Skip to content
Menu
menu
Illustration of a tiny man standing on a water pipe with a wrench. The background has a waterfall with jumbles of a cyberattack code.

Underfunded Water Utilities Contend with Leaky Defenses

What would you do if your toilet stopped flushing? What if the taps ran dry and you were unable to access safe drinking water for days or even weeks?
Water systems’ limited defense, monitoring, and detection abilities, along with the potential to make a big impact when struck, make them a “juicy target when you have that overarching goal—which a lot of these adversary groups do—of having a big negative impact and psychological impact on an opposing country,” says Lesley Carhart of Dragos Inc.

Continue Reading

Featured Articles

Photo of West Ham United's Thilo Kehrer is accidentally tackled by a security guard as pitch invaders enter the field following the UEFA Europa Conference League Final at Fortuna Arena in Prague.

Security Technology: Security Brings Its “A Game”

Negative fan behavior. Weather issues. Cyberattacks. Rogue drones. Security incidents at sporting events impact both athletes on the field and fans in the stands. In the June issue of Security Technology, learn how security directors across sport are responding.

Security Management Podcast

June 2024: Preparing for Major Events, from Olympics to Active Assailant Events

Summer 2024 is a busy one for security professionals in Europe, with the Olympics kicking off next month in France. Harry Arruda joins this SM Highlights episode to explain how traditional concentric circles of protection around event venues become extra complicated when set in the midst of residences, businesses, and pedestrian zones in Paris. Then, former FBI agent Jin Kim shares some key takeaways from his career of research into active assailants and workplace violence, including around technology, training, and culture.

Focus on Executive Protection

When Second Homes Are a Primary Concern

Vacation homes are supposed to be sanctuaries, and the people who decamp there usually treat it as such. Two experts offer advice on how executive protection teams can help make these places of refuge rejuvenating and safe for clients.

Celebrity Protection in the Spotlight

Celebrities are constantly surrounded by cameras—from paparazzi to fans to livestreams on their own smartphones. This constant attention puts new pressure on personal protection professionals to manage public perception while mitigating escalating threats.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: Modern Management and Leadership: Best Practice Essentials with CISO/CSO Applications

In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role.

Catch Up With SM on Social Media

Share the latest SM articles, infographics, and stories with your friends and colleagues.
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

co_present

Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward