Active shooter programs have evolved, but there are critical elements every employer should factor in when training workers.
A majority of companies conduct some form of background screening on their permanent employees but not necessarily on third-party or temporary employees, who pose a unique workplace security threat.
As the gun control debate rages on, another controversy bubbles under the surface: Should the government fund gun violence studies?
Some senior business leaders are at risk of undermining their organization's ability to manage crises because they are not taking crisis preparedness as seriously as they should.
The U.S. biosurveillance enterprise has been plagued with criticism, setbacks, and egregious errors. A bipartisan report calls for reform of how the nation approaches biodefense.
A Chicago-area church with thousands of congregants installs a technology to cut down on law enforcement response time.
The United States finally enacted legislation to create a cybersecurity information-sharing network. But how does it differ from what's already being done?
Learn why the simple act of laughing is a powerful source of social bonding,
Dig deeper into the research and reports referenced in the April 2016 issue of Security Management.
Check out our Q&A with Jennifer Hesterman about soft target security.
Learn about the latest legislation, regulations, court cases, and judicial decisions affecting security professionals and managers in the April 2016 Legal Report.
Dig deeper into the legislation and regulations referenced in the April 2016 issue of Security Management.
Learn about the latest honors, partnerships, and publications from ASIS in the April 2016 issue of Security Management.
Learn about the latest projects, installations, mergers, acquisitions, and announcements from the security industry.
A well-researched work explores the relationship between military and civilian authorities in pursuit of homeland defense.
Authors examine the subtle differences between the notion of “information assurance” and "information security".
The book's theme—strategic decision making in an organization cannot exist without a concerted and holistic approach to gathering, analyzing, and working security intelligence.