Skip to content

Featured Articles

Security Management: Focus on House of Worship Security

Extremism Against Places of Worship Extends Across Faiths

Houses of worship across many religions faced a spike in security incidents in recent years, whether driven by the response to a controversial event or a longstanding tension or discrimination. In this collection of articles from Security Management, explore how security and religious leaders are tracking threats, changing mindsets, and preparing for extremist-linked incidents. 

More On This Topic
5 Underlying Reasons for Extremist Attacks on Houses of Worship
How Faith-Based Organizations Can Improve Threat Intelligence Collection
Infographic: How to Build Priority Lists for Threat Monitoring
PRAY: A Model to Change Mindsets about Security in Houses of Worship
4 Steps to Mitigate Crime Risks at Houses of Worship
Fast Facts: 11 Security Scenarios Religious Personnel Should Prepare For

Illustration of  a hand pushing a globe off a cliff.

Security Technology: Supply Chain Challenges and Opportunities

Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.

Security Management Podcast

March 2023: Are You Ready for What’s Next? Evacuations, Resilience, and Pitching New Ideas

Do you have the infrastructure, programs, and soft skills in place to adapt to any situation? In this episode of Security Management Highlights, host Brendan Howard speaks with Dale Buckner about mass evacuations and duty of care; ASIS Europe co-chairs Inge Huijbrechts and Gavin Henderson discuss the business case for sustainability and resilience; and Suzanna Alsayed gives some practical advice about how to ready your reputation—and your pitch—to increase chances of buy-in success.

Want to learn more about these topics? Check out additional resources from Security Management and ASIS International:

Focus on Bomb Threats

Historically Black, Historically Targeted

Historically Black colleges and universities were increasingly targeted by bomb threats in 2022. The incidents, however, are just part of a longer pattern of violence and intimidation towards Black institutions in the United States.

An Explosive Situation: Strategies to Prevent Youth Radicalization

A recent wave of bomb threats against historically Black colleges and universities said to be made by a juvenile highlights how extremist ideologies are being spread in places where young people congregate. It also highlights the need for resources to help community members effectively intervene.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.