/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/advertise-archives/advertise2020/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Becoming-More-Reliable-Resilient-Enhanced-Substation-Security/2024-02-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/girding-the-grid/2024-02-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Meeting-Living-Building-Challenge/2024-02-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Internet-of-Things-Increasing-Threats-Electric-Grid/2025-02-14T10:08:24-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/whats-a-watt/2024-02-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Why-Chinas-Global-Electric-Project-Has-National-Security-Experts-On-Alert/2024-02-05T09:14:44-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Fast-Facts-4-Challenges-Renewable-Energy-Transition/2024-02-01T08:35:01-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/Unlocking-the-Power-of-AI/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/AI-Powered-SaaS-How-Get-Most-Out-of-It-Safely/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-physical-security-teams-should-leverage-ai/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/Infographic-How-AI-is-Changing-Cybersecurity-Jobs/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-soc-teams-can-best-implement-ai-as-a-security-co-pilot/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/how-automated-identity-verification-is-reshaping-security/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/seven-ai-applications-that-are-transforming-security-operations/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/fast-facts-eu-ai-act/2024-04-03T15:33:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/mitigating-the-rise-in-cyberattacks-on-critical-infrastructure/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/why-dna-data-is-the-next-target-for-identity-theft-fraudsters/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/The-Role-AI-Plays-Workplace-Safety-Compliance/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/pixel-litigation/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/Understanding-the-EU-AI-Act/2024-07-03T12:02:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/AI-And-Elections-Addressing-New-Tools-to-Spread-Inaccurate-Information/2024-04-02T11:50:50-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/Addressing-Ethical-and-Privacy-Issues-with-Physical-Security-And-AI/2024-04-01T08:07:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/A-Climate-Conversation-with-GPT4/2024-04-25T13:23:23-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/World-Cup-Perspective-Sports-Ticketing-Enters-New-Era/2024-06-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/the-forgotten-mission-of-security-operations/2024-06-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/operational-security-bloom-at-td-garden-how-a-major-sporting-venue-is-improving-efficiency/2024-06-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/safeguarding-the-2024-olympics/2024-06-06T11:45:12-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/ai-venue-security/2024-06-06T11:48:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/Security-Score-Card/2024-06-06T11:51:42-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/Low-Skill-High-Reward-Why-Vehicle-Attacks-Continue-Effective/2024-06-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/security-perimeters-for-the-paris-olympic-games/2024-06-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/Revolutionizing-Security-Rise-Future-Security-Robots/2024-07-31T13:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/securing-today-with-tomorrows-tech/2024-07-31T13:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/How-to-Prepare-Implement-Technically-Driven-Security-Model/2024-07-31T13:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/Modernizing-Security-with-Robotics-Process-Automation/2024-07-31T13:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/The-Rise-of-Drones-and-Counter-Drone/2024-08-01T11:41:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/what-technologies-are-employers-using-to-keep-workers-safe/2024-07-31T13:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/What-are-the-Six-Most-Common-Robot-Types/2024-07-31T16:24:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/Lessons-Learned-from-Letting-the-DroneDogs-Out/2024-07-31T14:06:06-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/why-protecting-glass-is-of-utmost-importance-in-building-perimeter-security/2024-09-30T15:57:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/tempo-tempest-facing-emergency-management/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/Integrating-Evolving-Technology-Intelligence/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/How-AI-May-Change-the-Way-Security-Teams-Use-OSINT/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/countering-the-china-threat-in-the-year-of-the-dragon/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/best-practices-for-minimizing-ot-threats/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/building-a-team-of-teams-for-unified-threat-intelligence/2024-10-03T11:26:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/Fast-Facts-What-is-Open-Source-Intelligence/2024-10-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/the-six-steps-in-the-intelligence-cycle/2024-10-01T12:30:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/Data-Driven-Video-Technology-Enhances-Medevac-Helicopters-Safety/2024-12-02T08:13:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/transportation-ratings-what-they-mean-for-security-cameras/2024-12-02T08:13:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/leveraging-under-vehicle-inspection-tech/2024-12-02T08:13:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/Maritime-Industry-Considers-Cybersecurity-Be-Greatest-Risk/2024-12-02T08:13:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/How-a-Proposed-TSA-Regulation-Might-Change-Rail-Security/2024-12-10T09:39:34-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/proposed-tsa-cyber-regulations/2024-12-02T08:13:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/street-smarts-the-rise-of-intelligent-transportation-systems/2024-12-10T09:39:51-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/How-Researchers-Use-Surveillance-Cameras/2024-12-04T10:31:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/Chinese-Platforms-TikTok-Tip-Off-Shore-Iceberg/2023-12-20T11:35:52-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/TikTok-Users-Increasingly-Use-Site-for-News/2023-11-30T16:37:11-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/managing-digital-risk-with-social-media-governance/2024-01-12T11:22:53-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/the-future-of-corporate-security-a-fusion-of-innovation-and-expertise-in-2033/2024-01-08T08:59:58-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/hateful-rhetoric-online-rises-following