Skip to content
Illustration of a train on a bridge during sunset. The bridge and the sky are made of binary code.

Keeping the Supply Chain on Track

Cargo ships, trucks, and freight trains are vital for moving goods efficiently. But as they become increasingly digitized and connected, their attack surfaces expand, making these critical systems far more vulnerable to potentially crippling cyberattacks.

Read More

Featured Articles

Illustration of a giant hand with a USA cufflink stopping a delivery man carrying a box with the Chinese flag on it.

The Semiconductor Conundrum

New American restrictions will significantly slow China’s chip efforts, but the effect will not be immediate, comprehensive, or ultimately permanent.

Photo of a packed group of sports fans clapping in the stadium stands.

Resilience Ramifications

Business leaders and cybersecurity executives expect that a catastrophic cyber incident with far-reaching global ramifications will occur before 2025. A new focus on resilience may help us be ready for the moment.

Focus on Pipeline Security

Pipelines’ Digital Defense is on the Line

Pipeline networks “are vulnerable to cyber-attacks due to legacy (industrial control systems) that lack updated security controls and the dispersed nature of pipeline…networks spanning urban and outlying areas,” according to the U.S. Transportation Security Administration (TSA). As aspects of operational and information technology become further integrated, those industrial control systems (ICSs) become a bigger target for cyber attackers.

More On This Topic
Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena
Energy Geopolitics: How the War in Ukraine Hit Pipelines
Infographic: Who Owns Gas Pipeline Development? 
Fast Facts: 3 Key Threat Areas for Pipelines

Illustration of  a hand pushing a globe off a cliff.

Security Technology: Supply Chain Challenges and Opportunities

Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.

Security Management Podcast

February 2023: Preparing for the Unexpected—Robbery Recovery, Reputation Risks, and Supply Chain Upsets

How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross over with security issues, including when rumors and conspiracy theories trigger a backlash on social media. Lastly, Miki Shifman discusses the current threats to trains and how technology advancements on the railroad could improve supply chain efficiency and security.  

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.