Skip to main content

News from our national partners

The latest in Fire, EMS, Police & Security

News & Events

Security Management First Look November 2017

Peter_headshot.jpg
NSA’s practice of storing zero-day vulnerabilities is questioned, a government watchdog finds flaws in a program that distributes surplus military gear, plus the benefits of a strong telecommuting policy. 
Peter_headshot.jpg
SM Webinar: Physical-Logical Convergence
The evolving relationship between physical security and IT often comes with disconnected budgets, priorities, and deliverables. Join Security Management and HID Global to learn about technologies, challenges, and best practices, Thursday, November 2, at 2:00 p.m. Eastern. Register here.
ed.jpg
SM Webinar: GDPR and Physical Security
The European Union's General Data Protection Regulation (GDPR) standards go into effect May 2018. This second webinar discusses the impact on physical security and identity management. Don Campbell answers your questions on November 15 at 2:00 p.m. Eastern. Register here.

468x60px-EndUser-EasyPersonnelThreatMngmntCA4K0617.jpg

Peter_headshot.jpg
SM Webinar: Cloud-Based Access
Learn about the process and payoffs of transitioning to a cloud-based physical security solution. David Stratton and John Szczygiel will explain how to make the business case for cloud-based access. The webinar is on Wednesday, November 29 at 2:00 p.m. Eastern. Register here.

Peter_headshot.jpg
 Cover Story 


Fake News

Why do people fall for news items they know are probably false? What can organizations do to protect themselves from lies, both intentional and accidental?
Peter_headshot.jpg
The Ins and Outs of Telework

Employees who have the ability to work remotely may be more satisfied than those who don't. Learn about creating a telework policy, ensuring that employees can access their work from other locations, and how to secure devices and networks that workers will be using.
Brivo Webinar

Peter_headshot.jpg
Perimeter Protection

Security professionals must consider both electronic and physical perimeters that define an organization. A facility threat assessment should take into account all the goods and services passing through, as well as utilities, digital signals, and people who move past the perimeter.
Peter_headshot.jpg
It often takes a tragedy for the public to notice a persistent problem. When 10 undocumented immigrants died in a tractor trailer last July, people were shocked. In fact the crime of human trafficking is both widespread and deadly. Find out what is being done to stop it.
SM Online

The Russian hacking of the U.S. 2016 presidential election was an “assault” on election infrastructure, and there may be similar efforts affecting future elections. Securing Elections from Foreign Interference outlines steps that can be taken now to protect the most critical elements of the U.S. election infrastructure.
In Government’s Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process, experts recommend that the United States formalize the process it uses to disclose cyber vulnerabilities.
The Federal Motor Carrier Safety Administration and Federal Railroad Administration withdrew a proposed rule to require truck drivers and train operators be tested for obstructive sleep apnea.
 
The United Kingdom will introduce new legislation that will align U.K. law more closely with the EU General Data Protection Regulation.
 
Recent Headlines
In today's environment of heightened security in all areas, security departments are struggling to attract and retain high-quality guards. Now more than ever, it's vital to examine how security guards are evaluated, trained, and compensated.
 
Harden Soft Targets with PSIM

Soft targets—those that are readily accessible to the public, like shopping malls, hotels, and hospitals—are especially vulnerable to attack by terrorists, criminals, and other bad actors. Recent attacks around the globe have raised awareness of the need to protect these spaces. 
 
Hiring People, Not Resumes

Two resumes lie side by side on a recruiter's desk. Candidate A has an Ivy League education, a 4.0 GPA and a slew of impressive internships. Candidate B graduated from a state school with a 3.4 GPA and once worked as a singing waitress. Which candidate is more likely to add value to the organization? Regina Hartley, a vice president of HR at UPS, argues that it just might be Candidate B.
 
Close