-outbreak-of-israel-and-hamas-war/2023-11-30T10:00:12-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/stopping-an-active-shooter-with-osint/2023-12-13T10:51:21-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Family-Offices-What-They-Get-Right-About-Security/2023-04-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Executive-Security-Mobile-Command-Service/2025-01-27T15:45:15-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Executive-Protection-Age-Technology/2025-01-27T15:44:37-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Importance-Standardizing-EP/2025-03-27T15:44:34-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/when-second-homes-are-a-primary-concern/2025-01-27T15:43:59-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/EP-Skillsets-Elevating-Leadership-Skills-Protect-Business/2025-01-27T15:43:32-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/tech-advance-how-executive-protection-leverages-technology/2025-01-27T15:43:13-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Creativity-in-Motion/2024-04-15T12:44:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Modernizing--Approach-Executive-Digital-Risk-Management/2025-01-27T15:42:37-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/Fast-Facts-Protecting-Former-US-President-Jimmy-Carter/2025-01-27T15:42:23-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/the-time-is-up-for-tiktok-how-to-effectively-enforce-an-app-ban/2023-11-01T12:49:52-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/research-shows-growing-role-of-mobile-access-control-to-improve-sustainability/2023-11-01T12:49:20-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/Assessing-Need-Heightened-Mobile-Device-Security-Awareness/2023-11-01T12:48:34-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/Protecting-Privacy-Corporate-Data-Employee-Owned-Mobile-Devices/2023-11-01T12:47:41-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/infographic-what-is-sim-swapping/2023-11-01T12:47:04-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/mobile-access-and-secured-entry-solutions/2023-11-01T12:46:17-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/device-security-101-best-practices-for-phones/2023-11-01T12:44:35-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/edge-computing-unlocks-innovations-in-access-control/2023-11-01T12:44:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/Modernizing-a-San-Francisco-Landmark/2023-11-01T12:43:48-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/Fast-Facts-Making-Sense-Mobile-Threats/2023-11-01T12:41:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/improving-emergency-response-with-better-dispatch-instructions/2023-10-31T17:30:03-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/collaboration-how-technology-helps-multi-housing-community-managers-work-with-the-fire-department/2023-10-31T21:19:34-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/smart-sensor-reduces-fire-risk/2023-10-31T17:17:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/fast-facts-what-is-the-smithsonian-institute/2023-10-31T15:39:58-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/crisis-management-making-argentinas-electric-grid-more-resilient/2023-10-31T21:20:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/challenges-to-incident-response-at-secured-data-centers/2023-10-31T21:49:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/how-to-create-inclusive-evacuation-plans/2024-06-17T08:46:21-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/Building-a-Partnership-for-Protection/2023-10-31T21:46:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/scale-investigations-using-open-source-intelligence/2024-01-08T09:32:05-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/Fast-Facts-4-Hubs-Illicit-Trade/2023-10-02T08:37:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/Below-Waterline-The-Evolution-Island-Hopping/2023-10-01T08:12:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/Understanding-the-Flow-Fentanyl/2023-10-01T08:12:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/a-romcom-worth-watching-the-threat-actors-latest-targets/2023-10-01T08:12:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/changing-tactics-cargo-thieves-zero-in-on-information-from-supply-chains/2023-10-01T08:12:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/digital-transformation-a-new-approach-to-organized-crime/2023-10-01T08:12:39-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/Diving-Beyond-Boosters-into-Organized-Retail-Crime-Rings/2023-12-15T16:02:45-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/Old-Guard-New-Tech-Modernizing-Travel-Risk-Management-Mature-Security-Operations/2025-04-01T19:25:36-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/dont-wait-for-a-tragedy-to-implement-proactive-executive-travel-security/2025-04-01T06:00:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/Taking-A-Closer-Look-Key-Management-Schiphol-Airport-Security/2025-04-01T06:00:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/Where-Wrongful-Detention-is-on-the-Rise/2025-04-01T06:00:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/how-to-design-an-entrepreneur-travel-risk-management-framework/2025-04-01T06:00:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/wrongful-detention-an-ermging-travel-risk-for-2025/2025-04-01T06:00:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-Pretrave-Steps-for-Safer-Work-Trips/2025-04-01T09:26:17-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/Redefining-security-screening-with-the-power-of-AI/2025-04-28T20:30:06-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/5-takeaways-from-asis-europe/2025-04-11T08:10:27-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/Artificial-Intelligence-Navigating-Dual-Edged-Sword-Digital-Threats/2025-02-01T07:46:57-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-ways-to-boost-fraud-detection/2025-02-01T07:46:57-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/Too-Good-Be-True-How-Crypto-Investment-Scam-Works/2025-02-01T07:46:57-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/eight-major-fraud-cases-from-2024/2025-02-01T07:46:57-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/Redefining-Security-Screening-with-the-Power-of-AI/2025-02-01T07:46:57-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/Trend-Alert-Fraud-Schemes/2025-02-05T16:30:28-05:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/advertise-archives/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/contact-us/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/demographics/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/fine-print/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/article-development/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/custom-content/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/podcasts/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/newsletters/