrid work granted new levels of flexibility to employers—especially working parents and women—it also exacerbated personal divides among management and derailed the common routes to advancement and promotion.</description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/fast-facts-professional-development/"><guid isPermaLink="false">94374d3c-d562-45db-8b43-09ca1be433a3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/fast-facts-professional-development/</link><title>3 Approaches for Professional Development </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-3-approaches-preview.gif' style='float: left' alt=''/&gt;Want to boost your career potential? It’s time to pursue some professional development. </description><pubDate>Thu, 31 Aug 2023 09:24:43 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/qa-workforce-skills-for-future-of-security/"><guid isPermaLink="false">c6196431-39d6-4112-82c8-f4d0387f553d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/qa-workforce-skills-for-future-of-security/</link><title>Q&amp;A: Workforce Skills for the Future of Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sorrells-qa-workforce-development.gif' style='float: left' alt=''/&gt;Eddie Sorrells, CPP, PCI, PSP, notes that the skill sets of the future are rapidly evolving to make the most efficient use of technology, both in remote and essential work.</description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/mission-first-people-always/"><guid isPermaLink="false">57313e67-26f4-4da4-9c0f-bea5d1434dfb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/mission-first-people-always/</link><title>‘Mission First, People Always:’ A Mantra for Security Talent</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-workforce-dev-ontic-01-animated.gif' style='float: left' alt=''/&gt;Fostering connections between people and functions may well be one of the most significant markers of success, and without the support of others, you may well fail in your mission. </description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/editors-note-workforce-of-the-future/"><guid isPermaLink="false">e9376ae0-17df-449f-9c86-61a3687d0f40</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/editors-note-workforce-of-the-future/</link><title>Editor’s Note: The Workforce of the Future, Today</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-ed-note-september-2023-workforce-development-884x500.gif' style='float: left' alt=''/&gt;With no design and very little preparation, the pandemic ushered in remote work overnight for knowledge workers around the globe. Simultaneously, security took its place among those professions essential to a community’s very survival. </description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/be-better-mentor/"><guid isPermaLink="false">788ce8ab-d0b4-4131-b3ca-6b3be94322ab</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/be-better-mentor/</link><title>How to Be a Better Mentor </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-tis-sm-meyer-how-to-be-a-better-mentor-884x500.gif' style='float: left' alt=''/&gt;Mentors serve as sounding boards for new ideas, guides for future career moves, and emotional support during times of turmoil and indecision. But not every mentor is a good fit for every mentee.</description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/first-time-managers/"><guid isPermaLink="false">71e506a3-e74c-488e-9921-e79ceb13e4e4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/first-time-managers/</link><title>Tips and Lessons Learned for First-Time Managers </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-meyer-tip-for-new-managers-from-asis-mentors-884x500.gif' style='float: left' alt=''/&gt;The shift from frontline contributor to first-time manager can be a tricky one to navigate, and a number of ASIS International mentoring program leaders stepped forward to share some of their lessons learned. </description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/asis-career-resources/"><guid isPermaLink="false">8fa805d2-faf4-4fe2-b96e-299b25e11f09</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/09/workforce-development/asis-career-resources/</link><title>Explore ASIS Resources for Career Development</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/september/0923-sm-workforce-resources-development-01.gif' style='float: left' alt=''/&gt;If you’re aiming to improve your professional trajectory or just learn new security management skills, ASIS International has a wide variety of professional development tools and opportunities, many of which are free to ASIS members.</description><pubDate>Thu, 31 Aug 2023 08:00:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/gsx-2023-product-showcase/"><guid isPermaLink="false">1ecf3c02-9eca-40ff-8507-ed2d7a66f07a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/gsx-2023-product-showcase/</link><title>GSX 2023 Product Showcase</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-gsx-product-showcase-featured-image.jpg' style='float: left' alt=''/&gt;Check out the latest security technologies, services, and solutions to be displayed at GSX 2023 in this special edition product showcase.</description><pubDate>Thu, 24 Aug 2023 01:01:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/fast-facts-crypto-investment-scam/"><guid isPermaLink="false">46cb0e08-bfdd-4f3d-aa9d-733f0048295c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/fast-facts-crypto-investment-scam/</link><title>Fast Facts: Crypto Investment Scams 101</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/cryptocurrency/how-to-spot-a-crypto-scam.gif' style='float: left' alt=''/&gt;What does a cryptocurrency investment scam look like, and how much is it costing victims?</description><pubDate>Mon, 21 Aug 2023 08:48:35 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/infographic-trends-in-cryptocurrency-crime/"><guid isPermaLink="false">9f641e5e-0688-4b3a-88fa-b542a7c79d9f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/infographic-trends-in-cryptocurrency-crime/</link><title>Infographic: Trends in Illicit Use of Cryptocurrency</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/cryptocurrency/0823-sm-cryptocurrency-and-crime-preview.gif' style='float: left' alt=''/&gt;Both the total amount of digital assets laundered by criminals and the amounts deposited in their accounts hit a new high in 2022. </description><pubDate>Mon, 21 Aug 2023 08:53:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/money-laundering-crypto/"><guid isPermaLink="false">b091db5e-7d8f-4405-959a-76ecbd4dc890</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/money-laundering-crypto/</link><title>So You Want to Know About Money Laundering</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/cryptocurrency/0823-mosqueda-cryptocurrency-fraud-sidebar-what-is-money-laundering.jpg' style='float: left' alt=''/&gt;From ancient societies to Prohibition gangsters to virtual asset service providers—money launders have relied on the same core three steps to clean dirty money.</description><pubDate>Mon, 21 Aug 2023 08:53:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/how-digital-currency-changes-crime/"><guid isPermaLink="false">f3a987fc-95f5-4f8c-89f4-243428623621</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/cryptocurrency/how-digital-currency-changes-crime/</link><title>Follow the Money: How Digital Currency is Changing Crime</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-sm-crypto-main-article-crypto-crimes-overview-drug-cartels-terrorism-financing-884x500.gif' style='float: left' alt=''/&gt;Cryptocurrencies aren’t anonymous, but they are largely unregulated, making them popular financial workarounds for criminal actors seeking to hide ill-gotten gains.</description><pubDate>Mon, 21 Aug 2023 08:48:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/marketplace-ai-powered-analytics-ptz-cameras-power-management-and-more/"><guid isPermaLink="false">36d3512b-e256-4b92-a3d5-8f991e37981f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/marketplace-ai-powered-analytics-ptz-cameras-power-management-and-more/</link><title>Marketplace: AI-Powered Analytics, PTZ Cameras, Power Management, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/marketplace/0823-marketplace.jpg' style='float: left' alt=''/&gt;What are the latest products and solutions offered in the security industry? Here are a few that came across Security Management’s radar in the past month.</description><pubDate>Fri, 18 Aug 2023 08:54:03 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/book-review-inside-abu-ghraib/"><guid isPermaLink="false">2544f5b9-2cc4-4444-890b-c5fb81ab640a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/book-review-inside-abu-ghraib/</link><title>Book Review: Inside Abu Ghraib: Memoirs of Two U.S. Military Intelligence Officers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-book-review-inside-abu-ghraib-once-featured-image.jpg' style='float: left' alt=''/&gt;Inside Abu Ghraib outlines the lived experience by two military authors that speak plainly about the challenges of life in military service during war time.</description><pubDate>Wed, 16 Aug 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esg-fast-facts/"><guid isPermaLink="false">ab5fb4f0-1551-4b03-a5b7-15a4fc0eb05b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esg-fast-facts/</link><title>Where Does ESG Intersect with Security?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/sm-0823-corporate-activism-esg-fast-facts-1.gif' style='float: left' alt=''/&gt;Sustainable and socially responsible business practices (also known as ESG initiatives) are currently in vogue, but they aren’t just a feel-good exercise.</description><pubDate>Mon, 14 Aug 2023 08:10:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esrm-principles-for-esg-initiatives/"><guid isPermaLink="false">b67c19bf-1738-4a7e-a082-81065bd765e7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esrm-principles-for-esg-initiatives/</link><title>How ESRM Principles Can Help Security Leaders Support ESG Initiatives</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/sm-0823-alejandro-pulido-esrm-esg.gif' style='float: left' alt=''/&gt;ESRM offers great support to companies interested in adopting an ESG strategy because the two concepts overlap when it comes to mapping out nebulous risks or social priorities.</description><pubDate>Mon, 14 Aug 2023 08:10:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esg-primer-for-security-practitioners/"><guid isPermaLink="false">b202cdd8-260a-4c6b-8468-8123b76ccbb8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/esg-primer-for-security-practitioners/</link><title>An Environmental, Social, and Governance (ESG) Primer for Security Practitioners </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-sm-corporate-activism-esg-tom-stutler-esg-primer-for-security-884x500.jpg' style='float: left' alt=''/&gt;Each organization’s priorities around ESG will be different. Before security directors get involved, they should gain further understanding of their company’s goal. </description><pubDate>Mon, 14 Aug 2023 08:10:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/infographic-esg-organizational-value/"><guid isPermaLink="false">0927335d-30f9-41d9-adea-461906f86e5a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/infographic-esg-organizational-value/</link><title>5 Ways ESG Creates Organizational Value</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/esg/0923-sm-corporate-activism-infographic-preview-02.gif' style='float: left' alt=''/&gt;Environmental, social, and governance initiatives can result in long-term business sustainability and resilience without sacrificing profits and value, investment leaders say. </description><pubDate>Mon, 14 Aug 2023 08:10:04 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/integrating-esg-into-security-management/"><guid isPermaLink="false">9d040cd5-71d2-4a39-8640-97a611b3f2ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/esg/integrating-esg-into-security-management/</link><title>Integrating ESG into Security Management: Addressing the C-Suite Challenge</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-sm-corporate-activism-esg-mark-roberts-esg-as-a-security-issue-884x500.gif' style='float: left' alt=''/&gt;ESG-related incidents—such as environmental accidents, labor violations, or security breaches—can tarnish an organization's reputation and brand. These incidents may lead to financial losses, stakeholder distrust, and regulatory scrutiny. </description><pubDate>Mon, 14 Aug 2023 08:10:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/industry-news-german-factory-improves-workplace-security-with-video-surveillance/"><guid isPermaLink="false">525c6457-b149-4754-b238-c7a448f7e976</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/industry-news-german-factory-improves-workplace-security-with-video-surveillance/</link><title>Industry News: German Factory Improves Workplace Security with Video Surveillance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/08-23-industry-news.jpg' style='float: left' alt=''/&gt;A separation technology specialist now relies on tailored video security solutions for perimeter security and workplace safety.</description><pubDate>Fri, 11 Aug 2023 09:03:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/certification-profile-meshal-aljohani-cpp-pci-psp/"><guid isPermaLink="false">a3874cc5-e8dc-4259-9e28-db8480684a68</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/certification-profile-meshal-aljohani-cpp-pci-psp/</link><title>Certification Profile: Meshal Aljohani, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-meshal-aljohani-certifcation-profile.jpg' style='float: left' alt=''/&gt;Meshal Aljohani, CPP, PCI, PSP, holds the much-coveted ASIS International Triple Crown. Even more impressive, Aljohani achieved his Triple Crown in just one year. </description><pubDate>Thu, 10 Aug 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/book-review-modern-management-and-leadership-best-practice-essentials-with-cisocso-applications/"><guid isPermaLink="false">0ea23ff1-b713-4f2d-a7fc-223060d72608</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/book-review-modern-management-and-leadership-best-practice-essentials-with-cisocso-applications/</link><title>Book Review: Modern Management and Leadership: Best Practice Essentials with CISO/CSO Applications</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/august/0823-book-review-modern-management-and-leadership-featured-image.jpg' style='float: left' alt=''/&gt;In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role. </description><pubDate>Wed, 09 Aug 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/08/legal-report/"><guid isPermaLink="false">5dadc6ab-c8a4-489d-a952-9c499bd458a2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/08/legal-report/</link><title>Legal Report: Tree of Life Synagogue Attacker Sentenced to Death</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-legal-report.jpg' style='float: left' alt=''/&gt;A federal jury issued a death sentence against Robert Bowers, a white supremacist who killed 11 members of Pittsburgh’s Tree of Life synagogue in 2018.</description><pubDate>Mon, 07 Aug 2023 08:28:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/modernizing-a-san-francisco-landmark/"><guid isPermaLink="false">03436c23-fecf-4d30-84e6-8640b39ff872</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/modernizing-a-san-francisco-landmark/</link><title>Modernizing a San Francisco Landmark with a Streamlined Security Dashboard</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectech-gates-access-control-bently-reserve-case-study-01.jpg' style='float: left' alt=''/&gt;Nearly 100 years after its opening, the Bently Reserve building in San Francisco rolls out an integrated access control and video management system to improve security incident response.</description><pubDate>Tue, 01 Aug 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/edge-computing-unlocks-innovations-in-access-control/"><guid isPermaLink="false">f69a5bc4-2be5-4f23-9f93-8a69ac1fed67</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/edge-computing-unlocks-innovations-in-access-control/</link><title>Edge Computing Unlocks Innovations in Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-tis-genetec-access-trends-884x500.gif' style='float: left' alt=''/&gt;Solutions that combine hardware and software in one device present businesses with an additional opportunity to enhance their operations and cybersecurity while decreasing their total cost of ownership.</description><pubDate>Tue, 01 Aug 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/device-security-101-best-practices-for-phones/"><guid isPermaLink="false">fc603240-a9fe-4f3a-a2f4-7e73b0494663</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/device-security-101-best-practices-for-phones/</link><title>Device Security 101: Best Practices for Phones</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectech-listicle-884x500.gif' style='float: left' alt=''/&gt;Threat actors are increasingly targeting mobile devices to gain access to sensitive information. The U.S. National Security Agency recommends following these best practices to maintain the security of your device.</description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/mobile-access-and-secured-entry-solutions/"><guid isPermaLink="false">50d45fa3-323f-45be-9ecc-b1e4d028a9f3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/mobile-access-and-secured-entry-solutions/</link><title>Mobile Access and Secured Entry Solutions: The New Lobby Ecosystem</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectech-mobile-access-and-secured-entry-03.gif' style='float: left' alt=''/&gt;Secured entry solutions integrated with mobile access offer front line protection against risks that can harm organizations from the outside in. </description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/infographic-what-is-sim-swapping/"><guid isPermaLink="false">7cf050d0-7005-4b28-89db-b240927f4b22</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/infographic-what-is-sim-swapping/</link><title>Infographic: What is SIM Swapping?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectec-infographic-sim-swapping-01.gif' style='float: left' alt=''/&gt;Fraudsters are increasingly using a technique that targets mobile devices to gain control of their targets’ financial and social media accounts. Here’s how it works and how you can prevent it.</description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/protecting-privacy-corporate-data-employee-owned-mobile-devices/"><guid isPermaLink="false">d1cc3ed7-a27f-48e6-b60c-8d583755587a</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/protecting-privacy-corporate-data-employee-owned-mobile-devices/</link><title>Protecting Privacy and Corporate Data on Employee-Owned Mobile Devices</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0923-howell-walton-protecting-data.gif' style='float: left' alt=''/&gt;With a powerful handheld computer in many of our pockets, organizations must manage corporate data while protecting the privacy of employees across the enterprise.</description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/assessing-need-heightened-mobile-device-security-awareness/"><guid isPermaLink="false">675f4108-77a8-4168-a61f-dbbd8283843f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/assessing-need-heightened-mobile-device-security-awareness/</link><title>Assessing the Need for Heightened Mobile Device Security Awareness</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0923-edmonson-sectech-mobile-device-security-awareness.gif' style='float: left' alt=''/&gt;The proliferation of mobile devices has amplified cyber risk to new heights, where most people today are walking around with a high-impact vulnerability in their pocket and don’t even realize it.</description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/research-shows-growing-role-of-mobile-access-control-to-improve-sustainability/"><guid isPermaLink="false">33cd9d40-5d6e-431b-ac1b-c47ae3aa0be2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/research-shows-growing-role-of-mobile-access-control-to-improve-sustainability/</link><title>Research Shows Growing Role of Mobile Access Control to Improve Sustainability, Facilitate Hybrid Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectec-hid-mobile-access-report-884x500.jpg' style='float: left' alt=''/&gt;Trusted ecosystems of cloud-connected mobile devices fuel future-proofed solutions for optimizing building operations and securely accessing services through mobile phones and other devices.</description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/the-time-is-up-for-tiktok-how-to-effectively-enforce-an-app-ban/"><guid isPermaLink="false">7eb93ced-33a2-4719-b3f9-94d08ffdde78</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/august/the-time-is-up-for-tiktok-how-to-effectively-enforce-an-app-ban/</link><title>The Time is Up for TikTok: How to Effectively Enforce an App Ban</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/august/0823-sectech-banning-tiktok-884x500.jpg' style='float: left' alt=''/&gt;Banning TikTok is not as easy as adding the social media app to a block list. </description><pubDate>Tue, 01 Aug 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/asis-news-advance-rates-for-gsx-end-soon/"><guid isPermaLink="false">e2bd4858-97a3-4582-9f38-8006937c39d3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/asis-news-advance-rates-for-gsx-end-soon/</link><title>ASIS News: Advance Rates for GSX End Soon </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-asis-news-gsx.jpg' style='float: left' alt=''/&gt;This year, GSX will feature more than 200 education sessions, including keynote sessions that will kick off each day of the conference, Uncrewed U sessions, and Career HQ. </description><pubDate>Thu, 27 Jul 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/legal-nightmares-email-instant-messages/"><guid isPermaLink="false">b2d4b9ee-5254-4590-aaf9-3fa71ef6b870</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/legal-nightmares-email-instant-messages/</link><title>How to Avoid Legal Nightmares in Emails and Instant Messages</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-how-to-avoid-legal-nightmares-02.gif' style='float: left' alt=''/&gt;Most defense lawyers will tell you not to commit anything to email that you wouldn’t otherwise post in the employee newsletter. The same goes for instant messaging and text messaging.</description><pubDate>Wed, 26 Jul 2023 08:15:36 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/book-review-fool-me-once/"><guid isPermaLink="false">72f2e244-f880-4732-b8d2-b3dcd366e3f7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/book-review-fool-me-once/</link><title>Book Review: Fool Me Once: Scams, Stories, and Secrets from the Trillion-Dollar Fraud Industry</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-book-review-fool-me-once-featured-image.jpg' style='float: left' alt=''/&gt;Rather than just rehash news reports about the latest fraud or Ponzi scheme, the book digs deep to understand why these crimes occur, who does them, and how people and businesses can avoid being yet another victim.</description><pubDate>Wed, 26 Jul 2023 08:15:36 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/work-travel-espionage/"><guid isPermaLink="false">21236b7d-b3df-4b4b-bb08-4c00b7fb96d8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/work-travel-espionage/</link><title>Traveling for Work? 5 Tips to Protect Yourself From Espionage</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-travel-security-jessica-walton-on-travel-security-and-risk-monitoring02-884x500.jpg' style='float: left' alt=''/&gt;People are generally more open when they are out traveling and attending conferences compared to their regular routines, making these environments fertile ground for targeting individuals. </description><pubDate>Mon, 24 Jul 2023 08:07:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/fast-facts-travel-risk-indicators/"><guid isPermaLink="false">433dcaee-e222-41d9-a73d-44e4ef86f2f5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/fast-facts-travel-risk-indicators/</link><title>Fast Facts: Making Sense of Travel Risk Indicators </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-fast-facts-making-sense-of-travel-risk-indicators-01.gif' style='float: left' alt=''/&gt;The U.S. State Department uses nine key indicators to outline travel risks for U.S. citizens abroad. These indicators can provide a speedy snapshot of the different threats business travelers could potentially face. </description><pubDate>Mon, 24 Jul 2023 08:07:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/security-challenges-travel-professionals/"><guid isPermaLink="false">8fe7cf81-16a8-4d88-abb8-0df5f7ead7ec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/security-challenges-travel-professionals/</link><title>How to Combat Security Challenges Affecting Travel Professionals</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-salient-systems-airport-security-technology01-884x500.gif' style='float: left' alt=''/&gt;Although security measures in airports have improved, terrorism, cybercrime, and identity theft threats remain. Security technology can help travel security professionals mitigate risks. </description><pubDate>Mon, 24 Jul 2023 08:07:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/train-travelers-wrongful-detention-risks/"><guid isPermaLink="false">2241426f-c742-4e3b-a762-50dc2a7b05b6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/train-travelers-wrongful-detention-risks/</link><title>How to Train Travelers for Wrongful Detention Risks </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-meyer-government-detention-risks-while-traveling.jpg' style='float: left' alt=''/&gt;Business travelers often bring their vices with them when they cross borders, and that can land them in hot water. But sometimes a government detention has a different motivation than enforcing the law, and that puts organizations in a tough position. </description><pubDate>Mon, 24 Jul 2023 08:07:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/wrongful-detention-consulate-action/"><guid isPermaLink="false">7c12916f-84b3-4e41-b2e2-6e235dd6b6b6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/travel-security/wrongful-detention-consulate-action/</link><title>Detained Abroad? What the U.S. Government Can and Cannot Do</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/travel-security/0723-sm-travel-security-infographic-preview.gif' style='float: left' alt=''/&gt;If traveling abroad, especially to a country the U.S. State Department designated as a high-risk for wrongful government detention, bear these tips in mind.</description><pubDate>Mon, 24 Jul 2023 08:07:59 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/marketplace/"><guid isPermaLink="false">506dda65-2bb0-4cbd-b61d-e24c4ddee3d3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/marketplace/</link><title>Marketplace: PTZ Cameras, Alarm Monitoring, Mobile Intercoms, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/marketplace/0723-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;What are the latest products and solutions offered in the security industry? Here are a few that came across Security Management’s radar in July.</description><pubDate>Fri, 21 Jul 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/book-review-autumn-of-our-discontent/"><guid isPermaLink="false">20c311c0-3790-414d-b4fb-2e64ea598331</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/book-review-autumn-of-our-discontent/</link><title>Book Review: Autumn of our Discontent: Fall 1949 and the Crises in American National Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-book-review-autumn-of-our-discontent-featured-image.jpg' style='float: left' alt=''/&gt;The United States government and defense functions faced radical changes in 1949, with the rise of communism in China, drastic domestic policy changes, and the first detonation of a Soviet atomic bomb. This book gives valuable context into how national security officials weathered the storm. </description><pubDate>Wed, 19 Jul 2023 08:41:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/on-the-point-of-a-double-edged-sword-technical-standards-protect-and-defend/"><guid isPermaLink="false">803473b2-64fb-4741-ac44-855d5f724a19</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/on-the-point-of-a-double-edged-sword-technical-standards-protect-and-defend/</link><title>On the Point of a Double-Edged Sword: Technical Standards Protect and Defend</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-on-the-point-of-a-double-edge-sword-02-884x500.gif' style='float: left' alt=''/&gt;If one chooses security technology poorly or networks it incorrectly, the very tools used to help secure a facility may also render it vulnerable and invite risk. Hence, strict technical standards are an absolute must for any organization.</description><pubDate>Tue, 18 Jul 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/ransomware-attacks-on-nonprofits/"><guid isPermaLink="false">5cebea6a-33b2-44bb-8e73-ac885a2f480b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/ransomware-attacks-on-nonprofits/</link><title>Ransomware Attacks on Nonprofits: Rarity or Regularly Hidden?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-nonprofit-security-main-feature-on-ransomware-attacks-884x500.gif' style='float: left' alt=''/&gt;Although ransomware attacks on governments, critical infrastructure, cities, and private companies have been well-documented, they are also a concern for nonprofits and NGOs, which are frequently operating on a shoestring security budget.</description><pubDate>Mon, 17 Jul 2023 08:06:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/fast-facts-ransomware-payment-stages/"><guid isPermaLink="false">c5499a4d-9edc-4c6d-9d65-06d6ed611ad8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/fast-facts-ransomware-payment-stages/</link><title>6 Stages of a Ransomware Attack and Payment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-mosqueda-fast-facts-rransomware-attack-payment-01.gif' style='float: left' alt=''/&gt;Ransomware attacks and the subsequent payment process typically involves six significant steps, generating a self-sustaining cycle of extortion.</description><pubDate>Mon, 17 Jul 2023 08:06:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/csos-eye-nonprofit-security-challenges/"><guid isPermaLink="false">805b2ae8-3ca1-40c0-ab0f-bc488394b0b6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/csos-eye-nonprofit-security-challenges/</link><title>CSOs Eye Challenges and Solutions for Nonprofits</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-mosqueda-nonprofits-sidebar.jpg' style='float: left' alt=''/&gt;Nonprofit organizations provide a wide range of services to various industries—and they also face a wide range of attackers who target their data, people, resources, and money.</description><pubDate>Mon, 17 Jul 2023 08:06:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/best-practices-for-preventing-ransomware/"><guid isPermaLink="false">4fbb6647-41bc-4208-b327-695059507d01</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/nonprofit-security/best-practices-for-preventing-ransomware/</link><title>Best Practices for Preventing Ransomware</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-listicle-best-practices-for-preventing-ransomware-01-884x500.gif' style='float: left' alt=''/&gt;Here are some tips on how to use existing resources to buffer against malware and ransomware attacks.  </description><pubDate>Mon, 17 Jul 2023 08:06:12 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/industry-news-mod-pizza-flips-for-video-and-alarm-management/"><guid isPermaLink="false">93d33153-db7a-4c8f-8abb-e4519ddad7bb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/industry-news-mod-pizza-flips-for-video-and-alarm-management/</link><title>Industry News: MOD Pizza Flips for Video and Alarm Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-industry-news.jpg' style='float: left' alt=''/&gt;North American fast-casual eatery MOD Pizza chose to upgrade its video and alarm systems with solutions from Interface Systems.</description><pubDate>Fri, 14 Jul 2023 08:42:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/certification-profile-maurice-hicks-cpp/"><guid isPermaLink="false">670f002d-42e5-4d81-9133-1dfced0e13e3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/certification-profile-maurice-hicks-cpp/</link><title>Certification Profile: Maurice Hicks, CPP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-maurice-hicks-certifcation-profile.jpg' style='float: left' alt=''/&gt;After retiring from the police force, Maurice Hicks, CPP, kept trying to find a second career that could provide him with some of the excitement and comradery he had experienced in law enforcement.</description><pubDate>Thu, 13 Jul 2023 08:59:42 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/legal-report/"><guid isPermaLink="false">82573895-939e-4858-9ddf-20095bd1f3dc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/legal-report/</link><title>Legal Report: Oregon Power Utility Found Liable for Deadly 2020 Wildfires</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-legal-report.jpg' style='float: left' alt=''/&gt;An Oregon jury found a power utility company liable for four wildfires that burned through parts of the state in 2020.</description><pubDate>Mon, 10 Jul 2023 09:02:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/invest-in-inclusion/"><guid isPermaLink="false">f649828d-c9f2-452d-bff2-6697110097e2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/invest-in-inclusion/</link><title>To Increase Security, Invest in Inclusion </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-dei-meyer-inclusion-through-caring-884x500.jpg' style='float: left' alt=''/&gt;When it comes to making frontline employees feel like they are personally involved in the success or failure of an organization and that their efforts and opinions are crucial, companies frequently miss the mark.</description><pubDate>Mon, 03 Jul 2023 14:31:04 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/women-at-work-narrative/"><guid isPermaLink="false">36eded65-21f3-44f9-a155-b8b912f964ea</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/women-at-work-narrative/</link><title>How to Help Change the Narrative for Women at Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-meyer-womens-narrative-security-careers' style='float: left' alt=''/&gt;A broken rung on the career ladder is keeping many women from achieving leadership positions. Mentorships and inspiration can help give them a leg up. </description><pubDate>Mon, 03 Jul 2023 07:45:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-business-sustainability/"><guid isPermaLink="false">fa0c7e1c-1bf1-4a14-ac46-740696d28510</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-business-sustainability/</link><title>Why DE&amp;I is Key to Business Sustainability: Considerations for Incorporating It into Your Plan</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-dei-as-a-sustainability-measure-03.jpg' style='float: left' alt=''/&gt;While there’s nothing that can guarantee long-term success, there are things that businesses can do to improve how they hire, innovate, and conduct activities, which can contribute to their success. </description><pubDate>Mon, 03 Jul 2023 14:23:09 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/workplace-rules-dei/"><guid isPermaLink="false">3fbca7ac-a2e4-4476-82c6-53eb6f7f18c4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/workplace-rules-dei/</link><title>Editor's Note: Workplace Rules for DE&amp;I</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-ed-note-dei-884x500.gif' style='float: left' alt=''/&gt;In her book Just Work, Kim Scott highlights three sneaky ways a lack of DE&amp;I shows up in an organization—bias, prejudice, and bullying. </description><pubDate>Mon, 03 Jul 2023 07:45:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/infographic-elements-workplace-inclusion/"><guid isPermaLink="false">5fbcca9e-8e7e-4bcc-8e76-0971013b3206</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/infographic-elements-workplace-inclusion/</link><title>4 Essential Elements of Workplace Inclusion </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/dei/0723-dei-infographic-01.gif' style='float: left' alt=''/&gt;True inclusion enables employees to speak out, feel valued, and make significant contributions to the future of the organization.</description><pubDate>Mon, 03 Jul 2023 07:45:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-decisions-and-morale/"><guid isPermaLink="false">84df9c7c-0450-4006-a3e9-40e7aead2a0b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-decisions-and-morale/</link><title>How DE&amp;I Enhances Decision-Making and Team Morale</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-bailey-dei-is-a-journey-not-a-destination-v1.gif' style='float: left' alt=''/&gt;Diversity, equity, and inclusion (DE&amp;I) is a journey, not a destination. It requires constant reevaluation and effort through data analysis, outreach, and recruiting. </description><pubDate>Mon, 03 Jul 2023 07:45:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/talent-sourcing-in-physical-security/"><guid isPermaLink="false">a4b19232-0525-46ec-a317-5df0c2104d1e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/talent-sourcing-in-physical-security/</link><title>Why Talent Sourcing in Physical Security Needs a New Approach</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-dei-cameron-khani-hivewatch-head-of-talent-and-recruitment-884x500.gif' style='float: left' alt=''/&gt;Anytime you’re aiming to fill a role, you want to look at a candidate’s skill sets. But you shouldn’t be afraid to venture outside of the industry to do so. </description><pubDate>Mon, 03 Jul 2023 07:45:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/fast-facts-microaggressions/"><guid isPermaLink="false">170bc4a6-bd9c-4653-a063-e1eee2231a79</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/fast-facts-microaggressions/</link><title>How Microaggressions Impact Inclusion</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/july/0723-sm-thumbnail-how-microaggressions-impact-inclusion.gif' style='float: left' alt=''/&gt;Gender biases can be hard to combat in the workplace, especially when non-inclusive behaviors such as harassment and microaggressions come into play.</description><pubDate>Mon, 03 Jul 2023 09:52:30 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/book-review-intelligence-analysts/"><guid isPermaLink="false">e20a7215-a2f1-4889-9709-c2acb9d45794</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/book-review-intelligence-analysts/</link><title>Book Review: Intelligence and the State: Analysts and Decision Makers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-book-review-intelligence-and-the-state-featured-image.jpg' style='float: left' alt=''/&gt;Intelligence and the State is an unparalleled assessment of the current state of national intelligence. The author is a career professional who has worked within the intelligence community at various levels.</description><pubDate>Wed, 28 Jun 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/trauma-informed-workplace/"><guid isPermaLink="false">0483598d-f8f9-41b8-843a-f50d791c80d5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/trauma-informed-workplace/</link><title>How to Build a Trauma-Informed Workplace</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-how-to-build-a-trauma-informed-workplace.jpg' style='float: left' alt=''/&gt;Given the ubiquity of trauma in the world, some experts are calling on employers to develop “trauma-informed” workplaces. As a result, a number of training programs have popped up to help organizations through the storms. </description><pubDate>Mon, 26 Jun 2023 08:51:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/2023-asis-foundation-fitness-challengelaunches-plus-more-asis-news/"><guid isPermaLink="false">04ad7922-9b3b-4321-9387-475d74f5bc3f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/2023-asis-foundation-fitness-challengelaunches-plus-more-asis-news/</link><title>2023 ASIS Foundation Fitness Challenge Launches, Plus More ASIS News</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-fitness-challenge-asis-news.jpg' style='float: left' alt=''/&gt;Join your security colleagues from across the world to support the ASIS Foundation—just by going for a jog. You can walk, swim, bike, or run to contribute to our 34,000-kilometer goal. </description><pubDate>Fri, 23 Jun 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/book-review-the-cyber-elephant/"><guid isPermaLink="false">bf2d44dd-749f-4a57-881a-51b2249bc33c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/book-review-the-cyber-elephant/</link><title>Book Review: The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-book-review-cyber-elephant-in-the-boardroom-featured-image.jpg' style='float: left' alt=''/&gt;Senior managers who don’t have a strategy to mitigate their risks place their entire organization in danger. In fact, a single data breach could have devastating effects due to predatory lawyers with their class-action lawsuits, even if the organization was not at fault. </description><pubDate>Thu, 22 Jun 2023 07:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/marketplace-site-management-software-visible-weapon-detection-and-more/"><guid isPermaLink="false">b279c3c2-76b7-4dc1-86cf-fb9d84473632</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/marketplace-site-management-software-visible-weapon-detection-and-more/</link><title>Marketplace: Site Management Software, Visible Weapon Detection, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/marketplace/0623-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;What are the latest products and solutions offered across the security industry? Here are a few that came over Security Management’s radar in the past month. </description><pubDate>Wed, 21 Jun 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/refocus-school-security-investments/"><guid isPermaLink="false">54603a7b-a34b-4dbe-a64c-49292ea07a84</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/refocus-school-security-investments/</link><title>From Reactive to Effective: 5 Ways to Refocus School Security Investment Decisions </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-canal-school-investment-decisions.jpg' style='float: left' alt=''/&gt;Not all security systems respond equally to the evolving challenges of schools, and it can be difficult to navigate options and determine which one to implement. </description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/steps-for-school-safety-reporting/"><guid isPermaLink="false">e77adca5-883f-4795-b910-f1a972066afc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/steps-for-school-safety-reporting/</link><title>Fast Facts: 5 Steps for Stronger School Safety Reporting </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/security-management-fast-facts-5-steps-for-stronger-school-safety-reporting-884x500.gif' style='float: left' alt=''/&gt;A recently released toolkit seeks to improve schools’ bystander reporting capabilities and culture.</description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/infographic-risk-reporting-questions/"><guid isPermaLink="false">c96e014e-a994-4656-aae5-a20e77d49ff2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/infographic-risk-reporting-questions/</link><title>Building a Risk Reporting Program? Start with 6 Questions</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/school-security/0623-sm-school-security-infographic-6-questions-for-building-risk-reporting-mechanism-01.gif' style='float: left' alt=''/&gt;School districts must make key choices when designing and implementing a bystander reporting system to maximize participation. A toolkit from CISA and the U.S. Secret Service outlines six key decision points. </description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/grant-writing-best-practices/"><guid isPermaLink="false">a196cffb-d2df-4643-bbce-904249bb5bbd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/grant-writing-best-practices/</link><title>Top 10 Best Practices for Security Grant Writing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-sm-sds-grant-writing-guidance-884x500.jpg' style='float: left' alt=''/&gt;Researching and writing grants can be time-consuming, stressful, confusing, and, well, boring. That’s why we’ve put together a list of the top 10 best practices for grant-writing in the security industry to make sure your time is spent efficiently.</description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/lessons-for-strong-school-security-culture/"><guid isPermaLink="false">e4a621e5-e54c-4074-a5bf-2224702b79ff</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/lessons-for-strong-school-security-culture/</link><title>3 Lessons for Building a Stronger School Security Culture</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-sm-guy-bliesner-school-culture-and-safety-and-behavioral-change.gif' style='float: left' alt=''/&gt;School security is an ongoing posture that a school community must adopt, not simply a set of processes or purchases. Like most efforts in education, school security is a process of continual improvement.</description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/prescott-schools-proactive-security/"><guid isPermaLink="false">f589a626-209b-478d-a5ef-6ca9533906ad</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/school-security-and-active-assailants/prescott-schools-proactive-security/</link><title>Arizona School District Invests in Customizable Proactive Security Alerts</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-sm-prescott-schools-case-study-884x500-1.gif' style='float: left' alt=''/&gt;Prescott High School had plenty of surveillance cameras. But it lacked a method to actively see what’s happening and respond in a timely fashion, especially because no one on staff was tapped to constantly monitor the camera system.</description><pubDate>Mon, 19 Jun 2023 07:42:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/industry-news-canadian-casino-and-resort-upgrade-video-surveillance-and-access-control/"><guid isPermaLink="false">b563f3e2-8b79-4184-a1c0-05d6f45db72b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/industry-news-canadian-casino-and-resort-upgrade-video-surveillance-and-access-control/</link><title>Industry News: Canadian Casino and Resort Upgrade Video Surveillance and Access Control</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-mosqueda-industry-news.jpg' style='float: left' alt=''/&gt;River Cree Resort and Casino modernized its security, surveillance, and compliance initiatives with a unified solution based on Genetec’s Security Center.</description><pubDate>Tue, 13 Jun 2023 08:27:35 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/seeking-revenue-cartel-fuel-thefts/"><guid isPermaLink="false">82b0b664-0e31-495b-8800-e1801bf5342e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/seeking-revenue-cartel-fuel-thefts/</link><title>Seeking Revenue, Cartels Turn on the Fuel Tap </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-sm-fuel-theft-03.gif' style='float: left' alt=''/&gt;Oil thefts in Mexico have been an ongoing issue for decades; however, organized crime has increasingly leveraged fuel theft as a method to access the grey market and new revenue streams. </description><pubDate>Mon, 12 Jun 2023 08:07:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/cartel-homicides-infographic/"><guid isPermaLink="false">3ccf2461-2576-4bcb-a1fa-03dc15590cbb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/cartel-homicides-infographic/</link><title>Infographic: Reduced Drug Trade Pushes Cartels Toward Other Crimes </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/fuel-theft-and-cartels/0523-sm-infographic-critical-skills-preview-02-80-1.jpg' style='float: left' alt=''/&gt;The war on drugs pushed parties into greater incidents of violence. Cartels also ventured into new criminal activities, including illegally tapping into fuel lines owned by the state’s petroleum company, Petróleos Mexicanos (Pemex).</description><pubDate>Mon, 12 Jun 2023 08:07:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/fast-facts/"><guid isPermaLink="false">2fe553e8-ece9-4561-b43e-423b9d7d605d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/fast-facts/</link><title>Fast Facts: How Cartels Are Diversifying in Mexico</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/security-management-fast-facts-3-ways-mexican-cartels-diversified-revenue-streams-884x500.gif' style='float: left' alt=''/&gt;Several factors, including the war on drugs, pushed organized criminal enterprises operating in Mexico to diversify their revenue portfolios. </description><pubDate>Mon, 12 Jun 2023 08:07:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/petroleum-jargon/"><guid isPermaLink="false">f6ef86f3-4da9-42c6-b6c9-4351c1523f2c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/petroleum-jargon/</link><title>Petroleum Jargon: 9 Terms from Mexican Fuel Theft Trends</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/0623-fuel-theft-pemex.jpg' style='float: left' alt=''/&gt;To help get past the jargon in what can be a specialized crime, here is a handful of terms that can help illustrate fuel thefts that target Mexican pipelines.</description><pubDate>Mon, 12 Jun 2023 08:07:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/certification-profile-valentina-sabucco-app/"><guid isPermaLink="false">29fbb664-dcc1-4738-af6b-672da58cc3d1</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/certification-profile-valentina-sabucco-app/</link><title>Certification Profile: Valentina Sabucco, APP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/cert-profile-0623.jpg' style='float: left' alt=''/&gt;While studying classics and cultural heritage, Valentina Sabucco, APP, began to notice how fragile cultural heritage can be and how many different factors threaten to damage or destroy it. She developed an interest in protecting cultural heritage by learning how to mitigate threats, which led her to the security industry. </description><pubDate>Thu, 08 Jun 2023 08:44:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/06/legal-report/"><guid isPermaLink="false">e5ffd708-6124-46cb-88d3-42c2d8e0afe6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/06/legal-report/</link><title>Legal Report: Courts Find Pharmacy Retailer Walgreens Liable for City’s Opioid Crisis</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/june/legal-report/0623-legal-report.jpg' style='float: left' alt=''/&gt;Walgreens agreed to a $230 million settlement over its involvement in San Francisco’s opioid crisis.</description><pubDate>Fri, 02 Jun 2023 09:01:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/building-a-partnership-for-protection/"><guid isPermaLink="false">bff4fda1-a6cb-4433-b2b1-ad47984ea8b1</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/building-a-partnership-for-protection/</link><title>Building a Partnership for Protection: The Smithsonian and DC Fire </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0623-sm-partnering-for-protection-the-smithsonian-and-dcfd-884x500.jpg' style='float: left' alt=''/&gt;A chance encounter led to the creation of a partnership between the Smithsonian Institution and the DC Fire and EMS Department to improve incident response while preserving the institute’s vast collection.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/fast-facts-what-is-the-smithsonian-institute/"><guid isPermaLink="false">29061a9f-b2c0-4f2d-9f9f-0834a97fdb86</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/fast-facts-what-is-the-smithsonian-institute/</link><title>Fast Facts: What is the Smithsonian Institute?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0623-sectech-fast-facts-the-smithsonian-preview_442x250.gif' style='float: left' alt=''/&gt;Founded in 1846, the Smithsonian Institute is headquartered in Washington, D.C., and home to 21 museums and the National Zoo.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/how-to-create-inclusive-evacuation-plans/"><guid isPermaLink="false">a5ff170c-1519-4eb2-b91d-9d31eedf2e21</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/how-to-create-inclusive-evacuation-plans/</link><title>Infographic: How to Create Inclusive Evacuation Plans</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0523-sectec-june-infographic-01.gif' style='float: left' alt=''/&gt;Roughly 1.3 billion people live with a significant disability. Here are a few ways to ensure your fire evacuation plans are more inclusive of their needs.