Skip to content
Illustration of  a hand pushing a globe off a cliff.

The 'New Normal' of Risk Goes Back to Basics

What’s old is new again. Or at least that’s the sentiment in an annual global survey where basic risks took the highest positions in the index that showed nations are taking an increasingly isolationist approach to address local risks with international consequences.

Read More

Featured Articles

Illustration of a train on a bridge during sunset. The bridge and the sky are made of binary code.

Keeping the Supply Chain on Track

Cargo ships, trucks, and freight trains are vital for moving goods efficiently. But as they become increasingly digitized and connected, their attack surfaces expand, making these critical systems far more vulnerable to potentially crippling cyberattacks.

Focus on Pipeline Security

Pipelines’ Digital Defense is on the Line

Pipeline networks “are vulnerable to cyber-attacks due to legacy (industrial control systems) that lack updated security controls and the dispersed nature of pipeline…networks spanning urban and outlying areas,” according to the U.S. Transportation Security Administration (TSA). As aspects of operational and information technology become further integrated, those industrial control systems (ICSs) become a bigger target for cyber attackers.

More On This Topic
Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena
Energy Geopolitics: How the War in Ukraine Hit Pipelines
Infographic: Who Owns Gas Pipeline Development? 
Fast Facts: 3 Key Threat Areas for Pipelines

Illustration of  a hand pushing a globe off a cliff.

Security Technology: Supply Chain Challenges and Opportunities

Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.

Security Management Podcast

February 2023: Preparing for the Unexpected—Robbery Recovery, Reputation Risks, and Supply Chain Upsets

How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross over with security issues, including when rumors and conspiracy theories trigger a backlash on social media. Lastly, Miki Shifman discusses the current threats to trains and how technology advancements on the railroad could improve supply chain efficiency and security.  

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.