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/2021_GSX_Sponsorships/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/websites/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/events/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/security-technology/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/security-management/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/awards/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/editorial-calendar/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/Leveraging-Lockers-The-Future-of-Weapons-Storage-is-Here/2025-06-01T09:01:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/5-nonlethal-weapons-used-by-security/2025-06-02T11:12:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/The-5-Steps-in-a-Use-of-Force-Continuum/2025-06-01T09:01:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/always-armed-rarely-drawn-rethinking-firearms-in-executive-protection/2025-06-09T10:10:35-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/how-to-make-a-weapon-selection-when-arming-your-security-team/2025-06-01T09:01:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/training-armed-security-personnel/2025-06-13T13:41:12-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/Cyber-Physical-Convergence-Using-Hybrid-Networks-Secure-Manufacturing-Floor/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/Eyes-on-the-Clock-How-Iris-Biometrics-Reinventing-Workforce-Accountability/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/smart-lobby-solutions-help-modernize-manufacturing/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/shifting-battleground-of-cybersecurity-risk-management-for-manufacturers/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/how-technology-could-help-prevent-common-workplace-injuries/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-what-does-ai-for-critical-infrastructures/2025-08-01T11:26:17-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/sponsored-mototrbo-r5-portable-two-way-radios-smart-tough-ready-for-anything/2025-08-01T11:22:59-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/fast-facts/2025-08-01T08:53:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/Why-Iris-Biometrics-Shaping-Future-Border-Control/2025-10-01T07:29:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/the-new-security-imperative-converging-physical-and-cyber-identity-management/2025-10-01T07:29:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-beyond-access/2025-10-01T07:29:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-the-changing-landscape-of-the-physical-security-industry/2025-10-03T09:16:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/five-key-steps-of-effective-digital-identity-risk-management/2025-10-01T07:29:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/sponsored-fom-rigid-to-resilient/2025-10-03T09:00:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/closing-the-gap-integrating-identity-into-your-detection-and-response-strategy/2025-10-01T07:29:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/6-Methods-to-Use-for-Identity-Verification/2025-10-01T07:29:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/Frictionless-Access/2025-10-10T14:28:37-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/Security-That-Serves-Students-Smart-Screening-in-K-12-Environments/2025-12-01T14:38:50-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/security-by-design-enhancing-human-judgement-in-an-ai-enabled-world/2025-12-02T09:34:36-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/essential-security-strategies-threat-of-chemical-attacks/2025-12-01T07:48:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/The-Data-Centers-Hidden-Security-Divide/2025-12-01T07:48:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/The-Two-Types-of-Radiation-Security-Screening-Equipment-Relies-On/2025-12-01T07:48:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/strategies-to-upgrade-or-retrofit-existing-data-center-security-systems/2025-12-01T07:48:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/mitigating-the-insider-threat-with-integrated-turnstiles-and-metal-detectors/2025-12-01T07:48:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/dreaming-of-gadgets-and-the-drone-revolution/2022-02-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/the-critical-role-of-c-uas-in-perimeter-security-systems/2022-02-01T06:00:11-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/human-centered-robots-and-the-future-of-security/2022-02-01T06:00:13-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/developing-best-practices-for-shooting-down-drones/2022-02-01T09:57:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/how-automation-is-making-security-more-attainable-for-smbs/2022-02-01T09:57:19-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/robotics-and-their-place-in-securityare-they-inevitable/2022-02-01T06:00:11-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/On-the-Road-to-Connectivity/2022-02-04T13:43:27-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/New-Research-Seeks-to-Understand-Security-System-Integration/2022-02-03T16:32:30-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/mass-communication-capabilities-help-healthcare-facilities-manage-physical-security-threats/2022-11-30T12:15:59-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/ushering-in-a-new-era-of-intercoms-for-mass-notification/2021-02-01T14:04:51-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/human-senses-and-the-importance-of-audio-in-2021/2021-02-01T14:04:30-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/mass-notification-systems-and-the-need-for-preparedness/2021-12-15T15:28:14-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/the-2021-state-of-access-control-report/2021-02-01T14:03:24-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/hardening-the-perimeter-the-role-of-the-guard-booth-security-solutions-and-best-practices/2021-02-01T14:02:25-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/Avoiding-Alert-Fatigue-with-Strategic-Notifications/2023-02-23T09:32:56-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/efficient-communication-is-crucial-in-a-crisis/2021-02-09T14:18:45-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/the-perils-and-promises-of-the-imitation-game/2021-04-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/where-we-stand-with-ai/2021-04-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/four-ways-natural-language-processing-will-accelerate-digital-transformation2/2021-04-01T16:27:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/three-markets-that-can-benefit-from-smart-surveillance/2021-04-01T06:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/beyond-classification-an-apartheid-informed-approach-to-combating-facial-recognition-bias/2021-04-01T06:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/how-large-unrest-events-can-distract-you-a-guide-on-wading-through-the-noise/2021-04-01T06:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/introducing-ai-enabled-incident-management/2021-04-01T06:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/speco-infographic/2021-04-01T06:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/breaking-down-the-pros-and-cons-of-ai-in-cybersecurity/2024-01-08T10:33:49-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/sunshine-through-the-clouds-ai-and-the-security-professional/2021-04-01T06:00:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/how-a-mining-company-is-using-ai-to-keep-employees-safe-onsite/2021-04-01T06:00:12-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/The-AI-Race-is-On/2022-04-07T14:22:25-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/how-drones-are-enhancing-the-security-toolbox/2023-06-02T13:50:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/a-global-disconnect-regulation-of-commercial-privacy-practices-and-government-surveillance/2021-06-01T08:43:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/strengthening-surveillance-through-open-standards/2021-06-01T08:43:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/three-cybersecurity-risk-issues-to-consider-with-surveillance-systems/2023-02-23T09:35:23-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/law-enforcement-based-surveillance-a-reasonable-approach/2021-06-03T09:02:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/olymbec-chooses-hanwha-to-secure-properties-improve-rentability/2021-06-01T08:43:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/turbulent-times-create-new-waves-in-public-safety-surveillance-trends/2021-06-01T08:43:52-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/facial-recognition-considerations-to-make-before-deployment/2021-06-01T08:43:53-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/The-Rise-of-The-Surveillance-State/2023-12-13T10:56:39-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/Deploying-New-Software-Technology-to-Address-Todays-Security-Challenges/2021-06-02T13:18:08-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/protecting-the-bulk-power-system-a-connection-at-a-time/2021-08-01T09:37:03-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/never-assume-key-learning-from-the-colonial-pipeline-attack/2021-08-01T09:37:03-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/an-energy-companys-approach-to-proactive-critical-infrastructure-security/2021-08-01T09:37:04-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/financial-institutions-reap-the-benefits-by-forging-trusted-partnerships/2021-08-01T09:37:04-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/Armed-with-Cloud-Security-Pros-Do-More-with-Less/2021-08-03T13:32:59-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/Stop-holding-on-to-an-outdated-access-control-system/2021-08-01T09:37:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/usb-cyber-threats-are-on-the-rise.-heres-what-you-can-do-to-stop-them/2021-08-01T09:37:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/attacks-on-critical-infrastructures-are-rising.-is-president-bidens-executive-order-the-solution/2021-08-01T09:37:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/Securing-Financial-Institution/2021-08-02T14:09:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/creating-a-roadmap-to-achieve-critical-infrastructure-protection/2022-04-25T08:40:28-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/toasting-with-caution/2021-08-01T09:37:06-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/the-next-big-target-for-cyberattack-agriculture-and-the-supply-chain/2021-08-01T09:37:07-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/building-a-more-secure-and-efficient-federal-enterprise/2021-08-01T09:37:07-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/help-wanted-why-young-professionals-should-consider-a-career-in-critical-infrastructure-security/2021-08-09T17:34:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/an-increasingly-connected-ics-highlights-from-dragos-2020-year-in-review/2021-08-02T11:47:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/Mobilizing-to-Reduce-the-Strain-of-Climate-Change/2023-05-26T13:21:30-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/mission-almost-impossible-siting-infrastructure-in-an-unpredictable-world/2021-08-02T17:41:31-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/Specos-NDAA-Compliant-NRN-NVR-WNRN/2021-08-03T17:10:03-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/dallas-police-hq-installs-new-layer-of-perimeter-security/2021-10-01T06:30:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/how-temporary-barriers-are-changing-event-security-strategies/2021-10-01T06:30:47-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/protecting-a-new-perimeter/2021-10-01T06:30:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/drone-as-a-security-service-is-it-right-for-your-business/2021-10-01T06:30:44-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/perimeter-protection-thermal-as-a-technology-sentry/2021-10-18T12:28:32-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/are-you-on-the-path-to-better-security/2021-10-01T06:30:44-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/perimeter-security-going-beyond-the-fence/2021-10-01T06:30:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/Breaching-the-US-Capitols-Perimeter-Security/2022-04-22T13:36:38-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/unleashing-the-power-of-the-cannabis-security-team/2023-03-17T13:58:42-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/cannabis-security-a-field-of-opportunity/2024-01-17T17:35:42-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/justice-cannabis-relies-on-its-camera-infrastructure-to-keep-things-safe-secure-legal/2023-03-17T13:58:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/the-high-value-of-making-cannabis-operations-more-intelligent/2023-03-17T13:57:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/laying-the-foundation-security-by-design-for-the-marijuana-marketplace/2023-03-17T13:57:43-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/developing-a-better-detection-method/2023-03-17T13:57:27-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/fast-facts-for-a-budding-market/2023-03-17T13:57:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/security-snapshot-state-of-the-cannabis-industry/2023-03-17T13:57:09-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/from-seed-to-sale-elevating-your-cannabis-operation-with-surveillance/2023-03-17T13:56:58-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/High-Potential-the-Marijuana-Market-Embraces-Technology/2023-03-27T10:20:52-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/Are-You-Who-Your-Credentials-Say-You-Are/2022-04-05T14:19:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/here-to-help-smart-cities-tech-aids-first-responders/2022-06-01T07:35:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