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/improving-emergency-response-with-better-dispatch-instructions/"><guid isPermaLink="false">5800223b-59a6-48c7-bb7a-54aa691ceaa1</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/improving-emergency-response-with-better-dispatch-instructions/</link><title>Improving Emergency Response with Better Dispatch Instructions</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0623-sectech-giannini-dispatch-instructions03-884x500.jpg' style='float: left' alt=''/&gt;ESRM teaches us to be prepared for adversity in ways which often include using alarm detection and notification. Clear, concise, communications can play a major role in improving fire incident response.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/challenges-to-incident-response-at-secured-data-centers/"><guid isPermaLink="false">abf83ab8-253a-4bd6-9293-bec24dc3ebf3</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/challenges-to-incident-response-at-secured-data-centers/</link><title>Challenges to Incident Response at Secured Data Centers</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0523-sectec-fire-risks-from-lithium-batteries05-884x500.jpg' style='float: left' alt=''/&gt;Data centers are increasingly adopting lithium-ion batteries to increase their uptime. But the adoption of the technology creates new hazards and challenges for fire departments during incident response.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/collaboration-how-technology-helps-multi-housing-community-managers-work-with-the-fire-department/"><guid isPermaLink="false">14bc34b2-913e-41e2-89e2-b693b54642a9</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/collaboration-how-technology-helps-multi-housing-community-managers-work-with-the-fire-department/</link><title>How Technology Helps Multi-Housing Community Managers Work with the Fire Department to Improve Incident Response</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0623-sectech-opportunity-home-fire-alerts02.gif' style='float: left' alt=''/&gt;Opportunity Home San Antonio recently adopted an automated notification system that alerts staff to fires in real-time.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/smart-sensor-reduces-fire-risk/"><guid isPermaLink="false">b02952e7-6978-44ba-9e2e-12223ab0adec</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/smart-sensor-reduces-fire-risk/</link><title>Smart Sensor Reduces Fire Risk for Housing Authority in Historic City</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0525-sectech-ipvideo-corp-case-study.gif' style='float: left' alt=''/&gt;The Saratoga Springs Housing Authority adopted the HALO IoT Smart Sensor to enhance its ability to comply with federal requirements to implement a smoke-free policy and reduce property damage caused by fires.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/crisis-management-making-argentinas-electric-grid-more-resilient/"><guid isPermaLink="false">3f28290d-f6b5-4b5d-a547-579d4a5e868a</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/june/crisis-management-making-argentinas-electric-grid-more-resilient/</link><title>Crisis Management: Making Argentina’s Electric Grid More Resilient</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/june/0523-sectec-argentina-electric-grid-884x500.jpg' style='float: left' alt=''/&gt;After a 2019 blackout, Transener implemented safety protocols and preventative maintenance to limit the impact of future outages. Those measures were put to the test after wildfires damaged part of Argentina’s electric grid in 2023.</description><pubDate>Thu, 01 Jun 2023 07:36:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/asis-news-how-to-get-involved-with-upcoming-events-and-global-governance-activities/"><guid isPermaLink="false">4f992ca2-b8b8-429c-b55c-08bb7be1dd03</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/asis-news-how-to-get-involved-with-upcoming-events-and-global-governance-activities/</link><title>ASIS News: How to Get Involved with Upcoming Events and Global Governance Activities </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-asis-news.jpg' style='float: left' alt=''/&gt;In June, two ASIS conference help highlight the women in the security industry who are breaking down barriers while being at the top of their game. </description><pubDate>Fri, 26 May 2023 08:21:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/book-review-youth-violence-prevention-the-pathway-back-through-inclusion-and-connection/"><guid isPermaLink="false">e2ee05d1-59dc-4f2c-919a-6b7b6839bfce</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/book-review-youth-violence-prevention-the-pathway-back-through-inclusion-and-connection/</link><title>Book Review: Youth Violence Prevention: The Pathway Back Through Inclusion and Connection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-book-review-youth-violence-prevention-featured-image.jpg' style='float: left' alt=''/&gt;This book is not about punitive solutions, punishment, expulsion, or exclusion, but instead aims to avoid the “school-to-prison pipeline.”</description><pubDate>Wed, 24 May 2023 07:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/drones-fire-management/"><guid isPermaLink="false">aa4c4f91-403f-442d-a1f5-9cd34675a8e5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/drones-fire-management/</link><title>Mapping the Blaze: How the U.S. Forest Service Uses Drones for Fire Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-uas-and-the-u.s.-forest-service-feature-884x500.jpg' style='float: left' alt=''/&gt;To help reduce human risks, the U.S. Forest Service is creating an uncrewed aviation vehicle (UAV) system to carry out its land and forest management mission.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/weaponized-drones/"><guid isPermaLink="false">04487e82-8a95-438f-a19d-6a5fe5217b19</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/weaponized-drones/</link><title>Weaponized Drones are Changing the National and Corporate Security Paradigm</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-faintuch-drone-terrorism-threats.jpg' style='float: left' alt=''/&gt;As procurement of drones has become far simpler, tools once exclusively available to modern militaries and cutting-edge developers are now falling into the hands of dangerous non-state actors.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/security-implications-drones/"><guid isPermaLink="false">25569413-f6eb-4432-9ba6-56dc9f87a23a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/security-implications-drones/</link><title>The Security Implications of Drone Threats </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0525-sm-security-implications-drone-threats-03.gif' style='float: left' alt=''/&gt;While drones can be used for good, there are a variety of nefarious uses of the technology that threaten both physical and national security.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/marketplace-high-volume-shredders-specialized-doors-video-intercoms-and-more/"><guid isPermaLink="false">ab1e5fb2-1677-4bbe-84d3-d97503de88a0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/marketplace-high-volume-shredders-specialized-doors-video-intercoms-and-more/</link><title>Marketplace: High Volume Shredders, Specialized Doors, Video Intercoms, and More </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/marketplace/0523-sm-marketplace-884x500.jpg' style='float: left' alt=''/&gt;Check out the newest products released across the security industry this month, including high volume shredders, specialized security doors, and more. </description><pubDate>Fri, 19 May 2023 08:06:49 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/the-diversification-of-the-drone-market/"><guid isPermaLink="false">674a5b8d-e5f8-4f9b-b7db-7aee78c4f399</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/the-diversification-of-the-drone-market/</link><title>The Diversification of the Drone Market: A Close-Up on Counter-Uncrewed Aerial Options </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523sm_bill-edwards-cuas-systems_884x500.gif' style='float: left' alt=''/&gt;The drone market has grown rapidly in the past 13 years, including in the counter-uncrewed aerial systems space (CUAS) despite strict regulations on who and when these systems can be used.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/types-of-uas/"><guid isPermaLink="false">88c64c0c-aa31-4bd3-8f14-fd2a53ac8dc8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/types-of-uas/</link><title>The 4 Types of UAS on the Market Today </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/dronesuavs/0523_infographic-drones-uncrewed-aerial-systems-uas-01.jpg' style='float: left' alt=''/&gt;The University of Florida’s UAS Research Program breaks drones down into four major categories. Here’s a quick summary of what sets them apart.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/fast-facts/"><guid isPermaLink="false">c30231b8-7451-4713-af6a-f165c3e7f521</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/fast-facts/</link><title>Fast Facts: Breaking Down the Commercial UAS Market</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-uas-fast-facts-about-commercial-drone-market-884x500.gif' style='float: left' alt=''/&gt;The commercial uncrewed aerial systems market was estimated at $29.86 billion in 2022. Here’s a snapshot of sectors adopting UAS and where growth is expected to occur between now and 2030.</description><pubDate>Mon, 22 May 2023 08:05:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/book-review-healthcare-security-solutions-for-management-operations-and-administration/"><guid isPermaLink="false">502fd0e1-6ee2-4daf-a262-f1ad7d0a9cb7</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/book-review-healthcare-security-solutions-for-management-operations-and-administration/</link><title>Book Review: Healthcare Security: Solutions for Management, Operations and Administration</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-book-review-healthcare-security-featured-image.jpg' style='float: left' alt=''/&gt;Healthcare Security: Solutions for Management, Operations, and Administration is essentially an extensive collection of articles written by one or both authors on varying topics related to healthcare security. </description><pubDate>Wed, 17 May 2023 08:52:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/parametric-insurance/"><guid isPermaLink="false">564e8a71-64e8-4100-b926-a14529bebd1b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/parametric-insurance/</link><title>Sword and Shield: Two Ways to Leverage Insurance Against Climate Risks </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-q-a-climate-and-corporate-security.jpg' style='float: left' alt=''/&gt;As climate events escalate in frequency and intensity, organizations often cannot wait to initiate response and recovery measures until traditional insurance payouts come through. Parametric policies can help fund initial responses. </description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/climate-security-connections/"><guid isPermaLink="false">85470ab6-7745-4a4a-9975-f03b8cf35136</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/climate-security-connections/</link><title>How Climate and Security Are Connected</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0522-sm-hans-fah-climate-change-geopolitical-risk-03.gif' style='float: left' alt=''/&gt;While catastrophic natural disasters have direct and overt impacts, such events often trigger a cascade of second or third order impacts which manifest in ways that are hard to predict.</description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/climate-change-violence-nexus/"><guid isPermaLink="false">be8790d6-d809-4c0e-9f58-453b032583ad</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/climate-change-violence-nexus/</link><title>The Climate Change–Violence Nexus: Implications for Workplace Violence Prevention and Threat Assessment </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-crimando-climate-change-and-human-psychology-emotional-escalation.jpg' style='float: left' alt=''/&gt;Researchers have seen a rise in climate-related grief, anxiety, post-traumatic stress, and depression, as well as rising interpersonal aggression and violence and impaired cognitive and brain function—all of which have direct implications for safety, security, and business continuity.</description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/sea-level-rise-infographic/"><guid isPermaLink="false">54833955-5b6f-4445-b45b-56e6fd260810</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/sea-level-rise-infographic/</link><title>Infographic: Who is at Risk from Sea Level Rise?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/climate-change/0523-sm-infographic-climate-change-and-business-continuity02.gif' style='float: left' alt=''/&gt;“Rising seas are sinking futures,” said United Nations Secretary General António Guterres in remarks to the UN Security Council in February 2023. “Sea-level rise is not only a threat in itself, it is a threat multiplier.”</description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/business-continuity-climate-change/"><guid isPermaLink="false">917d1617-0bf4-4c8b-bb78-8515d2c7eff2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/business-continuity-climate-change/</link><title>The Missing Link in Business Continuity Planning: Accounting for the Impact of Climate Change </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sawant-climate-change-supply-chain-business-continuity.jpg' style='float: left' alt=''/&gt;Many organizations are experiencing the impacts from extreme weather events or expect to in the near future. Climate change could disrupt business models and destroy enterprise value that has taken decades to build.</description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/fast-facts-protests/"><guid isPermaLink="false">b1bf6f9c-2953-48ba-8595-2ceecd18178b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/fast-facts-protests/</link><title>Fast Facts: Climate Protests Grow in Size and Influence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-fast-facts-climate-protests-grow.gif' style='float: left' alt=''/&gt;Climate change is a potent motivator for protests. Demonstrators see the stakes as existential—climate change could threaten their livelihoods and lives. </description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/lake-chad-terrorism/"><guid isPermaLink="false">37338380-ba0a-4035-b59d-813d409923be</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/climate-change-and-security/lake-chad-terrorism/</link><title>A Catastrophic Correlation: How Climate Change Influenced Terrorism Around Lake Chad</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-climate-sidebar-lake-chad-basin-conflict.jpg' style='float: left' alt=''/&gt;Climate change has been a major driver of instability and violence in the Lake Chad region in Central Africa, where millions of people are suffering from food insecurity, displacement, and human rights violations.</description><pubDate>Mon, 15 May 2023 06:35:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/industry-news-lax-horton-solution-people-mover/"><guid isPermaLink="false">a0c209b3-4c47-47a0-a7b4-82c7fafd16fb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/industry-news-lax-horton-solution-people-mover/</link><title>Industry News: Los Angeles International Airport Invests in Safety Doors for People Mover</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-industry-news.jpg' style='float: left' alt=''/&gt;With renovations underway in anticipation of the 2028 Summer Olympic Games, the Los Angeles International Airport (LAX) has invested in upgrading and modernizing its infrastructure.</description><pubDate>Thu, 11 May 2023 10:59:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/certification-profile-zulaykhah-aileru-psp/"><guid isPermaLink="false">54fb0970-751b-4a5c-86bc-a2f5b3b1a326</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/certification-profile-zulaykhah-aileru-psp/</link><title>Certification Profile: Zulaykhah Aileru, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-zulaykhah-aileru-certifcation-profile.jpg' style='float: left' alt=''/&gt;After landing her first job in the security industry, Zulaykhah Aileru, PSP, felt she was able to make impactful decisions and develop solutions that helped address the precarious security situation for both businesses in and the government of Nigeria.</description><pubDate>Thu, 11 May 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/legal-report/"><guid isPermaLink="false">e5872fe7-f430-4673-9988-caa50115f55d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/legal-report/</link><title>Legal Report: China Expands Anti-Espionage Laws</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-lr-little-gavel.jpg' style='float: left' alt=''/&gt;New revisions to China’s anti-espionage laws translate into a broader definition of what qualifies as spying in the nation and could put academics, executives, and journalists at greater risk.</description><pubDate>Fri, 05 May 2023 15:48:02 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/from-cso-to-sse/"><guid isPermaLink="false">4926e7ad-e7d8-45e3-882b-4d5ff2384ddc</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/from-cso-to-sse/</link><title>From CSO to SSE: Expanding Leadership Roles in Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-from-cso-to-sse-03.gif' style='float: left' alt=''/&gt;Higher-level positions demand more interpersonal and fewer technical skills, requiring security executives to know the fundamental subjects of a senior manager: finance, strategy, negotiation, and leadership. </description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/pyramid-of-skills/"><guid isPermaLink="false">f2846a9b-922b-49f2-ae92-aaa4c556005e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/pyramid-of-skills/</link><title>A Pyramid of Skills: How CSOs Can Become Business Leaders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-introduction.jpg' style='float: left' alt=''/&gt;The characteristics that make a good security leader are known and can be developed. A committee of CSOs boiled them down to five key competencies. </description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/lead-with-doubt/"><guid isPermaLink="false">c0eb3121-ae4a-40fd-90bf-d36b0c4468a0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/lead-with-doubt/</link><title>Why Security Executives Should Lead with Doubt</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-leading-with-doubt.jpg' style='float: left' alt=''/&gt;Successful leaders need to have four types of problem-solving people in their inner circles when making decisions: dreamers, designers, doers, and doubters. Each characteristic contributes to the finished product.</description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/analyzing-business/"><guid isPermaLink="false">ff99e18c-f7b6-4667-8fb0-4d562b3f391c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/analyzing-business/</link><title>How to Analyze Your Business</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-analyzing-the-business.jpg' style='float: left' alt=''/&gt;CSOs need to continually analyze the business and the direction it is heading so they can align the department’s security posture to meet the organization’s needs.</description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/robust-risk-management/"><guid isPermaLink="false">febe193d-2273-45b8-b73f-e636c5919eb5</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/robust-risk-management/</link><title>How CSOs Can Build Robust Risk Management Foundations </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-risk-management.jpg' style='float: left' alt=''/&gt;Effective risk management enables CSOs to ensure business continuity by identifying potential disruptions and developing plans to minimize their impact. This ensures that the organization can continue to operate, even in the face of unexpected events. </description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/strategy-development/"><guid isPermaLink="false">5795e6f2-a7f8-49fa-aa17-fdbfdf0c7cbf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/strategy-development/</link><title>Strategy Development and the Corporate Security Leader</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-strategy.jpg' style='float: left' alt=''/&gt;Strategy development is an iterative process where you will continually be evaluating and updating that strategy.  Operating a business is not a static event; neither is your strategy. </description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/future-proofing/"><guid isPermaLink="false">0a7747e8-01c7-4091-a98e-3c5d1b5dec3e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/future-proofing/</link><title>Think Ahead with Future Proofing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-cso-pyramid-future-proofing.jpg' style='float: left' alt=''/&gt;Future proofing is about identifying the long-term vision of your department, developing a strategy to achieve the vision, and obtaining the resources required to execute the strategy. </description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/editors-note/"><guid isPermaLink="false">85795e0a-b665-4a0b-9c5f-b182925dc0a6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/editors-note/</link><title>Longtermism and Unknown Knowns: How Security Can Shape the Future</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-cso-editor-note-long-term-thinking-02.gif' style='float: left' alt=''/&gt;Thinking of the future and the long-term implications of current action is very much on the minds of today’s chief security officers (CSOs).</description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/fast-facts/"><guid isPermaLink="false">bbec6d16-fb23-434e-a287-6458c268384f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/fast-facts/</link><title>Fast Facts: 5 Essential Competencies for CSOs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523sm-5-essential-competencies-for-csos.gif' style='float: left' alt=''/&gt;Want to develop your business-centric skills and security management potential? These five skills should top your professional development list.</description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/infographic-people-skills/"><guid isPermaLink="false">4c333d7b-f58c-4940-912c-36c7b5039860</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/05/how-to-become-a-cso/infographic-people-skills/</link><title>Infographic: Weighing Critical People Skills for Security Leaders</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/may/0523-sm-infographic-critical-skills-preview.gif' style='float: left' alt=''/&gt;What soft skills are needed for security professionals to be successful today and in the future?</description><pubDate>Mon, 01 May 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/book-review-from-berkeley-to-berlin-how-the-rad-lab-helped-avert-nuclear-war/"><guid isPermaLink="false">9c95a292-1ffa-40b4-97a4-23771ee7072b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/book-review-from-berkeley-to-berlin-how-the-rad-lab-helped-avert-nuclear-war/</link><title>Book Review: From Berkeley to Berlin: How the Rad Lab Helped Avert Nuclear War </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-book-review-from-berkeley-to-berlin-featured-image.jpg' style='float: left' alt=''/&gt;More than 70 years ago, the United States came very close to having a nuclear exchange with the Soviet Union. Tom Ramos writes, “The fact that we escaped, for 70 years, from having a nuclear exchange with the Soviet Union was not an accident.”</description><pubDate>Wed, 26 Apr 2023 15:42:01 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/asis-news/"><guid isPermaLink="false">d9b2405f-8cf9-4bba-b091-a2fb7927cf01</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/asis-news/</link><title>ASIS News: Awards of Excellence, Security LeadHER, and New European Committees </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-asis-news-02.jpg' style='float: left' alt=''/&gt;ASIS is currently accepting nominations for the 2023 Awards of Excellence. Nominate a deserving member or organization today through our online application process. </description><pubDate>Wed, 26 Apr 2023 08:37:32 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/shaping-workplace-violence-mitigation-strategies/"><guid isPermaLink="false">6f6ec9fc-fe0d-4e6b-a96a-829964b3e70a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/shaping-workplace-violence-mitigation-strategies/</link><title>Shaping Workplace Violence Mitigation Strategies for a Healthy Hospital</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0424-jones-violence-mitigation-strategies.jpg' style='float: left' alt=''/&gt;Healthcare staff often experience a higher risk of workplace violence than employees in other industries. For those working in a hospital’s emergency room, violence can come from many sources, including those with good intentions.</description><pubDate>Mon, 24 Apr 2023 07:49:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/principles-workplace-violence-prevention/"><guid isPermaLink="false">291464ac-4232-4445-9dac-dae844a52e33</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/principles-workplace-violence-prevention/</link><title>9 Principles for Workplace Violence Prevention in Healthcare</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423sm_9-principles-for-workplace-violence-prevention-in-healthcare04_884x500.jpg' style='float: left' alt=''/&gt;A formal workplace violence prevention program for healthcare facilities can reduce and mitigate violent incidents—especially when paired with these principles and priorities.