Skip to content
Illustration of a giant hand with a USA cufflink stopping a delivery man carrying a box with the Chinese flag on it.

The Semiconductor Conundrum

The new American restrictions impose export controls to block China’s ability to purchase and manufacture high-end chips, limiting the country’s ability to obtain advanced computing chips, develop and maintain supercomputers, and manufacture advanced supercomputers. The restrictions will significantly slow China’s chip efforts and will hold back Chinese semiconductor capabilities for years, but these effects will not be immediate, comprehensive, or ultimately permanent. 

Read More

Featured Articles

Focus on Pipeline Security

Pipelines’ Digital Defense is on the Line

Pipeline networks “are vulnerable to cyber-attacks due to legacy (industrial control systems) that lack updated security controls and the dispersed nature of pipeline…networks spanning urban and outlying areas,” according to the U.S. Transportation Security Administration (TSA). As aspects of operational and information technology become further integrated, those industrial control systems (ICSs) become a bigger target for cyber attackers.

More On This Topic
Hot Tapping, Protests, and Attacks: Protecting Pipelines from Physical Phenomena
Energy Geopolitics: How the War in Ukraine Hit Pipelines
Infographic: Who Owns Gas Pipeline Development? 
Fast Facts: 3 Key Threat Areas for Pipelines

Illustration of  a hand pushing a globe off a cliff.

Security Technology: Supply Chain Challenges and Opportunities

Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.

Security Management Podcast

February 2023: Preparing for the Unexpected—Robbery Recovery, Reputation Risks, and Supply Chain Upsets

How can security teams help support employees’ mental health and resilience following a major incident, such as a bank robbery? Brian Ishikawa, CPP, from the Bank of Hawaii, walks us through how training, documents, and procedures clear the way for recovery. Michael Gips, CPP, joins the SM Highlights podcast to discuss how reputational issues cross over with security issues, including when rumors and conspiracy theories trigger a backlash on social media. Lastly, Miki Shifman discusses the current threats to trains and how technology advancements on the railroad could improve supply chain efficiency and security.  

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.