/how-to-get-community-support-for-public-safety-technology/2022-06-01T07:35:53-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/ZBetas-7-Step-Playbook-Successful-corporate-campus-design/2022-06-01T07:58:18-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/the-future-of-data-center-design/2022-06-01T07:35:52-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/a-hole-in-one-for-memorial-park-in-houston/2022-06-28T15:19:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/the-all-too-dumb-world-of-smart-cities-technology/2022-06-01T07:35:50-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/the-promise-of-digital-twins-and-the-virtualization-of-the-physical-world/2022-06-01T07:35:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/driving-the-smart-city-revolution-with-ai-enabled-analytics/2022-06-01T07:35:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/leveraging-transportation-data-for-safety-and-operations/2022-06-01T07:35:48-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/unifying-communications-for-a-stronger-security-posture-in-the-healthcare-setting/2022-06-01T07:35:47-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/make-way-for-the-metropolis/2022-07-25T14:25:41-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/Smart-Public-Safety-The-Evolution/2022-06-01T07:35:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/Winsted-introduces-new-Vue-workstations-and-Sightline-consoles/2022-06-01T07:59:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/ADT-Benefits-of-humanoid-robotics-in-guarding/2024-01-02T11:40:48-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/how-emerging-technology-will-revolutionize-enterprise-security-and-the-work-environment/2022-08-01T09:41:37-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/video-analytics-10-action-items-to-prepare-your-campus-for-installation/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/protecting-lone-workers-lessons-from-helzberg-diamonds-and-sally-beauty/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-imperative-to-integrate-security-and-privacy-on-modern-campuses/2022-08-01T09:40:06-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/access-chaos-the-overlooked-security-concern-creating-dangerous-risks-on-your-campus/2022-08-01T09:39:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/beyond-vape-detection-texas-school-district-adopts-smart-sensor-system-to-improve-student-safety/2022-08-01T09:39:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/identity-management-end-users-share-lessons-learned-during-covid-19-pandemic/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/closing-the-critical-gap-in-active-shooter-response/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/mobile-access-migration-what-you-need-to-know/2022-08-01T09:37:45-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/Rethinking-Recruitment-in-Security/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/four-things-to-consider-when-choosing-your-credentials/2022-08-01T09:36:21-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/the-role-of-technology-in-training-preventing-and-responding-to-active-shooters/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/How-to-be-Successful-in-Corporate-Security-Management/2022-08-01T07:32:23-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/NRN-Series-are-NOW-UL-2900-Listed/2022-08-01T07:32:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/Creating-Smarter-Schools-with-Smart-Video-Surveillance-Solutions/2022-08-01T07:32:23-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/systemic-failures-investigation-reveals-shortcomings-of-uvalde-school-shooting-response/2022-08-01T09:34:04-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/Whos-Liable-for-an-Active-Shooter/2023-12-20T11:32:49-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/Fast-Facts-School-Security-Snapshot/2023-04-05T08:59:21-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/The-Evolving-Tactics-of-BEC-Attacks/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Why-Mergers-and-Acquisitions-Dont-Need-to-be-a-Security-Professionals-Nightmare/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Hardening-Security-Infrastructure-Against-Attacks/2022-10-24T11:09:22-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/employees-the-first-line-of-defense-against-cyberattacks/2024-01-02T11:15:26-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/cyber-insurance-hard-market-turns-brittle/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Your-Cyber-Response-Plan-Needs-These-6-Components/2023-01-30T15:40:48-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Software-as-a-Service-Applications-Create-a-Growing-Attack-Surface/2022-10-11T12:54:33-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Key-Learnings-from-Log4Shell/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/going-nuclear/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/pen-tested-by-a-hacker-what-to-believe/2023-10-31T20:51:06-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Fast-Facts-Data-Protection/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/NRN-Series-are-NOW/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Availability-First-Achieves-More-Positive-Outcomes-Its-a-Mindset/2022-10-01T08:34:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Be-Cyber-Aware-ASIS-Resources-to-Aid-Your-Organization/2022-10-03T13:42:53-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/Three-Key-Considerations-for-Building-Threat-Assessments/2022-10-03T13:14:08-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/The-Physical-Ramifications-of-Cyber-Response/2022-10-03T17:53:31-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/Houston-is-Building-Disaster-Resilience-with-Video-Technology/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/do-you-need-resilient-surveillance-systems-start-with-server-storage-and-network-infrastructure/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/The-Efficiency-Coefficient-How-Companies-Can-Approach-Sustainability/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/A-Heat-Dome-Hits-Virginia-The-Data-Center/2023-02-28T15:19:54-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/resilient-enterprise-tech-can-help-boost-your-companys-sustainability-efforts/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/Restoring-Resilience-The-Notre-Dame-Cathedral-Recovery/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/A-Heat-Dome-Hits-Virginia-The-Initial-US-Government-Report/2023-02-28T15:20:25-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/A-Heat-Dome-Hits-Virginia-Things-Fall-Apart/2023-02-28T15:21:39-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/11-resilience-stories-sm-editors-recommend/2022-12-01T06:00:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/Sustainability-in-the-Security-Industry/2022-12-02T10:46:20-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/The-Art