</description><pubDate>Mon, 24 Apr 2023 07:49:07 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/patient-room-video-technology/"><guid isPermaLink="false">dad8e0f8-48ac-4fbc-924b-b7d95a87a59d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/patient-room-video-technology/</link><title>Patient Room Video Technology: Assisting Hospital Staff During Shortages</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-johnson-healthcare-tech-qa.jpg' style='float: left' alt=''/&gt;Video technologies are now being adapted in a wide range of care facilities to help ensure the health and wellness of residents and patients—especially during this critical period of nursing and staff shortages. </description><pubDate>Mon, 24 Apr 2023 07:49:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/hospital-hazardous-environments/"><guid isPermaLink="false">5cd12376-146e-48cc-ab55-b7f4385558df</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/hospital-hazardous-environments/</link><title>Bad Blood: Hospitals Make for Hazardous Work Environments</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-mosqueda-hospital-hazardous-work-environments.jpg' style='float: left' alt=''/&gt;Hospitals are consistently ranked as some of the most hazardous work environments in the United States, with reports of violent incidents increasing over the past two years. </description><pubDate>Mon, 24 Apr 2023 07:49:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/healthcare-framework/"><guid isPermaLink="false">b836238a-f6b0-4710-81f4-aaf9647e46b3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/healthcare-framework/</link><title>Fast Facts: A Framework for Safer Healthcare Workplaces</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-sm-fast-facts-a-framework-for-safer-healthcare-workplaces_884x500.gif' style='float: left' alt=''/&gt;By emphasizing workforce education and protection, this framework can help hospitals and healthcare leaders address violence in their facilities and among staff. </description><pubDate>Mon, 24 Apr 2023 07:49:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/marketplace-access-control-door-lights-cloud-solutions-and-more/"><guid isPermaLink="false">11f917c9-91ba-4847-bca8-ece79d504b61</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/marketplace-access-control-door-lights-cloud-solutions-and-more/</link><title>Marketplace: Access Control, Door Lights, Cloud Solutions, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/marketplace/0423sm_marketplace02_884x500.jpg' style='float: left' alt=''/&gt;What are the latest products and solutions in the security industry? Keep up with the newest releases in the April 2023 Marketplace roundup. </description><pubDate>Fri, 21 Apr 2023 08:23:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/resilience-management-how-to-turn-a-threat-into-an-opportunity/"><guid isPermaLink="false">5a6e19f7-d158-4eda-abb5-8f59eaf375c9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/resilience-management-how-to-turn-a-threat-into-an-opportunity/</link><title>Resilience Management: How to Turn a Threat into an Opportunity</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0423-teslenko-mikheiev-resilience-threat-opportunity.gif' style='float: left' alt=''/&gt;Despite enormous challenges, two Ukrainian organizations continued to operate during COVID-19 and the ongoing war. Here’s how business continuity investments helped.</description><pubDate>Wed, 19 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/the-how-of-security-governance/"><guid isPermaLink="false">da6b5927-9548-4d0d-8b5f-49127cb5a7dd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/the-how-of-security-governance/</link><title>The How of Security Governance: Procedures Provide Support </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-antons-the-how-of-security-governance-procedures-provide-support04_884x500.gif' style='float: left' alt=''/&gt;Your operational procedures are a tactical and operational product that will likely be the most cited resource to communicate the "how" for the most common tasks security teams are likely to encounter.</description><pubDate>Wed, 05 Apr 2023 09:00:21 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/book-review-basic-handbook-of-police-supervision/"><guid isPermaLink="false">b9064c70-c666-4e67-b313-e3928a0cba6e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/book-review-basic-handbook-of-police-supervision/</link><title>Book Review: Basic Handbook of Police Supervision</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-book-review-basic-handbook-police-supervision-featured-image.jpg' style='float: left' alt=''/&gt;Basic Handbook of Police Supervision: A Guide for Law Enforcement Supervisors is exactly what the title suggests—a very well written, beginner-level guide for what newly promoted law enforcement supervisors should know and expect as they transition into a supervisory role.</description><pubDate>Thu, 20 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/mass-layoff-insider-threat/"><guid isPermaLink="false">ef09d463-63b8-42cd-9a75-5ce071757e04</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/mass-layoff-insider-threat/</link><title>In the Wake of Mass Layoffs, Insider Threats Multiply</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-Meyer-insider-threat-mass-layoffs_884x500.gif' style='float: left' alt=''/&gt;When seismic personnel shifts occur, they inevitably spur ill will, bad publicity, and significant stress both among people who were laid off and the staff that remains. </description><pubDate>Mon, 17 Apr 2023 09:17:32 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/insider-threat-costs/"><guid isPermaLink="false">65f959a6-0c04-4129-847b-f0fa554dcace</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/insider-threat-costs/</link><title>Infographic: How Much Do Insider Threat Incidents Cost Companies?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/insider-threat/0423-infographic-insider-threat-01.gif' style='float: left' alt=''/&gt;Insider incidents increased in both cost and frequency between 2020 and 2022, with 67 percent of companies experiencing between 21 and more than 40 incidents annually—compared with just 53 percent in 2018.</description><pubDate>Mon, 17 Apr 2023 09:17:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/how-to-reduce-friction-in-fraud-prevention/"><guid isPermaLink="false">971afb14-0c9f-414b-8b9c-074e1b111e93</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/how-to-reduce-friction-in-fraud-prevention/</link><title>How to Reduce Friction in Fraud Prevention</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-insider-threat-hid-fraud-prevention.gif' style='float: left' alt=''/&gt;Threats come from all directions, including inside the bank with the growing success of phishing and other schemes that trick users into providing usernames and passwords.</description><pubDate>Mon, 17 Apr 2023 09:36:58 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/after-snowden/"><guid isPermaLink="false">d235a044-4205-409e-ae84-819ab9806e5f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/after-snowden/</link><title>The State of Insider Threat Initiatives 10 Years After Snowden</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423_sm_insider-threat-snowden-retrospective_884x500.jpg' style='float: left' alt=''/&gt;Edward Snowden leaked a trove of classified information that was published by the press in June 2013. Ten years later, insider threat mitigation approaches have changed, despite limited resources. </description><pubDate>Mon, 17 Apr 2023 09:17:19 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/types-of-insider-threats/"><guid isPermaLink="false">1be18d4a-00ea-4e95-93cd-c8615380d00f</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/types-of-insider-threats/</link><title>Fast Facts: 3 Types of Insider Threats </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-fast-facts_types-of-insider-threats.gif' style='float: left' alt=''/&gt;Malicious insiders might get the most attention, but they are not the most common form of insider threat. </description><pubDate>Mon, 17 Apr 2023 09:17:29 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/avoiding-layoff-mistakes/"><guid isPermaLink="false">df704d62-69cb-4472-a19d-1e4587f919d3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/avoiding-layoff-mistakes/</link><title>How to Avoid Common Layoff Mistakes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423_sm_insider-threat-package-shrm-article-layoff-mistakes_884x500.gif' style='float: left' alt=''/&gt;Cutting jobs is never pleasant, but proper planning can minimize problems later.</description><pubDate>Mon, 17 Apr 2023 09:17:25 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/warn-act-layoffs/"><guid isPermaLink="false">0b2304d0-318b-46ac-a86e-530c668fc844</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/warn-act-layoffs/</link><title>During Layoffs, Remember to Give Fair WARNing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423_sm_shrm-sidebar-layoff-mistakes_884x500.jpg' style='float: left' alt=''/&gt;When conducting large-scale layoffs, U.S. employers must follow the federal Worker Adjustment and Retraining Notification (WARN) Act, which protects workers from the impacts of suddenly and unexpectedly losing their jobs without notice.</description><pubDate>Mon, 17 Apr 2023 09:17:22 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/operational-insider-threat-strategies/"><guid isPermaLink="false">2f476148-db14-45ee-874b-c5a9ab536c4d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/insider-threats/operational-insider-threat-strategies/</link><title>Operational Strategies for Today’s Insider Threat Environment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423sm_operational-strategies-for-todays-insider-threat-environment01_884x500.jpg' style='float: left' alt=''/&gt;There are five areas to consider when developing an insider risk program: mission, enterprise perspectives, grounding, operational strategies, and readiness. </description><pubDate>Mon, 17 Apr 2023 09:17:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/industry-news-finnish-hypermarkets-select-idis-for-new-vms-solution/"><guid isPermaLink="false">4a1bf7e3-5d7c-408e-8a82-9ca24390371c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/industry-news-finnish-hypermarkets-select-idis-for-new-vms-solution/</link><title>Industry News: Finnish Hypermarkets Select IDIS for New VMS Solution</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423_industry-news_prisma-idis.jpg' style='float: left' alt=''/&gt;Prisma picked IDIS’s VMS to connect with its analog surveillance cameras across its stores in the goal of reducing shrink.</description><pubDate>Fri, 14 Apr 2023 08:26:22 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/certification-profile-jared-gibbons-app/"><guid isPermaLink="false">48549187-be5d-4519-acdf-eca340ea541b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/certification-profile-jared-gibbons-app/</link><title>Certification Profile: Jared Gibbons, APP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/0423-cert-profile-jared-gibbons-app.jpg' style='float: left' alt=''/&gt;Jared Gibbons, APP, started his security career working in retail in positions that primarily focused on reducing shrink. Gibbons found the field exciting but wanted to develop new skills and advance his career. </description><pubDate>Thu, 13 Apr 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/04/legal-report/"><guid isPermaLink="false">83f4bea2-2382-45ed-bb06-12b3f2a877d6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/04/legal-report/</link><title>Legal Report: California School District to Pay $13 Million After Shooting</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/april/sm_legal-report_10.jpg' style='float: left' alt=''/&gt;The family of an 18-year-old woman who was shot and killed by a California school safety officer will receive a $13 million settlement as part of an agreement ending a wrongful death lawsuit against the Long Beach Unified School District. </description><pubDate>Tue, 11 Apr 2023 07:59:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/family-offices-what-they-get-right-about-security/"><guid isPermaLink="false">c97240da-0b4e-46a6-95bb-1b5adec11ac5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/family-offices-what-they-get-right-about-security/</link><title>Family Offices: What They Get Right About Security, and What Companies Can Learn from Them</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sectech_fred-burton_family-model_884x500.gif' style='float: left' alt=''/&gt;In protecting some of the highest-profile individuals who attract the most unusual risks, family offices are often at the forefront of security innovation. Here are some aspects they get right which, when adopted by organizations, can help transform your security program.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/executive-security-mobile-command-service/"><guid isPermaLink="false">694efe26-d2b0-4084-9939-833e84dbc0c9</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/executive-security-mobile-command-service/</link><title>Elevating Executive Security with Mobile Command as a Service</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sectech_benne-ep-at-special-events02_884x500.gif' style='float: left' alt=''/&gt;Just as VIPs may invest in fractional jet ownership, mobile command as a service provides access to a fully equipped, state-of-the-art mobile command vehicle for a specified number of engagements per year. </description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/executive-protection-age-technology/"><guid isPermaLink="false">ab2fdc51-9e3a-49fc-a995-587c0d2b92f6</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/executive-protection-age-technology/</link><title>Executive Protection in the Age of Technology: Addressing the Risks </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sectech_weil-ep-and-technology-risks_884x500.gif' style='float: left' alt=''/&gt;As technology advances, the line between physical security and cybersecurity is becoming more blurred, exposing executives to numerous cyber threats that can result in physical vulnerabilities.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/modernizing--approach-executive-digital-risk-management/"><guid isPermaLink="false">6ddc9a9a-1de1-464b-aaa2-bbd86be6857f</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/modernizing--approach-executive-digital-risk-management/</link><title>Modernizing your Approach to Executive Digital Risk Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sectech_brogan-ingstad-and-amelia-heisler_884x500.jpg' style='float: left' alt=''/&gt;Social media is an essential business tool for executives. But digital strategies also need to assess vulnerabilities that publicly available personal information create.</description><pubDate>Sat, 01 Apr 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/fast-facts-protecting-former-us-president-jimmy-carter/"><guid isPermaLink="false">ca1cd743-45de-4c32-b8aa-4dde8b5ed773</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/fast-facts-protecting-former-us-president-jimmy-carter/</link><title>Fast Facts: Protecting Former U.S. President Jimmy Carter</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/fast-facts-protecting-former-us-president-jimmy-carter_884x500.gif' style='float: left' alt=''/&gt;The U.S. Secret Service, one of the premier executive protection agencies in the world, marked a significant milestone on 20 January 2023: 42 years protecting former U.S. President James “Jimmy” Carter.</description><pubDate>Sat, 01 Apr 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/creativity-in-motion/"><guid isPermaLink="false">73f3ca2a-ddae-4277-a2be-a6219ccdf3bc</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/creativity-in-motion/</link><title>Creativity in Motion: 7 Armored Vehicles that Show the Range of Reinforcement</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sechtech_armored-vehicles.jpg' style='float: left' alt=''/&gt;From a Chris Pratt television series to the French countryside, armored cars can be seen just about everywhere—if you’re paying attention. Here are seven models from history that caught our eye.</description><pubDate>Sat, 01 Apr 2023 06:00:11 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/when-second-homes-are-a-primary-concern/"><guid isPermaLink="false">d6e6ae52-9d75-4a5f-a122-a50f6b2e240e</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/when-second-homes-are-a-primary-concern/</link><title>When Second Homes Are a Primary Concern</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423_sectech_protecting-second-residences.gif' style='float: left' alt=''/&gt;Vacation homes are supposed to be sanctuaries, and the people who decamp there usually treat it as such. Two experts offer advice on how executive protection teams can help make these places of refuge rejuvenating and safe for clients.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/ep-skillsets-elevating-leadership-skills-protect-business/"><guid isPermaLink="false">9060bbb2-2af9-4006-b422-b44700c7aeaf</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/ep-skillsets-elevating-leadership-skills-protect-business/</link><title>EP Skillsets: Why Elevating Leadership Skills will Protect your Business</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423-sectech-fixelius-identifying-managers-2.gif' style='float: left' alt=''/&gt;The common belief that leadership and organizational skills develop from the ability to perform well individually, in a profession, is problematic. Here are steps to elevate your leadership skills while protecting your business.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/importance-standardizing-ep/"><guid isPermaLink="false">e3645222-cca4-4ab0-8b57-897c464cefe1</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/importance-standardizing-ep/</link><title>The Importance of Standardizing EP</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0423-sectech-cameron-standardizing-ep.jpg' style='float: left' alt=''/&gt;The job of an executive protection (EP) professional is to protect an individual from harm and embarrassment. These are very broad terms. Without standards for operating procedures and business practices, it can be difficult to measure the quality and professionalism of EP services.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/tech-advance-how-executive-protection-leverages-technology/"><guid isPermaLink="false">1939585b-7c8e-4be9-8dba-a6f59a25c2e0</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/april/tech-advance-how-executive-protection-leverages-technology/</link><title>The Tech Advance: How Executive Protection Leverages Technology to Protect Client</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/april/0323sm-ep-and-tech-Gates_884x500.jpg' style='float: left' alt=''/&gt;As operations teams get smaller but the scope of their work grows, executive protection teams are turning to technological tools to provide additional support.</description><pubDate>Sat, 01 Apr 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/asis-news/"><guid isPermaLink="false">c331b419-5e73-4f06-ac2d-35e79b5219a2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/asis-news/</link><title>Member Appreciation Month Concludes with Extra Education and Member Resources</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-asis-news-member-appreciation-month.jpg' style='float: left' alt=''/&gt;To celebrate ASIS members and their contributions to the association and the industry, ASIS is releasing member-exclusive webinars and eBooks, as well as featuring weekly promotions throughout March. </description><pubDate>Thu, 23 Mar 2023 10:27:00 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/international-investigations/"><guid isPermaLink="false">9d298144-4d51-4b3e-9fad-88c84af15f80</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/international-investigations/</link><title>Conducting Investigations Internationally: Know Before You Go</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_sm_investigations_rc-miles_02.gif' style='float: left' alt=''/&gt;Security professionals operating internationally that are also responsible for internal investigations face a complicated investigative minefield when dealing with incidents in unfamiliar territories and legal systems. This calls for a carefully thought-out game plan outlined before you leave HQ.</description><pubDate>Mon, 27 Mar 2023 07:57:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/investigation-bias/"><guid isPermaLink="false">9e5b570d-ae6a-4668-8a8a-dec25355f410</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/investigation-bias/</link><title>How to Deal with Bias in Investigations</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_sm_investigations-sidebar_how-to-stay-impartial-as-an-investigator03.gif' style='float: left' alt=''/&gt;Unbiased investigators are hugely beneficial to investigations, but sometimes an investigator’s impartiality can be threatened.</description><pubDate>Mon, 27 Mar 2023 07:57:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/infographic-investigation-elements/"><guid isPermaLink="false">064029bc-75ab-4d6a-acf6-d1129829db36</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/infographic-investigation-elements/</link><title>Infographic: 4 Elements of a Strong Investigative Framework </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/investigations/infographic/0332-mosqueda-investigations-infographic-01.gif' style='float: left' alt=''/&gt;Security teams can leverage a Plan. Do. Check. Act. model to build a framework for successful investigations. </description><pubDate>Mon, 27 Mar 2023 07:57:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/remote-interview-dynamics/"><guid isPermaLink="false">ceddbd28-6e32-45c5-96cc-b3dfcfe54117</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/remote-interview-dynamics/</link><title>Q&amp;A: Improving Interview Dynamics From Afar</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-mosqueda-remote-investigations-qa.gif' style='float: left' alt=''/&gt;Scot Walker, PCI, chair of the ASIS Investigations Community, talks about how to prepare for remote investigations and interviews, building a rapport virtually, and the benefits for both security and overall organizations of remote work.</description><pubDate>Mon, 27 Mar 2023 07:57:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/fast-facts-investigative-pillars/"><guid isPermaLink="false">55be3846-9d90-4936-b4ee-6eaac94e796c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/investigations/fast-facts-investigative-pillars/</link><title>Fast Facts: 6 Pillars of a Successful Investigation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-fast-facts-6-pillars-of-a-successful-investigation01_884x500-1.gif' style='float: left' alt=''/&gt;A successful investigations program is supported by common elements, as explained in the Investigations Standard from ASIS International. </description><pubDate>Mon, 27 Mar 2023 07:57:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/book-review-war-transformed/"><guid isPermaLink="false">6d3e6f4b-9b8d-452b-bedb-aca66e495cb4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/book-review-war-transformed/</link><title>Book Review: War Transformed</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-book-review-war-transformed-featured-image.jpg' style='float: left' alt=''/&gt;This book takes a global perspective to the study of what drives competition and explores in detail the mechanics behind how and why nation-states pursue armed conflict and what separates the victorious from the defeated.</description><pubDate>Wed, 22 Mar 2023 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/extremism-against-places-of-worship/"><guid isPermaLink="false">ebd64fb0-d02a-4cc5-b561-72afcc1a12a8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/extremism-against-places-of-worship/</link><title>Extremism Against Places of Worship Extends Across Faiths </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-ratliff-church-vandalism-1.jpg' style='float: left' alt=''/&gt;Hostage situations. Graffiti and vandalism. Gravestones toppled. Active shooters. Bombings. Extremists are becoming more brazen in their tactics and more expressive in their ideologies, committing acts of violence throughout the world at houses of worship, burial sites, and other historically significant places. </description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/steps-to-mitigate-crime-risk/"><guid isPermaLink="false">a4432b99-573e-43a4-b62b-8458b6b160c6</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/steps-to-mitigate-crime-risk/</link><title>4 Steps to Mitigate Crime Risks at Houses of Worship</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-ratliff-mitigate-crime-risks-houses-of-worship_03-1.gif' style='float: left' alt=''/&gt;When considering how to secure a place of worship, it is very similar to the approaches used to secure any property and the concepts of crime prevention through environmental design (CPTED) are applicable.</description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/intelligence-collection/"><guid isPermaLink="false">63a1876a-76a9-4c4e-9fce-e74c874c303b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/intelligence-collection/</link><title>How Faith-Based Organizations Can Improve Threat Intelligence Collection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_meyer2_building-an-intelligence-function-for-hows_2.gif' style='float: left' alt=''/&gt;Many faith-based organizations lack formal resources and functions dedicated to security and risk monitoring, which puts them at a disadvantage when it comes to early warning and threat response.</description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/infographic-threat-monitoring/"><guid isPermaLink="false">42ddf019-67a3-4455-b547-b89c47127835</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/infographic-threat-monitoring/</link><title>Infographic: How to Build Priority Lists for Threat Monitoring</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/infographics/0423_threat-monitoring-lists01.gif' style='float: left' alt=''/&gt;Want to start a threat monitoring and awareness program? Begin with two main lists. </description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/fast-facts/"><guid isPermaLink="false">a010f69e-86c4-490a-b5d3-0555a2986112</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/fast-facts/</link><title>Fast Facts: 11 Security Scenarios Religious Personnel Should Prepare For</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-fast-facts-how-gif.gif' style='float: left' alt=''/&gt;Are your house of worship volunteers, staff, and security personnel trained to identify and respond to these risky situations?</description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/underlying-extremism-motivations/"><guid isPermaLink="false">6e98848f-ef80-4375-9c86-1aaa3c98837d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/underlying-extremism-motivations/</link><title>5 Underlying Reasons for Extremist Attacks on Houses of Worship</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_meyer_global-overview-extremist-threats-against-houses-of-worship_884x500.gif' style='float: left' alt=''/&gt;Extremists have multiple motivations, and those can push attackers toward striking out at a religious organization or house of worship. </description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/pray-model/"><guid isPermaLink="false">76962296-c0d0-4a88-9360-ea0005c6202a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/pray-model/</link><title>PRAY: A Model to Change Mindsets about Security in Houses of Worship</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_pulido_pray-framework-for-house-of-worship-security_884x500.gif' style='float: left' alt=''/&gt;Whether the organization is a megachurch, mosque, synagogue, gurdwara, temple, or a faith-based community, people in charge of protecting houses of worship require a shift in mindset to boost awareness and security. </description><pubDate>Mon, 20 Mar 2023 08:16:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/marketplace/"><guid isPermaLink="false">48b2d723-7268-4953-9250-a7f67a18b766</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/marketplace/</link><title>Marketplace: Self-Testing Smoke Detectors, Radar-Activated Drone Systems, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/july-august/0722-marketplace.jpg' style='float: left' alt=''/&gt;Check out the latest products and services on offer from across the security industry. </description><pubDate>Fri, 17 Mar 2023 08:42:43 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/book-review-encyclopedia-of-security-and-emergency-management/"><guid isPermaLink="false">731b726d-f1c2-4583-8c86-b8a349e72eec</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/book-review-encyclopedia-of-security-and-emergency-management/</link><title>Book Review: Encyclopedia of Security and Emergency Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-book-review-encyclopedia-of-security-management-featured-image.jpg' style='float: left' alt=''/&gt;This online-accessible encyclopedia provides real-world, reliable information for those professionals who need to consider and apply the information within law enforcement, security, counterterrorism, IT, and other related interdisciplinary professions. </description><pubDate>Wed, 15 Mar 2023 10:06:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/industry-news/"><guid isPermaLink="false">f4bafa2f-5bb4-49ad-adb7-6ffcd1b5c558</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/industry-news/</link><title>Industry News: Chemicals Company Upgrades to Control and Safety Systems</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-mosqueda-industry-news.jpg' style='float: left' alt=''/&gt;A global specialty chemicals company selected Emerson for improvements to its facilities, including automation technology that will assist in development and manufacturing.</description><pubDate>Fri, 10 Mar 2023 11:28:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/missing-the-bigger-picture/"><guid isPermaLink="false">d702699b-c8d3-4189-827f-4795d024ff1c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/missing-the-bigger-picture/</link><title>Missing the Bigger Picture: The EPA Inspection Requirements vs. the Reality of Cybersecurity in the Water and Wastewater Sector</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323sm-epa-cyber-requirements-for-water-facilities_01.gif' style='float: left' alt=''/&gt;Much of the operational technology that manages U.S. water systems was never intended to be connected to the Internet. Some of this technology is more than 30 years old, and it is therefore difficult to enforce security practices such as multi-factor authentication, patch management schedules, and other key controls.</description><pubDate>Fri, 10 Mar 2023 11:03:14 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/certification-profile-emilian-irimescu-cpp-psp/"><guid isPermaLink="false">dab86bc4-e300-4ac8-a76e-58b0ea2c91c9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/certification-profile-emilian-irimescu-cpp-psp/</link><title>Certification Profile: Emilian Irimescu, CPP, PSP</title><description>Emilian Irimescu, CPP, PSP, appreciates how ASIS certification is a landmark in a security professional’s career, but he says the networking experience the ASIS community provides has been even more rewarding. </description><pubDate>Thu, 09 Mar 2023 09:23:23 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/legal-report-australian-casino-faces-class-action-suits/"><guid isPermaLink="false">c800c2c4-fc51-41bb-83f2-54cefaa68c23</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/legal-report-australian-casino-faces-class-action-suits/</link><title>Legal Report: Australian Casino Faces Class Action Suits</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/sm_legal-report_3.jpg' style='float: left' alt=''/&gt;An Australian casino company faces three separate class action suits over market misrepresentations and shareholder losses.</description><pubDate>Fri, 03 Mar 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/5-ways-to-connect-with-boards-of-directors-about-cybersecurity-and-digital-transformation/"><guid isPermaLink="false">d77ab98f-8253-4afa-a004-8b382d344696</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/5-ways-to-connect-with-boards-of-directors-about-cybersecurity-and-digital-transformation/</link><title>5 Ways to Connect with Boards of Directors About Cybersecurity and Digital Transformation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-sm_collings-5-ways-to-connect-with-boards-of-directors-about-cybersecurity-and-digital-transformation_884x500.gif' style='float: left' alt=''/&gt;As security and technology leaders, you will need to present a business case of some sort to the board, and it’s likely the board or C-suite members are not particularly “technical.”</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-leverage-metrics-and-benchmarking/"><guid isPermaLink="false">91f6de33-a506-46f2-9a11-be6b2d22330a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-leverage-metrics-and-benchmarking/</link><title>How to Leverage Metrics and Benchmarks to Generate Executive Buy-In</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_ingstad_leveraging-metrics-and-benchmarks-to-generate-executive-buy-in01_884x500.gif' style='float: left' alt=''/&gt;Of all the tools in the toolbox, data-driven metrics are one of the best ways to change this perception from leadership, but security programs often lag behind other functional areas in capturing and communicating this information to decisionmakers.</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/questions-to-ask-peers-business-value/"><guid isPermaLink="false">80ba89dc-7307-4dd2-a226-040da4588a15</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/questions-to-ask-peers-business-value/</link><title>3 Questions to Ask Your Peers to Derive Additional Business Value from AI Analytics </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-boekestein-ai-analytics.jpg' style='float: left' alt=''/&gt;To better communicate the value of intelligent video analytics, here are three questions security teams can ask their colleagues in order to blur the lines between security and other departments.</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/rise-of-the-ai-chatbot/"><guid isPermaLink="false">3e3a9465-d38f-49e8-9904-a4cce2383f50</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/rise-of-the-ai-chatbot/</link><title>Editor’s Note: The Rise of the AI Chatbot</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-anderson-ed-note-deadline-buy-in-strategies_02.jpg' style='float: left' alt=''/&gt;The future is here, and the distrust is deeper than anticipated. With the introduction of new powerful AI tools, the printed word is suspect, too. </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-make-your-pitch-more-convincing/"><guid isPermaLink="false">44697048-7fff-43bf-8e43-da70346297a8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-make-your-pitch-more-convincing/</link><title>How to Make Your Pitch More Convincing </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-sm_alsayed-how-to-be-more-convincing01_884x500.gif' style='float: left' alt=''/&gt;Successful buy-in is a long game. The security industry functions mainly on practicality and a word-of-mouth system, so fostering professional relationships is crucial. </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/profits-from-professionalism/"><guid isPermaLink="false">18b5f05f-b4a0-4b95-b001-0c0d3bea7ed9</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/profits-from-professionalism/</link><title>Profits from Professionalism: How Healthcare Security Teams Can Boost Revenue Potential</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-knarich_security-value-in-healthcare.jpg' style='float: left' alt=''/&gt;How does a single security officer directly impact a hospital's revenue stream? By directly enhancing the quality and value of the patient experience. </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-establish-and-defend-preventative-maintenance-plan/"><guid isPermaLink="false">9ce8e260-5358-4486-957b-31ba5f1cfe68</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-establish-and-defend-preventative-maintenance-plan/</link><title>Building and Defending a Plan for Preventative Maintenance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-bugeja-sm-making-the-case-for-preventative-maintenance.gif' style='float: left' alt=''/&gt;Preventative or routine maintenance is often the last thing thought about within the security industry after a project has been delivered or during the design phase. It is, however, the single most important facet to making sure the delivered security system is functional and useable throughout the life of the site. </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/why-unifying-security-systems-helps-make-your-case-to-csuite/"><guid isPermaLink="false">c345b248-d206-4670-89d4-f0bc28f76476</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/why-unifying-security-systems-helps-make-your-case-to-csuite/</link><title>Why Unifying Security Systems Helps Make Your Case to the C-Suite </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-hurt-unifying-security-systems-c-suite.jpg' style='float: left' alt=''/&gt;A unified software platform enables better tracking of key metrics and more collaboration between departments. This in turn enables better decisions and potentially a greater ROI.</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-measure-risk-monitoring-activities/"><guid isPermaLink="false">284b8fe1-f858-4d5a-b578-1ad4fc1f3f5b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/how-to-measure-risk-monitoring-activities/</link><title>How to Measure Your Risk Monitoring Activities</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_kopecky-sm-how-to-measure-your-risk-monitoring-activities.gif' style='float: left' alt=''/&gt;Well-designed and implemented security programs typically aim to be seamless and invisible, preventing and mitigating threats so well that many in the organization don’t realize a risk was present. But when success means nothing happened, how can security teams better measure and articulate the effectiveness of their programs? </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/steps-to-improve-presentation-skills/"><guid isPermaLink="false">88b66c51-2a31-4767-8d61-7c7c3b282ece</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/steps-to-improve-presentation-skills/</link><title>8 Steps to Improve Your Presentation Skills </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/infographics/0323-infographic-presentation-skills-01.gif' style='float: left' alt=''/&gt;Ever wanted to improve your presentation capabilities, but feel you lack public speaking prowess? Try these tips for organizing your presentation and connecting with the audience.</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/infographic-revisiting-readiness/"><guid isPermaLink="false">113f5c62-44fd-4555-a588-a533de3c3574</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/infographic-revisiting-readiness/</link><title>Infographic: Revisiting Readiness</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/infographics/0323sm-infographic_revisiting-readiness.gif' style='float: left' alt=''/&gt;Do visitor management practices affect readiness levels? A recent research report dug into this concept by surveying security professionals about visitor management’s role in their layered defenses and deterrence.</description><pubDate>Wed, 01 Mar 2023 08:02:05 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/choosing-convincing-colors/"><guid isPermaLink="false">06a63245-796e-4fea-a762-16eaaa867205</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/choosing-convincing-colors/</link><title>Fast Facts: Choosing Convincing Colors</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323_sm_fast-facts-colors-for-better-buy-in.gif' style='float: left' alt=''/&gt;Is your presentation setting the wrong tone? It might be the colors you chose.</description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/strategies-for-long-term-buy-in/"><guid isPermaLink="false">6d5886fe-d9cf-41f7-abb0-ae82aab0887b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/03/buyinstrategies/strategies-for-long-term-buy-in/</link><title>Strategies for Long-Term Buy-In: Start with the ABCs</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/march/0323-peden-sm_tips-to-develop-better-presentations-for-c-suite_884x500-2.gif' style='float: left' alt=''/&gt;The single biggest challenge many leaders face is getting people to do things they have never done before. And it's not a question of merely maneuvering and finagling until people take your side—it’s a legitimate trial of explaining a concept and outlining why it’s valuable. </description><pubDate>Wed, 01 Mar 2023 08:02:06 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/for-effective-governance-start-with-why/"><guid isPermaLink="false">47f13804-a004-46e0-a379-0ff3c1d37895</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/for-effective-governance-start-with-why/</link><title>For Effective Governance, Start with Why</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-antons-start-with-why-strong-governance.jpg' style='float: left' alt=''/&gt;The most foundational governance products every department should establish are program standards.  This is the “why” document.  </description><pubDate>Thu, 23 Feb 2023 08:52:08 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/book-review-drug-wars/"><guid isPermaLink="false">5a0658ea-c319-421c-a7bc-ce65429542a2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/book-review-drug-wars/</link><title>Book Review: Drug Wars and Covert Netherworlds: The Transformations of Mexico’s Narco Cartels</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0123-book-review-drug-wars-and-covert-netherworlds-featured-image.jpg' style='float: left' alt=''/&gt;Sociologist James Creechan has written a brilliant book that will transform the way you think about the war on drugs in general and the Mexican drug trade specifically.</description><pubDate>Thu, 23 Feb 2023 08:52:08 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/how-to-shore-up-personal-resilience-against-vicarious-trauma/"><guid isPermaLink="false">28a2b66a-d289-4c95-b671-9fc57297c798</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/how-to-shore-up-personal-resilience-against-vicarious-trauma/</link><title>How to Shore Up Personal Resilience Against Vicarious Trauma</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-sm_vicarious-trauma-for-analysts01.gif' style='float: left' alt=''/&gt;Repeated exposure to traumatic incidents, stories, and news can lower a security professional’s resilience to stressors and can cumulatively result in vicarious or secondary trauma. </description><pubDate>Mon, 20 Feb 2023 08:40:52 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/how-a-new-working-group-is-supporting-security-mental-health/"><guid isPermaLink="false">2ba7084b-a7e2-4ce2-997c-26031ede9403</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/how-a-new-working-group-is-supporting-security-mental-health/</link><title>How a New Working Group is Supporting Security Mental Health</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223--sm_mental-health_mike-hurst_communities-of-support02_884x500.gif' style='float: left' alt=''/&gt;In addition to just doing the right to support colleagues, there are practical reasons to provide mental health support: reducing absenteeism and presenteeism, lower staff turnover, higher productivity.</description><pubDate>Mon, 20 Feb 2023 08:40:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/6-ways-to-prioritize-security-mental-health/"><guid isPermaLink="false">51d3c0f8-298f-4b65-b15a-90ade430e1fd</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/6-ways-to-prioritize-security-mental-health/</link><title>6 Ways Managers Can Prioritize Security Officer Mental Health</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-hardie-6-ways-prioritize-officer-mental-health.jpg' style='float: left' alt=''/&gt;Security personnel must be prepared and ready to act at a moment’s notice during an emergency, which means many of them may require additional support in the form of mental health resources and focus.</description><pubDate>Mon, 20 Feb 2023 08:40:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/teller-trauma/"><guid isPermaLink="false">fb7b882b-5268-4531-8f3d-381bfbdc4153</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/teller-trauma/</link><title>Teller Trauma: How the Bank of Hawaii Addresses Mental Health Stress After Incidents</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-sm_mental-health_bank-of-hawaii01_884x500.gif' style='float: left' alt=''/&gt;In the aftermath of a robbery, bank branch employees face a challenging road to emotional recovery. Here’s how one bank helps support employees—and investigators—before, during, and after an incident. </description><pubDate>Mon, 20 Feb 2023 08:40:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/types-of-trauma-direct-vs-indirect/"><guid isPermaLink="false">0d0525ef-a4e2-4216-85c2-38abbeb0518e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/types-of-trauma-direct-vs-indirect/</link><title>Types of Trauma: Direct vs Indirect </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-mosqueda-infographic-trauma-types-01.gif' style='float: left' alt=''/&gt;70 percent of adults in the United States have experienced some type of trauma during their lives. But what kinds of trauma are there?</description><pubDate>Mon, 20 Feb 2023 08:40:52 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/common-signs-of-vicarious-trauma/"><guid isPermaLink="false">cce47293-faa5-4470-b5a5-98a9a64b2fea</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/mental-health-for-security/common-signs-of-vicarious-trauma/</link><title>Fast Facts: 6 Commons Signs of Vicarious Trauma</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/preview2-fast-facts-6-common-signs-of-vicarious-trauma_884x500.gif' style='float: left' alt=''/&gt;Vicarious trauma occurs over time after witnessing or hearing about others’ traumatic pain and suffering. This can affect frontline security personnel responding to incidents or security analysts reviewing reports about incidents. </description><pubDate>Mon, 20 Feb 2023 08:40:52 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/industry-news-restaurant-group-turns-to-remote-socs-to-monitor-security-videos/"><guid isPermaLink="false">dce57c6f-32f1-49d3-a1e8-88e4131b5294</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/industry-news-restaurant-group-turns-to-remote-socs-to-monitor-security-videos/</link><title>Industry News: Restaurant Group Turns to Remote SOCs to Monitor Security Videos</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-mosqueda-industry-news.jpg' style='float: left' alt=''/&gt;A U.S. restaurant organization—owner or Krispy Kreme and other eateries—hired Interface Systems for remote video monitoring support for its facilities and employees.</description><pubDate>Fri, 17 Feb 2023 09:39:00 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/marketplace-emergency-call-stations-ai-video-analytics-and-more/"><guid isPermaLink="false">cf0bb803-6f26-4134-8d1a-d86a5ff00e9d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/marketplace-emergency-call-stations-ai-video-analytics-and-more/</link><title>Marketplace: Emergency Call Stations, AI Video Analytics, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/march-april/0322-marketplace-mainimage.jpg' style='float: left' alt=''/&gt;Check out the latest upgrades and new products in the security industry in our February 2023 technology roundup.</description><pubDate>Fri, 17 Feb 2023 09:39:00 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/isc-west-2023-product-showcase/"><guid isPermaLink="false">b7886a19-23c4-4da0-8ee2-9eeff5e536b2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/isc-west-2023-product-showcase/</link><title>ISC West 2023 Product Showcase</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/march-april/product_showcase_2023-copy.jpg' style='float: left' alt=''/&gt;What can you expect to see at ISC West 2023? Check out the latest product showcase for a preview.</description><pubDate>Wed, 15 Feb 2023 12:43:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/book-review-go-hck-yourself-a-simple-introduction-to-cyber-attacks-and-defense/"><guid isPermaLink="false">caeec6a0-2628-4363-8fcc-88e31fa251c3</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/book-review-go-hck-yourself-a-simple-introduction-to-cyber-attacks-and-defense/</link><title>Book Review: Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0123-book-review-go-h-ck-yourself-featured-image.jpg' style='float: left' alt=''/&gt;The ultimate purpose of this book is to educate all to perform reasonable self-defense from malicious attacks.</description><pubDate>Thu, 16 Feb 2023 08:23:47 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/redesigning-pandoras-box/"><guid isPermaLink="false">435235b7-0ede-4d21-a571-24f98344a50c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/redesigning-pandoras-box/</link><title>Redesigning Pandora’s Box: Another Reason to Leave Siloed Security Behind</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-sm_reputation-redesigning-pandoras-box_884x500.gif' style='float: left' alt=''/&gt;With trust increasingly becoming a core tenant of business, security departments and professionals must make reputational threats the concern of the entire organization. Creating a culture that cares about the company along all levels and among all employees can help.</description><pubDate>Mon, 13 Feb 2023 08:19:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/infographic-who-do-we-trust/"><guid isPermaLink="false">2fab6846-aedc-4182-9ba0-c63fb1fafc00</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/infographic-who-do-we-trust/</link><title>Infographic: Who Do We Trust?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/reputation-landing-page/0223-mosqueda-reputation-infographic-01.gif' style='float: left' alt=''/&gt;Traditional sources of leadership—government, elected officials, and their spokespersons—are no longer whom society places their trust in.  </description><pubDate>Mon, 13 Feb 2023 08:19:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/fast-facts-forces-behind-polarization/"><guid isPermaLink="false">fbe6a021-a736-42d9-930c-cc94b4a1b2d2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/fast-facts-forces-behind-polarization/</link><title>Fast Facts: 4 Forces Behind Polarization</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0213-mosqueda-fastfacts-video-reputation.jpg' style='float: left' alt=''/&gt;Polarization is most severe in an environment where deep divisions are entrenched and seem insurmountable. </description><pubDate>Mon, 13 Feb 2023 08:19:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/steps-to-build-protect-rebuild-trust-in-brand/"><guid isPermaLink="false">6cfa1e52-0016-4505-be11-6b6606672801</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/reputation-security/steps-to-build-protect-rebuild-trust-in-brand/</link><title>5 Steps to Build, Protect, and Rebuild Trust in Your Brand</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-sm-five-steps-to-build-trust-03.gif' style='float: left' alt=''/&gt;Jeremy Plotnick uses his background in corporate communications and crisis communications to outline steps organizations should take to strengthen their reputation. </description><pubDate>Mon, 13 Feb 2023 08:19:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/legal-report-former-london-police-officer-sentenced-to-prison-for-abusing-women-and-his-authority/"><guid isPermaLink="false">afbfc01b-9fd2-46b4-aaa9-146f960d96c8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/legal-report-former-london-police-officer-sentenced-to-prison-for-abusing-women-and-his-authority/</link><title>Legal Report: Former London Police Officer Sentenced to Prison for Abusing Women and His Authority</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-legal-report.jpg' style='float: left' alt=''/&gt;A former Metropolitan police officer received more than 30 life sentences, with a minimum of more than 30 years before the chance of parole, for abusing his position in law enforcement to repeatedly assault and rape multiple women for more than 17 years. </description><pubDate>Fri, 10 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/certification-profile-hwee-fong-yong-app/"><guid isPermaLink="false">11c77ab8-4622-484d-a4a9-4fc206a4ec2b</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/certification-profile-hwee-fong-yong-app/</link><title>Certification Profile: Hwee-Fong Yong, APP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223-hwee-fong-yong-certifcation-profile.jpg' style='float: left' alt=''/&gt;Hwee-Fong Yong decided to join ASIS when she became interested in leaving her position with the emergency services. “I decided to join ASIS as I moved from a quasi-governmental body to the private sector,” Fong says. “I thought it may be useful for me to know how the private sector operates.” </description><pubDate>Thu, 09 Feb 2023 08:32:40 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/four-elements-of-security-planning/"><guid isPermaLink="false">b9ca9d1e-ff2d-479c-853c-651989a14f78</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/four-elements-of-security-planning/</link><title>Four Elements of Security Planning for Crowd Emergencies</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0224-jones-super-bowl-security.jpg' style='float: left' alt=''/&gt;With the American NFL Super Bowl coming up on 12 February, authorities need to be on high alert for any number of scenarios.