-of-Resilience/2022-12-08T16:00:25-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/advances-in-touchless-biometric-technology-drive-leap-from-legacy-access-control-systems/2021-12-01T06:00:13-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/facial-recognition-in-the-us-privacy-concerns-and-legal-developments/2023-12-13T11:19:00-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/how-biometric-technology-is-making-airports-in-south-america-safer/2021-12-01T06:00:15-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/using-smart-technology-to-promote-employee-safety-and-security/2022-04-22T13:32:08-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/robotic-vessels-roam-the-seas/2021-12-03T15:29:38-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/facial-recognition-technology-the-good-the-bad-and-the-future/2024-01-02T12:24:24-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/global-enterprises-ramp-up-trusted-access/2021-12-03T15:28:44-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/facial-recognition-freeze-frame/2024-01-02T11:39:10-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/reaching-the-remote-with-fingerprint-biometrics/2021-12-03T15:27:45-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/government-facial-recognition-threatens-our-rights-to-free-speech-and-protest/2022-11-11T11:06:34-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/Securing-Financial-Institution/2021-12-03T15:31:05-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/facial-biometrics-101-with-the-asis-sasc/2021-12-03T15:26:33-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/Moving-the-Chains-Lessons-Learned-to-Effectively-Manage-Our-Supply-Chain/2023-02-01T13:29:09-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/Securing-the-Future-of-Open-Source-in-the-Software-Supply-Chain/2023-02-01T13:30:48-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/Expanding-Our-Supply-Chain-Risk-Management-Beyond-Data/2023-02-01T13:32:13-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/keeping-the-supply-chain-on-track/2023-02-01T13:38:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/The-Cyber-Workforce-Shortage-Hinders-Healthcare-Supply-Chain-Security/2023-02-01T14:14:32-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/six-ict-supply-chain-risks-to-watch-out-for/2024-01-12T11:00:58-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/template-article32/2023-02-01T13:35:08-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/Privileged-Access-Management/2023-02-01T13:34:33-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/can-SBOMs-save-the-software-supply-chain/2023-02-01T13:33:56-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/How-Ticketing-Technology-Securely-Streamlined-the-World-Cup-Fan-Experience/2023-02-01T14:03:47-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/The-New-Normal-of-Risk-Goes-Back-to-Basics/2023-02-01T13:29:03-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/biometrics-and-gdpr/2020-06-23T19:17:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/sectech-intrusion-detection/2020-06-23T19:17:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/hey-security/2020-06-23T19:17:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/indispensable-for-dispensaries/2020-06-23T19:17:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/the-critical-role-of-the-intelligent-soc/2020-06-23T19:17:16-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/march/smart-city-embraces-stanley-service-solution/2019-08-20T09:32:47-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/march/the-future-of-office-security/2019-08-20T09:32:09-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/march/what-is-open/2019-08-20T09:30:00-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/march/the-benefits-of-being-smart/2019-08-20T09:29:16-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/march/time-and-attendance-systems-call-on-security/2020-06-23T19:50:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/march/chicago-chinatown-chamber-of-commerce-chooses-hikvision-surveillance-system/2020-06-23T19:50:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/march/security-and-smart-buildings/2020-06-23T19:50:20-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/march/force-multiplier/2020-06-23T19:50:21-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/june/safety-and-low-frequency-alarms/2019-08-20T09:21:18-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/june/supply-chain-company-makes-access-control-a-priority/2019-08-20T09:18:23-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/june/taking-off/2019-08-20T09:14:12-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/june/top-five-challenges-in-healthcare/2020-06-23T19:50:12-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/creating-an-even-playing-field/2020-06-23T19:50:00-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/making-moves-to-the-cloud/2020-06-23T19:50:01-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/To-Evolve-Our-Industry-Must-Choose-Common/2020-06-23T19:50:03-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/the-responsible-approach/2020-06-23T19:50:04-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/using-biometrics-to-enable-privacy/2020-06-23T19:50:11-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/whos-responsible-for-protecting-our-privacy/2020-06-23T19:50:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/making-gains-with-security/2020-06-23T19:50:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/saving-face/2020-06-23T19:50:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/how-it-innovations-are-changing-the-security-market/2019-08-15T14:34:29-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/team-software/2019-08-15T14:19:47-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/the-end-benefits-of-remote-monitoring-and-services/2019-08-15T14:31:43-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/reduce-risk-with-regular-system-audits/2019-08-15T14:29:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/sha-maison-smart-community-powered-by-mivatek-cloud/2019-08-15T14:27:32-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/an-ai-state-of-mind/2019-08-24T09:51:18-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/five-ways-vms-solutions-enhance-municipal-surveillance/2019-08-15T14:22:50-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/purple-parking-improves-fleet-management-with-key-management-solutions/2019-08-15T14:17:21-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/risks-of-the-new-ride/2019-08-24T16:04:43-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/securing-complex-aviation-environments/2019-08-12T17:22:34-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/world-class-security-small-town-feel/2019-08-13T10:12:26-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/top-five-challenges-for-managing-cybersecurity-risk/2019-08-12T17:19:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/building-the-control-room-of-tomorrow/2019-08-12T17:17:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/data-driven-traffic-management-solutions/2019-08-22T15:51:46-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/a-new-generation-of-innovation/2020-06-23T19:51:50-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/an-integrated-approach/2020-06-23T19:51:51-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/security-in-a-5g-world/2020-06-23T19:51:52-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/the-faults-in-5g/2020-06-23T19:51:53-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/Five-Facts-on-5G/2020-06-23T19:51:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/Vetting-Your-Vendors/2020-06-23T19:52:05-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/locking-down-identities-in-the-cloud-era/2020-06-23T19:53:24-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/physical-identity-access-management-solutions-for-all2/2020-06-23T19:53:26-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/is-your-organization-having-an-identity-crisis/2020-06-23T19:53:26-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/three-technologies-are-driving-access-control-forward/2020-06-23T19:53:28-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/future-proof/2020-06-23T19:53:28-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/partnering-with-privacy/2020-06-23T20:54:27-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/csps-use-people-and-security-technology-to-be-business-enablers/2020-06-23T20:54:27-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/should-facial-recognition-be-banned/2020-06-23T20:54:27-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/the-impact-of-privacy-regulations-on-security-technology/2020-06-23T20:54:28-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/visitor-management-can-keep-people-safe-during-a-crisis/2020-06-23T20:54:29-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/enhancing-the-view/2020-06-23T20:54:29-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/facial-recognition-presents-an-opportunity/2020-06-23T20:54:33-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/automated-alerts-on-the-rise/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/robots-support-return-to-work-initiatives/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/smart-surveillance-contributes-to-employee-health-and-building-optimization/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/managing-a-soc-in-a-time-of-crisis/2020-08-27T12:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/thermal-cameras-will-help-facilities-reopen-in-a-covid-19-world/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/december/mobile-devices-ease-access/2020-12-01T10:02:32-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/december/now-is-the-time-to-convert-to-mobile-access/2020-12-01T08:11:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/december/unlock-the-future-seamless-access-control-is-more-important-than-ever/2020-12-01T08:11:28-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/december/mobile-access-and-location-services-technologies-create-safe-and-trusted-campus-experiences/2020-12-01T08:11:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/Iran-Blames-Israel-and-Internal-Security-Breaches-on-Slaying-of-Nuclear-Scientist/2020-12-01T13:21:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/un-report-finds-climate-disasters-driving-risk/2020-12-02T12:42:33-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/Philabundance-$1million-food-scam/2020-12-03T13:36:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/California-Announces-Major-New-COVID-19-Prevention-Measures/2020-12-04T09:11:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/peaceful-security-law-protests-hijacked-in-france/2020-12-07T10:07:50-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/Robot-Dogs-Set-to-Augment-Air-Force-Base-Security/2020-12-08T10:48:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/new-zealand-eyes-reforms-after-christchurch-attack-report/2020-12-09T10:30:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/fort-hood-sexual-harassment-investigation/2020-12-10T13:34:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/US-Agencies-Warn-of-Cyber-Actors-Targeting-Educational-Institutions/2020-12-11T11:30:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/us-agencies-warned-of-widespread-cyberespionage-hack/2020-12-14T09:58:19-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/Vaccine-Successes-Belie-Long-Road-Ahead/2020-12-15T13:15:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/defense-bill-requires-surveillance-cameras-cruise-ships/2020-12-16T09:11:25-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/dragos-ibm-ransomware-report/2020-12-17T09:47:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/Biden-Vows-Substantial-Costs/2020-12-18T13:01:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/new-virus-strain-triggers-uk-lockdowns-travel-bans/2020-12-21T10:04:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/New-Group-to-Combat-Scourge-of-Ransomware/2020-12-22T13:28:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/operational-challenges-in-asia-long-term-security-risks/2020-12-23T09:48:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/december/happy-holidays/2020-12-24T08:00:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/britain-considers-new-rules-terrorism-convicts/2020-06-23T19:53:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Convergence-Drivers-Conditions-Point-to-Increased-Physical-and-Cyber-Security-Integration/2020-06-23T19:53:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Bus-Security-Questioned-After-California-Shooting/2020-06-23T19:53:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/FBI-Director-Says-Russia-Maintains-Information-Warfare/2020-06-23T19:53:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Watchdog-Finds-CISA-Election-Strategy-Incomplete/2020-06-23T19:53:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/israeli-voter-data-leaked/2020-06-23T19:53:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/US-Charges-Chinese-Army-Personnel-in-2017-Equifax-Breach/2020-06-23T19:53:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Automation-and-IT-Security/2020-06-23T19:53:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/facial-recognition-backlash/2020-06-23T19:53:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/DOJ-Charges-Huawei-With-Trade-Secret-Theft/2020-06-23T19:53:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Five-Things-Security-Professionals-Should-Keep-in-Mind-as-Coronavirus-Spreads/2025-05-07T12:42:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/AI-Robot-on-Patrol/2020-06-23T19:53:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Motel-Settles-Lawsuit-with-Human-Trafficking-Survivor/2020-06-