</description><pubDate>Tue, 07 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/02/resilience-ramifications/"><guid isPermaLink="false">584dfa41-c2d7-444d-a5b9-200aed130022</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/02/resilience-ramifications/</link><title>Resilience Ramifications</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/february/0223sm-resilience-ramifications_cybersecurity_02.gif' style='float: left' alt=''/&gt;Business leaders and cybersecurity executives expect that a catastrophic cyber incident with far-reaching global ramifications will occur before 2025. A new focus on resilience may help us be ready for the moment.</description><pubDate>Fri, 03 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/expanding-our-supply-chain-risk-management-beyond-data/"><guid isPermaLink="false">d5b03060-bf26-4af2-a1c4-8c2f5fb63754</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/expanding-our-supply-chain-risk-management-beyond-data/</link><title>Expanding Our Supply Chain Risk Management Beyond Data</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-clift-supply-chain-cyber-risk.gif' style='float: left' alt=''/&gt;With attackers focusing on new attack avenues, not just business data, it seems imperative to look at the supply chain cyber risks for all vendors.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/securing-the-future-of-open-source-in-the-software-supply-chain/"><guid isPermaLink="false">46b9fcaa-640f-4ef2-bae3-add2758b5fbf</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/securing-the-future-of-open-source-in-the-software-supply-chain/</link><title>Securing the Future of Open Source in the Software Supply Chain</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-underkoffler-open-source-supply-chain.gif' style='float: left' alt=''/&gt;Our modern digital infrastructure relies on open-source software. Every organization is vulnerable if it fails to make a concerted effort to help secure the supply chain.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/keeping-the-supply-chain-on-track/"><guid isPermaLink="false">b969c952-5364-460c-a55e-77f9446cd899</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/keeping-the-supply-chain-on-track/</link><title>Keeping the Supply Chain on Track</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-supply-chain_freight-cylus_01.jpg' style='float: left' alt=''/&gt;Cargo ships, trucks, and freight trains are vital for moving goods efficiently. But as they become increasingly digitized and connected, their attack surfaces expand, making these critical systems far more vulnerable to potentially crippling cyberattacks.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/the-cyber-workforce-shortage-hinders-healthcare-supply-chain-security/"><guid isPermaLink="false">0c163783-c11c-4f2b-8075-3d591e7164e7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/the-cyber-workforce-shortage-hinders-healthcare-supply-chain-security/</link><title>The Cyber Workforce Shortage Hinders Healthcare Supply Chain Security</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-stapleton-healthcare-supply-chain.jpg' style='float: left' alt=''/&gt;Supply chain security is a critical issue in the healthcare industry where the consequences of a compromise are potentially catastrophic—including, literally, the loss of life. </description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/moving-the-chains-lessons-learned-to-effectively-manage-our-supply-chain/"><guid isPermaLink="false">7af12182-4100-4561-a3ea-602f3a981caa</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/moving-the-chains-lessons-learned-to-effectively-manage-our-supply-chain/</link><title>Moving the Chains: Lessons Learned to Effectively Manage Our Supply Chain</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-lazatin-supply-chain-covid-19.gif' style='float: left' alt=''/&gt;The past few years have created challenging business conditions for everyone in security and surveillance. Here’s how one manufacturer managed its supply chain during COVID-19 to continue to meet customer—and business—demands.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/the-new-normal-of-risk-goes-back-to-basics/"><guid isPermaLink="false">d7fc9a9c-e638-4203-ae6e-d5f2dfe48df2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/the-new-normal-of-risk-goes-back-to-basics/</link><title>The ‘New Normal’ of Risk Goes Back to Basics </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-gates-cover-global-risks-report.jpg' style='float: left' alt=''/&gt;An annual global risks survey finds supply chain issues and rising costs of living dominate the threat landscape, despite technological advances.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/can-sboms-save-the-software-supply-chain/"><guid isPermaLink="false">9e74ff2e-7eca-45e0-8912-26f7c63486c7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/can-sboms-save-the-software-supply-chain/</link><title>Can SBOMs Save the Software Supply Chain?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223_sectec_sboms-chainguard.gif' style='float: left' alt=''/&gt;There are four key ingredients SBOMs need to strengthen their quality, to help organizations meet tomorrow’s federal software requirements, and, in turn, make the software supply chain secure by default.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/privileged-access-management/"><guid isPermaLink="false">3842caed-9053-4c69-9b8d-0c44893216bd</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/privileged-access-management/</link><title>Privileged Access Management: The Key to Preventing Supply Chain Attacks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-wright-supply-chain-third-party-software-.jpg' style='float: left' alt=''/&gt;Organizations are increasingly relying on third-party software vendors that directly access their systems, creating lucrative opportunities for cybercriminals.</description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/template-article32/"><guid isPermaLink="false">dc7c8ee2-8109-4b00-9e26-e133a2ded7f5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/template-article32/</link><title>The Semiconductor Conundrum</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech_james-lewis-semiconductors.gif' style='float: left' alt=''/&gt;New American restrictions will significantly slow China’s chip efforts, but the effect will not be immediate, comprehensive, or ultimately permanent.  </description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/six-ict-supply-chain-risks-to-watch-out-for/"><guid isPermaLink="false">a5835cca-44b3-4bc7-a20d-34473d558b89</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2023/february/six-ict-supply-chain-risks-to-watch-out-for/</link><title>Six ICT Supply Chain Risks to Watch Out For</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2023/february/0223-sectech-six-ict-supply-chain-risks-to-watch-for.gif' style='float: left' alt=''/&gt;A new resource handbook from a public-private partnership identifies key supply chain risks for information technology and communications sectors. </description><pubDate>Wed, 01 Feb 2023 06:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/asis-news-meet-your-2023-leadership/"><guid isPermaLink="false">09582cf6-263f-40f9-bb50-8b57a551bc04</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/asis-news-meet-your-2023-leadership/</link><title>ASIS News: Meet Your 2023 Leadership</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-asis-news-boards.gif' style='float: left' alt=''/&gt;As we enter a new year, ASIS welcomes a new set of security leaders to its global and regional boards. </description><pubDate>Fri, 27 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/setting-the-bar-for-strong-governance-in-security-management/"><guid isPermaLink="false">e74b1381-4535-4c9b-93cd-c6bb1e8c1276</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/setting-the-bar-for-strong-governance-in-security-management/</link><title>Setting the Bar for Strong Governance in Security Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-antons_setting-the-bar-for-strong-governance-in-security-management04_884x500.jpg' style='float: left' alt=''/&gt;There are numerous benefits to creating foundational elements to build and manage a corporate security governance program. Standardization can provide a clearer vision of the future and pathway to reach it, increase employee morale, maximize resources, limit ambiguity, and create competitive advantages.</description><pubDate>Thu, 26 Jan 2023 09:12:16 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/pipelines-digital-defense-is-on-the-line/"><guid isPermaLink="false">ac8ce641-e951-4469-8196-18525807509c</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/pipelines-digital-defense-is-on-the-line/</link><title>Pipelines’ Digital Defense is on the Line </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-mosqueda_pipeline-defense-on-the-line02_884x500.gif' style='float: left' alt=''/&gt;In the wake of the ransomware attack on Colonial Pipeline, government regulators created a rocky road for pipeline operators and owners looking to keep up with cybersecurity standards.</description><pubDate>Mon, 23 Jan 2023 08:04:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/energy-geopolitics-how-the-war-in-ukraine-hit-pipelines/"><guid isPermaLink="false">77c11c2f-92a1-4c66-abbf-dd499fc7de46</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/energy-geopolitics-how-the-war-in-ukraine-hit-pipelines/</link><title>Energy Geopolitics: How the War in Ukraine Hit Pipelines</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-mosqueda-pipelines-geopolitics01_884x500.gif' style='float: left' alt=''/&gt;With several nations and organizations still dependent on oil and gas products for their energy needs, Russia’s invasion into Ukraine has had far reaching impacts as international pipelines became increasingly politically charged.</description><pubDate>Mon, 23 Jan 2023 08:04:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/infographic-who-owns-gas-pipeline-development/"><guid isPermaLink="false">d239eb01-f07c-4815-91b1-ef2b5057773a</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/infographic-who-owns-gas-pipeline-development/</link><title>Infographic: Who Owns Gas Pipeline Development? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-mosqueda-infographic-gas-pipelines-01.gif' style='float: left' alt=''/&gt;Despite pressures to shift to cleaner carbon-emitting energy sources, some countries are still pushing forward with gas pipeline projects. Gas and oil pipeline projects worldwide are pushing forward, and recent international conflicts have highlighted countries’ dependence on pipelines—many of which are state-owned. </description><pubDate>Mon, 23 Jan 2023 08:04:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/hot-tapping-protests-and-attacks-protecting-pipelines-from-physical-phenomena/"><guid isPermaLink="false">707abe28-e54f-434c-990d-292ecd045abf</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/hot-tapping-protests-and-attacks-protecting-pipelines-from-physical-phenomena/</link><title>Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-mosqueda-pipeline-protests-attacks.jpg' style='float: left' alt=''/&gt;While malicious attacks on natural gas pipeline and related infrastructure is statistically the smallest cause for damage in this sector of the energy industry, security professionals keep it on their radar.</description><pubDate>Mon, 23 Jan 2023 08:04:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/fast-facts-3-key-threat-areas-for-pipelines/"><guid isPermaLink="false">b076ceed-8426-40fa-aab3-a20e55dae586</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/fast-facts-3-key-threat-areas-for-pipelines/</link><title>Fast Facts: 3 Key Threat Areas for Pipelines</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-pipelines-video-preview.jpg' style='float: left' alt=''/&gt;What threats do oil and gas pipelines face today? Companies must monitor for risks to operations along three key lines of risk.</description><pubDate>Mon, 23 Jan 2023 09:28:41 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/industry-news-water-company-invests-in-gas-hazard-notification-devices-for-employees/"><guid isPermaLink="false">066489a1-752a-40ba-94ef-0122e24d0ced</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/industry-news-water-company-invests-in-gas-hazard-notification-devices-for-employees/</link><title>Industry News: Water Company Invests in Gas Hazard Notification Devices for Employees</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-mosqueda-industry-news.jpg' style='float: left' alt=''/&gt;As part of a $2 million agreement with the United Kingdom’s second-largest water company, Blackline Safety Corp. provided personal gas detection devices to more than 10,000 workers.</description><pubDate>Fri, 20 Jan 2023 07:38:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/marketplace-gunshot-detection-sms-lockdowns-and-more/"><guid isPermaLink="false">d623a7c7-8cf3-42de-b9fd-53ee906a1413</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/marketplace-gunshot-detection-sms-lockdowns-and-more/</link><title>Marketplace: Gunshot Detection, SMS, Lockdowns, and More</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/january-february/0122-marketplace-technology.jpg' style='float: left' alt=''/&gt;Check out the latest upgrades and new products in the security industry in our January 2023 technology roundup. </description><pubDate>Fri, 20 Jan 2023 07:38:54 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-say-what-communicate-with-tact-and-impact-what-to-say-to-get-results-at-any-point-in-an-audit/"><guid isPermaLink="false">6d3bc943-ffa0-4259-9a83-61fb56aabf32</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-say-what-communicate-with-tact-and-impact-what-to-say-to-get-results-at-any-point-in-an-audit/</link><title>Book Review: Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-book-review-say-what-featured-image.jpg' style='float: left' alt=''/&gt;An audit can be confrontational, but it doesn’t have to be. Auditors who want to have their words taken to heart will find Say What!? Communicate with Tact and Impact a helpful resource to ensure that their audit report is just not filed away.</description><pubDate>Thu, 19 Jan 2023 07:27:39 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/where-does-dei-stand-in-the-security-industry/"><guid isPermaLink="false">e6e4b477-635f-4408-887b-4b580f96e1d4</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/where-does-dei-stand-in-the-security-industry/</link><title>Where Does DE&amp;I Stand in the Security Industry?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-meyer-dei-in-security.gif' style='float: left' alt=''/&gt;“The security environment that security practitioners find themselves in day in, day out isn’t getting any easier to manage,” says Rachel Briggs, OBE, one of the researchers behind a new ASIS Foundation report. “We really do need a team of all the talents around the table if we’re going to stand half a chance of being successful against our adversaries.”</description><pubDate>Wed, 18 Jan 2023 09:08:08 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/an-explosive-situation-strategies-to-prevent-youth-radicalization/"><guid isPermaLink="false">b5501527-e480-4a01-a877-f1da88850d2d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/an-explosive-situation-strategies-to-prevent-youth-radicalization/</link><title>An Explosive Situation: Strategies to Prevent Youth Radicalization </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-bomb-threat-basics-splc-extremism-and-community-prevention-at-computer.gif' style='float: left' alt=''/&gt;A recent wave of bomb threats against historically Black colleges and universities said to be made by a juvenile highlights how extremist ideologies are being spread in places where young people congregate. It also highlights the need for resources to help community members effectively intervene.</description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/amid-bomb-threats-schools-seek-support-and-resources/"><guid isPermaLink="false">38fb6281-5f28-43e4-b685-5f876b4651eb</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/amid-bomb-threats-schools-seek-support-and-resources/</link><title>Amid Bomb Threats, Schools Seek Support and Resources </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-gates-bomb-threats-training-response.jpg' style='float: left' alt=''/&gt;U.S. government agencies have noted an uptick in the number of bomb threats and explosive incidents since 2015, especially targeted towards minority institutions. Here’s how support agencies are stepping up to increase awareness and training to improve response.</description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/timeline-a-pattern-of-violence2/"><guid isPermaLink="false">6b877252-62ab-4ee9-96c6-2b14aa0705f0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/timeline-a-pattern-of-violence2/</link><title>Timeline: A Pattern of Violence</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-gates-timeline-reggie-white.jpg' style='float: left' alt=''/&gt;Historically Black colleges and universities (HBCUS) received dozens of bomb threats in 2022. While the uptick in threats was new, it’s part of a long history of threats and violence towards Black institutions in the United States.</description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/historically-black-historically-targeted-hbcus-experience-more-bomb-threats-violent-rhetoric/"><guid isPermaLink="false">8c1a02e7-0d0f-4e42-8266-8d05eac5bc04</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/historically-black-historically-targeted-hbcus-experience-more-bomb-threats-violent-rhetoric/</link><title>Historically Black, Historically Targeted: HBCUs Experience More Bomb Threats, Violent Rhetoric</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-bomb-threat-basics_hbcus-history-of-attacks1_884x500.jpg' style='float: left' alt=''/&gt;Historically Black colleges and universities were increasingly targeted by bomb threats in 2022. The incidents, however, are just part of a longer pattern of violence and intimidation towards Black institutions in the United States. </description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/13-steps-organizations-can-take-to-prepare-for-a-bomb-threat/"><guid isPermaLink="false">b89aa1b6-4d4f-47d0-86cf-89875b1500f8</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/13-steps-organizations-can-take-to-prepare-for-a-bomb-threat/</link><title>13 Steps Organizations Can Take to Prepare for a Bomb Threat</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-gates-bomb-threat-basics-poa-checklist4_884x500.gif' style='float: left' alt=''/&gt;Bomb threats come in a variety of forms. But there are universal steps organizations can take to ensure they’re prepared to respond to them.</description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/new-tech-for-an-age-old-threat/"><guid isPermaLink="false">8ba47ae0-2cf4-4676-b48e-f8d259e96128</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/new-tech-for-an-age-old-threat/</link><title>New Tech for an Age-Old Threat</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-powell-bomb-threat-basics-vehicle-screenings1_884x500.gif' style='float: left' alt=''/&gt;Leveraging AI analytics in conjunction with established best practices provides enhanced mitigation of vehicle-borne bombs.</description><pubDate>Mon, 16 Jan 2023 08:27:53 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-the-psychology-of-extremism/"><guid isPermaLink="false">5f666bb3-ea00-4dd5-8ee2-2c4ecefc273d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-the-psychology-of-extremism/</link><title>Book Review: The Psychology of Extremism</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-book-review-psychology-extremism-featured-image.jpg' style='float: left' alt=''/&gt;Security professionals must understand the dynamics of extremism to formulate strategies and engage in tactics that will effectively support the safety of employees and consumers. The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.</description><pubDate>Thu, 12 Jan 2023 07:04:22 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/certification-profile-steven-rivera-cpp-pci-psp/"><guid isPermaLink="false">a9bcef37-4ee8-487f-a9e6-573349766c8d</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/certification-profile-steven-rivera-cpp-pci-psp/</link><title>Certification Profile: Steven Rivera, CPP, PCI, PSP </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-certifcation-profile-rivera-01.jpg' style='float: left' alt=''/&gt;After his introduction to ASIS at GSX, Steven Rivera began to see the many benefits an ASIS membership affords a security professional, and he wanted to elevate his work in the security sector. He was particularly interested in becoming certified.  </description><pubDate>Thu, 12 Jan 2023 07:04:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/qa-tim-mccreight-cpp-on-mentorship-leadership-and-the-value-of-volunteerism/"><guid isPermaLink="false">c059b483-a715-41c0-936e-a9b222bc5512</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/qa-tim-mccreight-cpp-on-mentorship-leadership-and-the-value-of-volunteerism/</link><title>Q&amp;A: Tim McCreight, CPP, on Mentorship, Leadership, and the Value of Volunteerism</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-meyer-mccreight-qa-01.jpg' style='float: left' alt=''/&gt;As he steps forward into the 2023 ASIS presidency, Tim McCreight, CPP, shares lessons learned from across his career, guidance for incoming security professionals, and more.</description><pubDate>Tue, 10 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/legal-report-u.s.-federal-court-finds-saudi-prince-bin-salman-immune-from-assassination-charge/"><guid isPermaLink="false">d5639f0b-89f3-4dc8-a3d6-561af7e60cd0</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/legal-report-u.s.-federal-court-finds-saudi-prince-bin-salman-immune-from-assassination-charge/</link><title>Legal Report: U.S. Federal Court Finds Saudi Prince bin Salman Immune from Assassination Charge</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-legal-report.jpg' style='float: left' alt=''/&gt;A U.S. federal judge determined that with his state immunity as prime minister, Saudi Prince bin Salman cannot presently be sued for his alleged role in the torture and murder of journalist Jamal Khashoggi.</description><pubDate>Fri, 06 Jan 2023 11:10:13 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-yes-s.i.r.-the-security-influencers-guide-to-success-using-strategy-intelligence-and-relationships/"><guid isPermaLink="false">690f8dda-bc22-493b-94bd-d30b5d7dd8db</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/book-review-yes-s.i.r.-the-security-influencers-guide-to-success-using-strategy-intelligence-and-relationships/</link><title>Book Review: Yes, S.I.R.: The Security Influencer’s Guide to Success Using Strategy, Intelligence, and Relationships </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-book-review-yes-sir-featured-image.jpg' style='float: left' alt=''/&gt;In Yes, S.I.R.: The Security Influencer’s Guide to Success Using Strategy, Intelligence, and Relationships, Chuck Andrews, CPP, offers a clear strategy for professionals to advance, no matter where they are in their career. It is a simple technique, but that does not mean it’s easy. </description><pubDate>Thu, 05 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/taking-the-lead-on-communication-before-during-and-after-a-crisis/"><guid isPermaLink="false">7e2a2969-a09e-484e-97f8-47bfd3e76755</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/taking-the-lead-on-communication-before-during-and-after-a-crisis/</link><title>Taking the Lead on Communication Before, During, and After a Crisis</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-bailey-taking-the-lead-on-communication-before-during-and-after-a-crisisv2_884x500.gif' style='float: left' alt=''/&gt;In its simplest form, crisis communications can be defined as the protocols a business or team uses to relay information during an event or incident. This could be something that happens over the span of hours, days, or weeks.</description><pubDate>Sun, 01 Jan 2023 08:23:26 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/sm-minute-changing-language-for-private-sector-crisis-management/"><guid isPermaLink="false">4a475d77-9fb2-48f4-90df-b2b9cb388282</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/sm-minute-changing-language-for-private-sector-crisis-management/</link><title>SM Minute: Changing Language for Private Sector Crisis Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-sm-minute-crisis-leadership.gif' style='float: left' alt=''/&gt;Are you shifting from the public to the private sector? If you've noticed that your organization's leadership responds differently to your crisis management plans and procedures, it might be time to reexamine your language. </description><pubDate>Sun, 01 Jan 2023 08:00:20 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/cracking-the-c-suite-code-building-executive-enthusiasm-for-your-crisis-planning/"><guid isPermaLink="false">6a43fcda-f2fd-4e44-9da4-beadaaa2dd2e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/cracking-the-c-suite-code-building-executive-enthusiasm-for-your-crisis-planning/</link><title>Cracking the C-Suite Code: Building Executive Enthusiasm for Your Crisis Planning </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-cracking-the-c-suite-code_building-executive-enthusiasm-for-your-crisis-planningv2_884x500.gif' style='float: left' alt=''/&gt;There is no single better way to get funding and executive support for your crisis management program than a real-life crisis. This is the time the security lead or crisis manager can truly show how they can add value by stepping up to coordinate the company’s response.</description><pubDate>Sun, 01 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/5-keys-to-effective-change-management/"><guid isPermaLink="false">b7bab939-1966-475f-87b4-d89c9a054d8e</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/5-keys-to-effective-change-management/</link><title>5 Keys to Effective Change Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-brecher-5-keys-to-effective-change-managementv1_884x500.gif' style='float: left' alt=''/&gt;Preparing for the future also means adapting to new ways of working. Organizational change management tends to emphasize process; however, it is people who most affect change and are affected by that change, meaning any successful effort must center on engagement and authenticity.</description><pubDate>Sun, 01 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/editors-note-to-improve-your-leadership-style-fix-your-listening-style/"><guid isPermaLink="false">79f38282-5a5c-47be-82a6-4da2241bdfc2</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/editors-note-to-improve-your-leadership-style-fix-your-listening-style/</link><title>Editor’s Note: To Improve Your Leadership Style, Fix Your Listening Style</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0122-anderson-editors-note-listening.jpg' style='float: left' alt=''/&gt;People are, by nature, terrible listeners. However, listening effectively might be the superpower that underpins success in the workplace.</description><pubDate>Sun, 01 Jan 2023 07:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/qa-translating-traditional-crisis-management-practices-to-fintech/"><guid isPermaLink="false">cd79a678-17e8-49f5-b6c8-c0222d880014</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/qa-translating-traditional-crisis-management-practices-to-fintech/</link><title>Q&amp;A: Translating Traditional Crisis Management Practices to Fintech </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-meyer-qa-fintech-02.gif' style='float: left' alt=''/&gt;Financial technology services like digital banking, NFTs, blockchain, and cryptocurrency are pushing banking to the next level. But many classic crisis management strategies work here, even without significant physical assets.</description><pubDate>Sun, 01 Jan 2023 07:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/how-to-test-your-crisis-preparedness-plan/"><guid isPermaLink="false">155d4be6-84b5-4f2d-8007-dbac96de8bce</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/how-to-test-your-crisis-preparedness-plan/</link><title>How to Test Your Crisis Preparedness Plan</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-how-to-build-better-crisis-management-exercisesv2_884x500.gif' style='float: left' alt=''/&gt;Crises will inevitably take people, organizations, and security professionals by surprise, but they don’t need to catch you unprepared. </description><pubDate>Sun, 01 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/infographic-whats-your-emergency/"><guid isPermaLink="false">f489f516-66e0-4cfc-9cd2-09eb0eb9c557</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/infographic-whats-your-emergency/</link><title>Infographic: What’s Your Emergency? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-meyer-infographic-3-types-of-emergency-01.gif' style='float: left' alt=''/&gt;Not all emergencies are crises—how can you tell the difference? </description><pubDate>Sun, 01 Jan 2023 07:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/articles/2023/01/measuring-the-hallmarks-of-crisis-leadership/"><guid isPermaLink="false">295eb8cc-fd36-4c68-9dac-fd6923f09792</guid><link>http://www.asisonline.org/security-management-magazine/articles/2023/01/measuring-the-hallmarks-of-crisis-leadership/</link><title>Measuring the Hallmarks of Crisis Leadership </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2023/january/0123-meyer-cso-crisis-leadership-lessons_03.gif' style='float: left' alt=''/&gt;Are you an effective communicator? Good at delegating tasks? A calming presence even during challenging times? Then congratulations—you have all the makings of an excellent crisis manager. But these talents alone will not produce a good outcome during an incident. </description><pubDate>Sun, 01 Jan 2023 07:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-to-identify-forced-labor-in-your-supply-chain/"><guid isPermaLink="false">2b316bd5-eacb-4aef-9445-331b0eb1d2f5</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-to-identify-forced-labor-in-your-supply-chain/</link><title>How to Identify Forced Labor in Your Supply Chain</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-shrm-labor-trafficking.jpg' style='float: left' alt=''/&gt;The European Union (EU) and the United States, among other jurisdictions, have tough laws in place to deter exploitative practices, but forced labor persists. A sound risk management strategy is a strong first step employers can take to help prevent exploitative practices.</description><pubDate>Tue, 20 Dec 2022 11:30:00 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/tis-the-season-for-cyber-scams-raising-awareness-of-well-timed-phishing-attacks/"><guid isPermaLink="false">62bf95f9-a1eb-467a-8fac-727abdbcc44b</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/tis-the-season-for-cyber-scams-raising-awareness-of-well-timed-phishing-attacks/</link><title>‘Tis the Season for Cyber Scams: Raising Awareness of Well-Timed Phishing Attacks</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-sm_dangerous-holiday-season-cyber-threatsv1_884x500.gif' style='float: left' alt=''/&gt;The holiday season is prime time for traveling and shopping. It is also prime time for especially creative phishing schemes.</description><pubDate>Thu, 22 Dec 2022 10:57:59 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-12-most-read-stories-of-2022/"><guid isPermaLink="false">19a73407-4450-43b0-938c-8eccf4c827ca</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-12-most-read-stories-of-2022/</link><title>Our 12 Most-Read Stories of 2022</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/november-december/1222-sm-most-read-listicle-2022_02.jpg' style='float: left' alt=''/&gt;The Security Management editorial team and contributing authors wrote hundreds of articles in 2022. Here are the 12 that readers kept returning to throughout the year.</description><pubDate>Mon, 19 Dec 2022 08:32:46 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/industry-news-december-2022/"><guid isPermaLink="false">e553504c-b364-444f-b8ba-45d9720cab9b</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/industry-news-december-2022/</link><title>Industry News: Anaheim Schools Upgrade Surveillance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-industry-news.jpg' style='float: left' alt=''/&gt;After feeling community pressure prompted by increasing security incidents and school shootings at other U.S. schools, the Anaheim Union High School District decided to improve its security camera system.</description><pubDate>Fri, 16 Dec 2022 07:47:32 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/developing-training-for-healthcare-teams-to-detect-and-support-human-trafficking-victims/"><guid isPermaLink="false">5556d120-5dd2-4aee-9056-14242543ea10</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/developing-training-for-healthcare-teams-to-detect-and-support-human-trafficking-victims/</link><title>How to Train Healthcare Teams to Detect and Support Human Trafficking Victims</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1122-mosqueda-healthcare-human-trafficking.gif' style='float: left' alt=''/&gt;Healthcare organizations and their employees often fail to identify when a patient is a victim of human trafficking. Perhaps worse is when someone spots a red flag but doesn’t know how to respond.</description><pubDate>Mon, 12 Dec 2022 14:00:10 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/modern-day-slavery/"><guid isPermaLink="false">e58c05e3-7ad1-48d0-8239-8a47132193de</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/modern-day-slavery/</link><title>Modern-Day Slavery: Fact Versus Fiction</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-mosqueda-sidebar-modern-slavery-fact-fiction.gif' style='float: left' alt=''/&gt;There are several myths surrounding human trafficking. Here are some of the facts and the stats.</description><pubDate>Mon, 12 Dec 2022 14:09:36 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/phoenix-childrens-hospitals-multi-disciplined-approach-to-pediatric-protection/"><guid isPermaLink="false">a7ca82c1-c21e-423c-99d8-48e56d4a87d6</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/phoenix-childrens-hospitals-multi-disciplined-approach-to-pediatric-protection/</link><title>Phoenix Children’s Hospital Applies a Multi-Disciplined Approach to Pediatric Protection</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-mosqueda-case-study-human-trafficking.jpg' style='float: left' alt=''/&gt;The security team for the Phoenix Children’s Hospital in Phoenix, Arizona, applies education and communication to protect its staff and patients. </description><pubDate>Mon, 12 Dec 2022 14:40:46 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/infographic-trauma-informed-approach/"><guid isPermaLink="false">ff39ee8f-f6b1-4321-8971-84396f887c78</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/infographic-trauma-informed-approach/</link><title>Infographic: Trauma-Informed Approach </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1222-infographic-trauma-informed-approach-01.gif' style='float: left' alt=''/&gt;The core principles of trauma-informed approach can be applied to healthcare organizations’ programs in identifying, approaching, and supporting victims of human trafficking. </description><pubDate>Mon, 12 Dec 2022 15:18:09 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-11-favorite-stories-from-2022/"><guid isPermaLink="false">afcabb1c-d07a-40d4-8460-94da0bd62546</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-11-favorite-stories-from-2022/</link><title>Our 11 Favorite Stories from 2022</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/current-issues/2022/january-february/0122-newstrends-coupon-fraud.jpg' style='float: left' alt=''/&gt;The Security Management editors write and collaborate on hundreds of stories each year.  Here are 11 pieces they enjoyed most in 2022.</description><pubDate>Thu, 22 Dec 2022 09:29:01 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/where-did-you-read-that-us-adults-turn-to-social-media-for-news/"><guid isPermaLink="false">29ccd15f-f9eb-4446-b4ff-9dc35a292bbb</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/where-did-you-read-that-us-adults-turn-to-social-media-for-news/</link><title>Where Did You Read That? U.S. Adults Turn to Social Media for News</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/1122-gates-where-did-you-read-that.jpg' style='float: left' alt=''/&gt;Half of U.S. adults now get their news from social media sites. But depending on their political views, they are seeking out different sites to share and engage with content—potentially contributing to increased political polarization.</description><pubDate>Tue, 06 Dec 2022 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/nine-security-social-media-accounts-that-are-making-a-mark/"><guid isPermaLink="false">ed78b4fb-0071-4883-8bef-9b985c8f5aa9</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/nine-security-social-media-accounts-that-are-making-a-mark/</link><title>Nine Security Social Media Accounts that are Making a Mark</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/1122-gates-security-humor.gif' style='float: left' alt=''/&gt;When it comes to security awareness, a little humor goes a long way. Security Management collected a list of some of our favorite security social media accounts and movements that are hitting the mark and inspiring new energy in the industry.</description><pubDate>Tue, 06 Dec 2022 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/serious-fun-using-social-media-to-entertainingly-educate/"><guid isPermaLink="false">470b9558-14d4-4e70-9ce3-028c49a12766</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/serious-fun-using-social-media-to-entertainingly-educate/</link><title>Serious Fun: Using Social Media to Entertainingly Educate</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1122-gates-serious-but-fun.jpg' style='float: left' alt=''/&gt;How do you get millions of people to pay attention to safety information? Mastering memes can help, according to the strategist behind the U.S. Consumer Product Safety Commission’s Twitter account.</description><pubDate>Tue, 06 Dec 2022 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/video-6-factors-to-assess-before-leaving-twitter/"><guid isPermaLink="false">788ddf78-5ebd-4883-8f6c-ba4ea6757b3e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/video-6-factors-to-assess-before-leaving-twitter/</link><title>Fast Facts: 6 Factors to Assess Before Leaving Twitter</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/1122-fastfacts-six-f.gif' style='float: left' alt=''/&gt;Know these six factors before deleting your social media account</description><pubDate>Tue, 06 Dec 2022 06:00:11 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-9-favorite-illustrations-of-2022/"><guid isPermaLink="false">74f9cced-bfb7-4887-9d86-7a47c7f74cba</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/our-9-favorite-illustrations-of-2022/</link><title>Our 9 Favorite Illustrations of 2022</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/sm_the-scariest-hacker-groups-of-2022_884x500.gif' style='float: left' alt=''/&gt;The Security Management design team has the momentous challenge of visually bringing our complex stories to life. Here are 9 designs that were their favorite to collaborate on in 2022.</description><pubDate>Wed, 21 Dec 2022 09:43:30 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/hatejacked-how-to-monitor-for-co-opted-messaging/"><guid isPermaLink="false">b420649e-f392-4e39-b34f-8561ddea6f6e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/hatejacked-how-to-monitor-for-co-opted-messaging/</link><title>Hatejacked: How to Monitor for Co-Opted Messaging</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/sm-brady-hatejacked-co-opted-messaging_884x500.gif' style='float: left' alt=''/&gt;As corporate messengers seek to use their messaging to distinguish their brand, it is also imperative that organizations are mindful of—and take active precautions against—the misuse of the brand by potential adversaries, extremists, and opportunists seeking to co-opt elements of their messaging. </description><pubDate>Mon, 19 Dec 2022 11:12:21 -0500</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/iranian-murder-for-hire-plot-of-bolton/"><guid isPermaLink="false">1a8117d5-9856-4ea9-8bfe-dda4430149ca</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/iranian-murder-for-hire-plot-of-bolton/</link><title>U.S. Justice Department Charges Iranian  with Assassination Plot</title><description>&lt;img src='http://www.asisonline.org/contentassets/0cc478e471c34d889e2e433b4ec1f28e/0822-tis-islamic-revolutionary-guard-corps-plot-bolton.jpg' style='float: left' alt=''/&gt;The U.S. Department of Justice charged a member of Iran’s Islamic Revolutionary Guard Corps for his alleged plan to assassinate former U.S. security adviser John Bolton for $300,000.</description><pubDate>Thu, 11 Aug 2022 11:53:44 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/do-device-free-driving-laws-reduce-crashes/"><guid isPermaLink="false">8d15b322-29aa-44c1-b69d-722e9c22dc80</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/do-device-free-driving-laws-reduce-crashes/</link><title>Do Device-Free Driving Laws Reduce Crashes?</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-effectiveness-cellphone-bans-research.jpg' style='float: left' alt=''/&gt;After Oregon and Washington adopted laws against holding a phone while driving, their monthly rate of rear-end crashes with injuries per 100,000 people dropped significantly—11 percent in Washington and 9 percent in Oregon.</description><pubDate>Wed, 10 Aug 2022 11:21:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/murders-gun-violence-down-slightly-in-2022/"><guid isPermaLink="false">6ab5822d-e7b4-4903-8d95-1fdf8083e29f</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/murders-gun-violence-down-slightly-in-2022/</link><title>Murders, Gun Violence Down Slightly in 2022</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-crime-drop-police-shortage.jpg' style='float: left' alt=''/&gt;The United States has experienced a small decrease in murder and gun violence so far in 2022, but understaffing of police departments is reaching critical levels.</description><pubDate>Tue, 09 Aug 2022 12:00:26 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/whos-liable-for-an-active-shooter/"><guid isPermaLink="false">ac3c1d5e-59c3-4b6d-88b0-487ea8daf7b4</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/whos-liable-for-an-active-shooter/</link><title>Who’s Liable for an Active Shooter Incident? Expectations Are Changing</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0922-sectech-gates-mass-shooting-response-01.jpg' style='float: left' alt=''/&gt;As mass shootings continue to rise in the United States, courts and the public are shifting their perception on who is ultimately responsible for protecting potential victims.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/adt-benefits-of-humanoid-robotics-in-guarding/"><guid isPermaLink="false">7f7c7aa9-baa6-4ba5-8f73-ab6909ad3cea</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/adt-benefits-of-humanoid-robotics-in-guarding/</link><title>Benefits of Humanoid Robotics in Guarding</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/adt_humanoid.jpg' style='float: left' alt=''/&gt;Arguably, there is no emerging security technology since IP-addressable security devices on LANs and WANs that can change the nature of how commercial security is provided than AI-enabled robots. We’ve witnessed astonishing progress in recent years, and it’s become increasingly apparent that the inevitability of AI-enabled, humanoid robots in commercial environments will soon be a part of our here and now—and not too long after that, may be considered a necessity to a successful security program.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/rethinking-recruitment-in-security/"><guid isPermaLink="false">7a775ce9-2783-4bf8-8eaf-469abb69fe82</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/rethinking-recruitment-in-security/</link><title>Rethinking Recruitment in Security</title><description>&lt;img src='http://www.asisonline.org/contentassets/095b5e73ff1d42858e35d6ecf77f23dd/team_software.jpg' style='float: left' alt=''/&gt;The security industry is acutely aware of the challenges in hiring in a difficult labor market. The answer could be in your recruitment marketing strategy. 
</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/how-to-be-successful-in-corporate-security-management/"><guid isPermaLink="false">303dc270-3dc6-4eab-90c4-429d1e6df9d5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/how-to-be-successful-in-corporate-security-management/</link><title>How to be Successful in Corporate Security Management</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/shsu_st_august.jpg' style='float: left' alt=''/&gt;If you aspire to lead the development of physical and/or cyber security programs to protect the nation's critical infrastructure after serving in law enforcement, intelligence, or the military, then you first need to learn the language, operations, financial decision-making, supply chain, and customer service needs of industry (e.g. Chemical, Health Care, Energy, Transportation).</description><pubDate>Mon, 01 Aug 2022 07:32:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/nrn-series-are-now-ul-2900-listed/"><guid isPermaLink="false">cbbeb0e7-e096-47f2-bd77-5b69597d340e</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/nrn-series-are-now-ul-2900-listed/</link><title>Speco Technologies’ NRN Series are NOW UL 2900 Listed!</title><description>&lt;img src='http://www.asisonline.org/contentassets/d116f64950514c95b5c87deea7218f00/speco_august.jpg' style='float: left' alt=''/&gt;Speco Technologies’ NRN Series are NOW UL 2900 Listed!</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/creating-smarter-schools-with-smart-video-surveillance-solutions/"><guid isPermaLink="false">8072673a-340d-4fb5-ad46-352dbafd13c5</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/creating-smarter-schools-with-smart-video-surveillance-solutions/</link><title> Creating Smarter Schools with  Smart Video Surveillance Solutions </title><description>&lt;img src='http://www.asisonline.org/contentassets/c01f9c5bc6464443b94b2700ec78b921/hanwha_st_august.jpg' style='float: left' alt=''/&gt;Schools across the nation—from K-12 to higher ed institutions—are facing a growing set of unique security challenges: unauthorized visitor access, vehicle entry and exit, student drop-off and pick-up, property damage, theft and the extreme and increasingly all-too-common scenario involving an active shooter.</description><pubDate>Mon, 01 Aug 2022 07:32:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/how-emerging-technology-will-revolutionize-enterprise-security-and-the-work-environment/"><guid isPermaLink="false">a97971db-88b6-472d-af07-b4c341ee4b2b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/how-emerging-technology-will-revolutionize-enterprise-security-and-the-work-environment/</link><title>How Emerging Technology will Revolutionize Enterprise Security and the Work Environment</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-plante-technology.jpg' style='float: left' alt=''/&gt;Never in the history of the physical security industry have emerging technologies been poised to substantially impact the delivery of security programs and services on campus environments as much as they are now. </description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/video-analytics-10-action-items-to-prepare-your-campus-for-installation/"><guid isPermaLink="false">92e084a8-40fc-4666-b381-c29736c16e29</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/video-analytics-10-action-items-to-prepare-your-campus-for-installation/</link><title>Video Analytics: 10 Action Items to Prepare Your Campus for Installation</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-law-campus-security-video.jpg' style='float: left' alt=''/&gt;Useful technologies are advancing quickly for security practitioners’ benefit. The catch is that practitioners must prepare their base video surveillance system before implementing them.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/protecting-lone-workers-lessons-from-helzberg-diamonds-and-sally-beauty/"><guid isPermaLink="false">51174611-738b-4c62-96da-816120e659fb</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/protecting-lone-workers-lessons-from-helzberg-diamonds-and-sally-beauty/</link><title>Protecting Lone Workers: Lessons from Helzberg Diamonds and Sally Beauty</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-smitheman-protecting-lone-workers.gif' style='float: left' alt=''/&gt;Retailers are relying more on lone workers for serving customers inside and outside the store. This means greater investment in advanced technologies to increase safety measures for lone employees.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-imperative-to-integrate-security-and-privacy-on-modern-campuses/"><guid isPermaLink="false">f909fa13-4a7a-4d0c-b018-94dd21a44dc2</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-imperative-to-integrate-security-and-privacy-on-modern-campuses/</link><title>The Imperative to Integrate Security and Privacy on Modern Campuses</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-sink-integrated-tools-experiences.jpg' style='float: left' alt=''/&gt;As higher education institutions adopt a growing number of digital tools, they must focus on pursuing a strategy that moves not only toward a more seamless, integrated experience, but also incorporates cybersecurity, physical security, and privacy for everyone on campus.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/access-chaos-the-overlooked-security-concern-creating-dangerous-risks-on-your-campus/"><guid isPermaLink="false">db6c1e5b-0327-4519-80cb-4b0595daece7</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/access-chaos-the-overlooked-security-concern-creating-dangerous-risks-on-your-campus/</link><title>Access Chaos: The Overlooked Security Concern Creating Dangerous Risks on Your Campus</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-mcilravey-physical-access-control-systems.jpg' style='float: left' alt=''/&gt;To maintain a secure environment, many corporate, educational, and other campuses have deployed physical access control systems (PACS). But what happens when the permissions, rights, and roles inside the system are not accurate or do not align with other business systems?</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/beyond-vape-detection-texas-school-district-adopts-smart-sensor-system-to-improve-student-safety/"><guid isPermaLink="false">8dc38a13-ea63-4f1f-9a43-11ff633182ba</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/beyond-vape-detection-texas-school-district-adopts-smart-sensor-system-to-improve-student-safety/</link><title>Beyond Vape Detection: Texas School District Adopts Smart Sensor System to Improve Student Safety</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-merhige-vaping-detection.gif' style='float: left' alt=''/&gt;As students returned to campus, so did unauthorized vaping. The Castleberry Independent School District implemented IoT smart sensors to address the problem while also improving facility air quality and emergency response measures.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/identity-management-end-users-share-lessons-learned-during-covid-19-pandemic/"><guid isPermaLink="false">e1e110ca-fe0a-4e0d-bf5b-57378b43fd1a</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/identity-management-end-users-share-lessons-learned-during-covid-19-pandemic/</link><title>Identity Management: End Users Share Lessons Learned During COVID-19 Pandemic</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-carney-smart-watch-access-covid.jpg' style='float: left' alt=''/&gt;From the campus buildings of Vanderbilt to government agencies in Argentina, end users embraced identity management solutions that leveraged mobile devices to manage access and authenticate users in response to COVID-19.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/closing-the-critical-gap-in-active-shooter-response/"><guid isPermaLink="false">a58d3922-d77f-4b68-8086-37605d4ce40b</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/closing-the-critical-gap-in-active-shooter-response/</link><title>Closing the Critical Gap in Active Shooter Response</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-shooting-detection.gif' style='float: left' alt=''/&gt;Until we can altogether eliminate this modern-day risk—that threatens the population during routine moments of daily life—the mindful management of the intra-event is the focus that can and will save lives.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/mobile-access-migration-what-you-need-to-know/"><guid isPermaLink="false">9b3eb975-5280-4676-8a1c-b58e1b86ff01</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/mobile-access-migration-what-you-need-to-know/</link><title>Mobile Access Migration: What You Need to Know</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-acre-mobile-access.jpg' style='float: left' alt=''/&gt;Making the switch to smartphone-based credentials in your organization may be easier than you think and could provide a variety of benefits, from cost savings to increased health mitigation for staff and visitors.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/four-things-to-consider-when-choosing-your-credentials/"><guid isPermaLink="false">f7504835-5281-482c-b316-53571baf6a64</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/four-things-to-consider-when-choosing-your-credentials/</link><title>Four Things to Consider When Choosing Your Credentials</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-fergerstrom-credentials.jpg' style='float: left' alt=''/&gt;Selecting the most effective credentials for your organization can be challenging because many considerations should be reviewed to help make the right decision. Here are four that should be top of mind when making a transition.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-role-of-technology-in-training-preventing-and-responding-to-active-shooters/"><guid isPermaLink="false">2099843a-870a-4f1e-bb4f-d91ac0ae3cfc</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-role-of-technology-in-training-preventing-and-responding-to-active-shooters/</link><title>The Role of Technology in Training, Preventing, and Responding to Active Shooters</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-dodge-dunn-kuhn-active-shooter-response.jpg' style='float: left' alt=''/&gt;As active shooter scenarios and mass shootings in the United States continue to rise, technology is playing a larger role in identifying threats and responding to violence.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/systemic-failures-investigation-reveals-shortcomings-of-uvalde-school-shooting-response/"><guid isPermaLink="false">0837b5c4-63ce-460b-874f-a3fbaadf8fc4</guid><link>http://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2022/august/systemic-failures-investigation-reveals-shortcomings-of-uvalde-school-shooting-response/</link><title>Systemic Failures: Investigation Reveals Shortcomings of Uvalde School Shooting Response</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/security-technology/2022/august/0822-sectech-uvalde-after-action-report.jpg' style='float: left' alt=''/&gt;A Texas investigatory committee released an interim report on an active shooter at Robb Elementary School in Uvalde, Texas, identifying “systemic failures and egregiously poor decision making” that contributed to law enforcement’s delayed response.</description><pubDate>Mon, 01 Aug 2022 07:32:24 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/hunting-for-profits-criminal-groups-turn-to-the-environment/"><guid isPermaLink="false">c7e709dd-77d3-49f9-8452-036fe9427d29</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/hunting-for-profits-criminal-groups-turn-to-the-environment/</link><title>Hunting for Profits, Criminal Groups Turn to the Environment </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/sm-online_hunting-for-profits-criminal-groups-turn-to-the-environment_884x500.jpg' style='float: left' alt=''/&gt;In the European Union alone, the profits of some criminal networks involved in environmental crimes—from trafficking protected wild animals to waste and pollution crimes—reach millions of euros every year.</description><pubDate>Mon, 08 Aug 2022 08:03:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/video-how-organized-crime-and-terrorism-leverages-wildlife-trafficking/"><guid isPermaLink="false">5bf13f0f-7164-45ae-894e-f3512df49e63</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/video-how-organized-crime-and-terrorism-leverages-wildlife-trafficking/</link><title>Video: How Organized Crime and Terrorism Leverages Wildlife Trafficking</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0822-video-preview-hunting-for-profits-play.gif' style='float: left' alt=''/&gt;Illegal wildlife trafficking is the fourth most profitable illicit activity in the world, behind only narcotics, human trafficking, and counterfeiting. </description><pubDate>Mon, 08 Aug 2022 08:03:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-the-u.s.-army-is-changing-its-recruitment-strategy-for-gen-z/"><guid isPermaLink="false">e7c73156-6dd2-4660-a687-5c248c2ab463</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-the-u.s.-army-is-changing-its-recruitment-strategy-for-gen-z/</link><title>How the U.S. Army Is Changing Its Recruitment Strategy for Gen Z</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0822-shrm-army-recruiting.jpg' style='float: left' alt=''/&gt;Nearly three-quarters of Generation Z people recently surveyed claimed to be familiar with the Army—the highest amount of any generation. But it turned out they weren’t well-informed.</description><pubDate>Thu, 04 Aug 2022 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/meet-gen-z-the-stressed-indebted-and-idealistic-future-of-work/"><guid isPermaLink="false">f7d5be81-bff1-47df-a28e-39e6a8a6693d</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/meet-gen-z-the-stressed-indebted-and-idealistic-future-of-work/</link><title>Meet Gen Z: The Stressed, Indebted, and Idealistic Future of Work</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0822-shrm-meet-gen-z.jpg' style='float: left' alt=''/&gt;College debt, inflation, racial and gender inequity, political upheaval, the lingering effects of the COVID-19 pandemic, and recession fears plague Generation Z, so it’s no wonder that many of them say they’re facing mental health issues.</description><pubDate>Thu, 04 Aug 2022 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/whos-in-charge-water-utility-cybersecurity-checks/"><guid isPermaLink="false">ef185ae0-2d8c-42d6-91be-b9311ffc6298</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/whos-in-charge-water-utility-cybersecurity-checks/</link><title>Who’s in Charge of Water Utility Cybersecurity Checks? </title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-water-utilities-cybersecurity.jpg' style='float: left' alt=''/&gt;There are currently no minimum cybersecurity mandates for the water sector in the United States, although the Biden Administration is working to develop and implement some that  target the 1,600 water companies that serve large populations. </description><pubDate>Mon, 08 Aug 2022 12:15:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/after-reopening-venues-attract-rowdy-crowds-not-security-staff/"><guid isPermaLink="false">8292cafe-6bb6-40cb-ac5f-7c1609842d78</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/after-reopening-venues-attract-rowdy-crowds-not-security-staff/</link><title>After Reopening, Sports Venues Attract Rowdy Crowds but not Security Staff</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-ncs4-stadium-security-survey.jpg' style='float: left' alt=''/&gt;Why are venues short-staffed? Most security directors cited COVID-19, followed by staff simply not turning up for work. Seventy percent of survey participants said absenteeism among security staff has increased since the start of the pandemic. </description><pubDate>Fri, 05 Aug 2022 10:46:23 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/taiwan-pla-danger-zones/"><guid isPermaLink="false">cfdb950b-3f22-4583-97b5-597f60f4d102</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/taiwan-pla-danger-zones/</link><title>China Practices Sea and Air Blockade Around Taiwan</title><description>&lt;img src='http://www.asisonline.org/contentassets/ca354907cf8d4150acd0e31c0da521fc/0822-tis-china-training-military-exercises.jpg' style='float: left' alt=''/&gt;In retaliation for Taipei hosting U.S. House Speaker Nancy Pelosi earlier this week, China put on a show of force on Thursday, including firing multiple missiles into Taiwan’s surrounding sea.</description><pubDate>Thu, 04 Aug 2022 11:53:05 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/concentrated-rainfall-floods-us-midwest/"><guid isPermaLink="false">55ed59be-ef85-4520-ae89-9c9af186dddc</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/concentrated-rainfall-floods-us-midwest/</link><title>Concentrated Rainfall Floods U.S. Midwest</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-floods-in-the-midwest.jpg' style='float: left' alt=''/&gt;Summer storms are nothing new for the U.S. Midwest. But this year, wave after wave of heavy rainstorms have swamped whole regions, causing widespread damage and triggering rescue operations. </description><pubDate>Wed, 03 Aug 2022 12:10:35 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/al-qaeda-leader-killed-in-afghanistan-by-us-drone-strike/"><guid isPermaLink="false">c2a58c07-3ce8-480d-b736-a1c0cbf18e0e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/al-qaeda-leader-killed-in-afghanistan-by-us-drone-strike/</link><title>Al Qaeda Leader Killed in Afghanistan by U.S. Drone Strike</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0822-tis-us-drone-strike-kabul-taliban.jpg' style='float: left' alt=''/&gt;The United States fired a hellfire missile from a drone over Kabul, Afghanistan, on Sunday, killing Ayman al-Zawahiri, who was a primary architect of 9/11 and other terrorist attacks and had been the leader of al Qaeda.</description><pubDate>Tue, 02 Aug 2022 11:56:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/poor-arson-planning-emu-fighting-and-bigfoot-headline-this-months-strange-security-news/"><guid isPermaLink="false">fde3beb9-5cde-4d82-94dd-beb13b8ffbd8</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/august/poor-arson-planning-emu-fighting-and-bigfoot-headline-this-months-strange-security-news/</link><title>Poor Arson Planning, Emu Fighting, and Bigfoot: This Month's Strange Security News</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/strange-security-art-b.jpg' style='float: left' alt=''/&gt;Every month, Security Management editors collect the unusual security-related news they run across. Here are the top stories from July.</description><pubDate>Mon, 01 Aug 2022 14:25:17 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/soaring-to-new-heights/"><guid isPermaLink="false">1781dcca-a7bc-497e-bd2e-3cec1a1b93d6</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/soaring-to-new-heights/</link><title>Soaring to New Heights: Global Average Cost of a Data Breach Reaches $4.35 Million</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-ibms-cost-of-a-data-breach-report.jpg' style='float: left' alt=''/&gt;As the price of milk, gas, and rent went up in 2022, the cost of a data breach rose right alongside them to peak at the global average of $4.35 million, according to analysis out this week in an annual IBM report.</description><pubDate>Fri, 29 Jul 2022 11:55:32 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/shanghai-breach-fallout/"><guid isPermaLink="false">4b0d14eb-4abd-4b43-95c2-12aabcac13ca</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/shanghai-breach-fallout/</link><title>Repercussions from Shanghai National Police Data Breach</title><description>&lt;img src='http://www.asisonline.org/contentassets/0f9ddd9cb7404e75b672f924b551edf3/0722-tis-shanghai-national-police-data-breach.jpg' style='float: left' alt=''/&gt;While availability on the Dark Web of hacked Chinese data has recently increased, so too have Chinese users' interest in Dark Web forums, thanks to one of the world's largest data breaches - 23 terabytes of information on roughly 1 billion Chinese citizens, which was collected by the Shanghai National Police.</description><pubDate>Thu, 28 Jul 2022 11:31:08 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/worlds-worries-woes/"><guid isPermaLink="false">907bbcba-4a96-46d7-acad-dd2001752f0e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/worlds-worries-woes/</link><title>Perceived vs. Experienced Risks: Measuring the World’s Worries and Woes</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-perceived-risk-report.jpg' style='float: left' alt=''/&gt;In 2021, 34 percent of people worldwide said they felt less safe than they did five years previously, compared with 30 percent in 2019, according to the World Risk Poll.</description><pubDate>Wed, 27 Jul 2022 10:56:45 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/tensions-rise-on-the-tiny-island-with-outsized-strategic-importance/"><guid isPermaLink="false">d019c56e-dc6b-4e6f-b1ab-640f218aebbc</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/tensions-rise-on-the-tiny-island-with-outsized-strategic-importance/</link><title>Tensions Rise on the Tiny Island with Outsized Strategic Importance</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-taiwans-security-measures.jpg' style='float: left' alt=''/&gt;Taiwan’s capital city of Taipei conducted air raid drills yesterday in advance of planned military mobilization exercises. The drills come amid increased tension on the island as fears that China may try to assert control have grown, and U.S. House of Representatives Speaker Nancy Pelosi is considering the controversial move of visiting the island in a show of support.</description><pubDate>Tue, 26 Jul 2022 14:55:20 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/four-smart-cybersecurity-investments-for-cisos-to-bridge-the-talent-shortage/"><guid isPermaLink="false">95fddc31-4c9e-4f7d-9376-954247112a99</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/four-smart-cybersecurity-investments-for-cisos-to-bridge-the-talent-shortage/</link><title> Four Smart Cybersecurity Investments for CISOs to Bridge the Talent Shortage</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0722-daniels-csios-4-smart-investments.jpg' style='float: left' alt=''/&gt;The most effective security leaders maximize their investments in talent, technologies, and services to address the cybersecurity talent shortage.    </description><pubDate>Tue, 26 Jul 2022 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/who-declares-monkeypox-outbreak/"><guid isPermaLink="false">94d6c0bc-2405-424d-b150-26f51b6078f1</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/who-declares-monkeypox-outbreak/</link><title>WHO Declares Monkeypox Outbreak a ‘Public Health Emergency of International Concern’</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-monkeypox-is-declared-a-public-health-emergency-of-international-concern.jpg' style='float: left' alt=''/&gt;After the World Health Organization (WHO) Emergency Committee failed to reach a consensus, the WHO Director-General Tedros Adhanom Ghebreyesus declared the global monkeypox outbreak a public health emergency of international concern to spur the public health community to act to mitigate its spread.</description><pubDate>Mon, 25 Jul 2022 11:01:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/active-threat-attacks-by-lone-actors-a-new-category-of-risk-to-anticipate-for-effective-prevention/"><guid isPermaLink="false">930ccff2-631f-417a-9d27-ab122eabfa66</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/active-threat-attacks-by-lone-actors-a-new-category-of-risk-to-anticipate-for-effective-prevention/</link><title>Active Threat Attacks by Lone Actors: A New Category of Risk to Anticipate for Effective Prevention</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0722-sm-online-active-threat-attacks-by-lone-actors.png' style='float: left' alt=''/&gt;A recent wave of violent attackers crosses traditional active assailant categories, vastly complicating traditional threat assessment practices.</description><pubDate>Fri, 22 Jul 2022 12:31:34 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/new-york-governor-candidate-wards-off-assault/"><guid isPermaLink="false">d5d000c1-1242-4358-8deb-a810010dd1f4</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/new-york-governor-candidate-wards-off-assault/</link><title>New York Governor Candidate Wards Off Assault, the Latest Attack on a Political Figure</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-political-attack.jpg' style='float: left' alt=''/&gt;A man walked on to the stage, brandished a pointed metal object, and swung it towards U.S. Representative Lee Zeldin’s neck at a campaign rally in Perinton, New York, on Thursday evening.</description><pubDate>Fri, 22 Jul 2022 12:02:32 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/cruel-summer-2022/"><guid isPermaLink="false">b4556e5d-6c7c-4ecb-984c-c743ae7dca61</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/cruel-summer-2022/</link><title>A Cruel Summer in Europe and the United States</title><description>&lt;img src='http://www.asisonline.org/contentassets/63664911350b49b78134c729e74b7c90/0722-tis-record-heat-us-europe.jpg' style='float: left' alt=''/&gt;Both in North America and Europe, temperatures have climbed into the triple digits, triggering high heat and wildfire alerts. The expectation is that the heat will remain high throughout the weekend.</description><pubDate>Thu, 21 Jul 2022 13:20:35 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/intolerance-fueled-terrorism-national-security-threat/"><guid isPermaLink="false">a3714ab2-cd2f-4697-ae3f-546a475f06fe</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/intolerance-fueled-terrorism-national-security-threat/</link><title>Intolerance-Fueled Terrorism Represents Growing National Security Threat, UN Report Finds</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-extremist-terrorism-prevention.jpg' style='float: left' alt=''/&gt;Xenophobia, racism, and other forms of intolerance are driving increased numbers of terrorist attacks across United Nations member states, according to a new report from the UN Office on Drugs and Crime. </description><pubDate>Wed, 20 Jul 2022 11:56:18 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/us-mass-shootings-continue-to-take-center-stage/"><guid isPermaLink="false">a164386e-e710-415a-9eae-e778e2f2eb08</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/us-mass-shootings-continue-to-take-center-stage/</link><title>U.S. Mass Shootings Continue to Take Center Stage</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-us-gun-violence-indiana-uvalde-report.jpg' style='float: left' alt=''/&gt;An Indiana gunman stopped by a bystander and scathing report from the state legislature on the handling of the Uvalde, Texas, mass shooting highlight only the latest in what has become a steady stream of mass shooting news.</description><pubDate>Tue, 19 Jul 2022 14:59:39 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/franco-a-germany-extremism-case/"><guid isPermaLink="false">e8807c89-9e56-40f2-a23c-2a0a9c70df2e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/franco-a-germany-extremism-case/</link><title>How the Franco A. Case Changed the Way Germany Confronts Extremism</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-franco-extremism-case-germany.jpg' style='float: left' alt=''/&gt;Before the arrest of Franco A., German authorities largely denied the presence of extremism—especially far-right extremism—in the country's military ranks. </description><pubDate>Mon, 18 Jul 2022 12:22:56 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/the-long-tail-of-log4j/"><guid isPermaLink="false">8f59bab2-50d6-4ddf-b01b-9ca60590fe7e</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/the-long-tail-of-log4j/</link><title>The Long Tail of Log4j: CSRB Report Assesses Lessons Learned and Impact of Open-Source Software Vulnerability</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-log4j-vulnerability.jpg' style='float: left' alt=''/&gt;A new report out this week from the U.S. Cyber Safety Review Board which analyzed the events surrounding the disclosure of the Log4j vulnerability in December 2021 and its known impact. </description><pubDate>Fri, 15 Jul 2022 12:20:47 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/why-zero-trust-must-extend-into-deep-infrastructure/"><guid isPermaLink="false">ec5f1e73-b6ed-477c-a9c5-dac080f8633c</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/why-zero-trust-must-extend-into-deep-infrastructure/</link><title>Why Zero Trust Must Extend into Deep Infrastructure</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0722-nazari-zero-trust.jpg' style='float: left' alt=''/&gt;Serious, persistent threats are already looming in your infrastructure. The lowest-hanging fruit—and the most vulnerable point of attack—is where you may least expect it: the hardware and firmware that lies in the deep layers of your physical infrastructure. </description><pubDate>Fri, 15 Jul 2022 06:00:10 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-to-get-real-results-with-virtual-training/"><guid isPermaLink="false">f17561aa-a420-498a-91f3-4a6facb0ef3c</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/how-to-get-real-results-with-virtual-training/</link><title>How to Get Real Results with Virtual Training</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0722-smonlinetraining-goes-virtual-with-augmented-reality.jpg' style='float: left' alt=''/&gt;Virtual reality isn’t typically used to hone soft skills such as improving leadership or communication, though more companies are considering it. Instead, it’s a conduit to developing physical skills like repairing a piece of equipment or learning the most effective way to stack boxes in a warehouse.</description><pubDate>Tue, 12 Jul 2022 08:37:38 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/influencers-and-abusers-keeping-online-celebrities-safe/"><guid isPermaLink="false">7e7572c7-b10d-4d36-a16c-1a7cf6f5dcf0</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/online-exclusives/2022/influencers-and-abusers-keeping-online-celebrities-safe/</link><title>Influencers and Abusers: Keeping Online Celebrities Safe</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/latest-news/web-exclusives/2022/0722-gates-influencers-and-online-security.jpg' style='float: left' alt=''/&gt;To learn more about how security practitioners can respond to online threats and protect influencers—from social media to basketball stars—Security Management interviewed a risk expert. </description><pubDate>Tue, 05 Jul 2022 09:06:41 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/jury-convicts-former-cia-engineer/"><guid isPermaLink="false">30cec8e1-379a-43ef-b45c-c076fcc64d5a</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/jury-convicts-former-cia-engineer/</link><title>Jury Convicts Former CIA Engineer for 'Vault 7' Leak of Agency's Classified Information</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-joshua-schultes-conviction-of-the-biggest-cia-leak.jpg' style='float: left' alt=''/&gt;A U.S. jury convicted a former Central Intelligence Agency (CIA) engineer for causing the largest leak of classified information in the history of the agency</description><pubDate>Thu, 14 Jul 2022 13:09:15 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/nearly-half-us-murders-went-unsolved-in-2020/"><guid isPermaLink="false">8e0e8005-6f40-486e-ab49-d47173d8b9a3</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/nearly-half-us-murders-went-unsolved-in-2020/</link><title>Nearly Half of All U.S. Murders Went Unsolved in 2020</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-unsolved-crime-murders.jpg' style='float: left' alt=''/&gt;Only 54 percent of homicides were cleared in 2020 through the arrest of the offender, the FBI estimated. Meanwhile, homicides climbed nearly 30 percent that year. </description><pubDate>Wed, 13 Jul 2022 12:39:40 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/a-more-complete-picture-of-the-safety-issues-at-the-champions-league-football-match-emerge/"><guid isPermaLink="false">a5a92e2b-34c4-47dc-9c68-e6043d874b6f</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/a-more-complete-picture-of-the-safety-issues-at-the-champions-league-football-match-emerge/</link><title>A More Complete Picture of the Safety Issues at the Champions League Football Match Emerges</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-champions-league-soccer-football-chaos.jpg' style='float: left' alt=''/&gt;Authorities had trouble understanding why tens of thousands of fans had trouble entering the Stade de France for a football match in May, which caused dangerous conditions in which irate fans clashed with authorities.</description><pubDate>Tue, 12 Jul 2022 14:57:57 -0400</pubDate></item><item xml:base="http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/former-japanese-prime-minister-assassinated/"><guid isPermaLink="false">6b78bee3-32af-4b5e-90de-9820a6519f0d</guid><link>http://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2022/july/former-japanese-prime-minister-assassinated/</link><title>Former Japanese Prime Minister Shinzo Abe Assassinated at Campaign Rally</title><description>&lt;img src='http://www.asisonline.org/globalassets/security-management/today-in-security/2022/0722-tis-assassination-japan-prime-minister-shinzo-abe-flowers.jpg' style='float: left' alt=''/&gt;A gunman assassinated former Japanese Prime Minister Shinzo Abe at a campaign event in Nara, Japan, on Friday morning in a shocking act of violence in the country with some of the most stringent firearm control laws in the world.</description><pubDate>Fri, 08 Jul 2022 11:19:30 -0400</pubDate></item></channel></rss>