23T19:53:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/United-States-Britain-Link-Russian-GRU-Unit-to-Sandworm/2020-06-23T19:53:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/italy-cuts-venice-carnival-short-over-coronavirus-concerns/2020-06-23T19:53:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Spotlight-on-US-Government-Use-of-AI/2020-06-23T19:53:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Coronavirus-Spreading-Outside-China/2020-06-23T19:53:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/february/Molson-Coors-Shooting/2025-05-07T12:43:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/march/2020-03-01T08:57:46-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/june/2020-06-01T06:57:59-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/september/2020-12-01T08:53:42-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2020/december/2020-12-01T08:11:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/facing-covid-surge-england-reenters-lockdown/2020-11-02T08:56:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/Terror-Attacks-Ring-Out-on-Monday/2020-11-03T10:44:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/terrorists-ramp-up-recruitment-propaganda-efforts/2020-11-04T09:36:18-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/100000-new-corona-cases-in-US/2020-11-05T13:59:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/As-Vote-Tallies-Are-Finalized-Election-Misinformation-Spreads/2020-11-06T13:04:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/hurricane-eta-carves-destructive-path/2020-11-09T10:32:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/Pandemic-Lessons-Learned-Supply-Chain-Resilience/2020-11-10T12:09:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/security-history-whitey-bulger-sentencing/2020-11-15T10:19:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/mozambique-beheadings/2020-11-12T13:39:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/US-Capitol-Prepares-for-Pro-Trump-Protests-Potential-Unrest/2020-11-13T09:22:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/covid19-vaccine-progress-sparks-excitement/2020-11-16T10:03:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/Hate-Crimes-Rise-in-U-S/2020-11-17T12:59:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/top-us-cybersecurity-official-fired/2020-11-18T11:03:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/Court-Filings-Unveil-Disturbing-New-Details-in-Plot-Against-Michigan-Governor/2020-11-19T13:46:34-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/CISA-Releases-New-Guidance-On-Insider-Threat-Prevention-Mitigation/2020-11-20T12:03:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/weather-chills-covid-infections-spike/2020-11-23T11:36:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/Apple-Security-Chief-Two-Officers-Charged-in-Bribery-Scheme/2020-11-24T10:20:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/iot-cybersecurity-bill-passes-us-congress/2020-11-25T10:51:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/november/baltimore-county-schools-ransomware/2020-11-30T10:37:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Preparations-Ineffective-as-COVID-19-Cases-Spike-on-Campus/2020-09-01T13:00:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/pentagon-report-china-nuclear-missile-forces/2020-09-02T09:48:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/russia-again-targeting-american-elections/2020-09-03T12:11:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/OMB-Instructs-US-Agencies-To-Implement-VDPs/2020-09-04T12:13:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Purported-Boogaloo-Bois-Charged-with-Supporting-Foreign-Terrorist/2020-09-08T14:19:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/ransomware-attack-derails-school-opening/2020-09-09T10:27:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Former-Gynecologist-charged-with-sexual-abuse/2020-09-10T13:02:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Portland-Bans-Private-Use-of-Facial-Recognition-Technology/2020-09-11T11:12:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/security-history-christiana-riot/2020-09-17T16:58:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/wildfires-blaze-across-us-states/2020-09-14T11:11:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/security-history-arming-the-ira/2023-12-15T16:27:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Is-Implicit-Bias-Training-in-Law-Enforcement-Successful/2022-04-07T14:53:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/catastrophic-flooding-hurricane-sally/2020-09-16T10:26:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/security-history-wall-street-bombing/2020-09-17T16:53:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/congressional-report-on-737s/2020-09-17T14:08:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/security-history-purple-cipher/2023-06-23T11:48:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/Drug-Companies-Release-Blueprints-For-Coronavirus-Vaccine-Trials/2020-09-18T09:03:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/suicide-rates-military-on-the-rise/2022-04-21T16:33:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/A-Look-at-the-Cyber-Criminal-Marketplace/2025-05-07T12:37:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/september/violent-crime-decreased-2019-fbi-reports/2020-09-30T10:48:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/thousands-protest-pandemic-restrictions-in-berlin/2020-08-03T11:01:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Hurricane-Slams-East-Coast/2020-08-04T11:08:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/prisoners-at-large-jail-seige/2020-08-05T10:51:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/turkish-domestic-violence-protests/2020-08-06T13:27:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Trump-Restricts-WeChat-and-TikTok-Escalating-Tensions-With-China/2020-08-07T11:33:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/lebanon-protests-explosion/2020-08-10T09:53:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/School-Safety-Has-a-New-Meaning/2020-08-11T13:23:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/long-term-covid-employment-impacts/2020-08-12T10:17:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/new-US-death-toll-high/2020-08-13T12:25:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Top-DHS-Officials-Not-Legally-Eligible-To-Serve-In-Current-Roles/2020-08-14T11:32:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/storms-worsen-wildfires-california/2020-08-17T10:36:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Legal-Implications-of-Detecting-and-Mitigating-Security-Threats-from-Drones/2020-08-18T11:50:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/mali-coup-border-closure/2020-08-19T10:36:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/belarus-president-pushes-back-against-protesters/2020-08-20T13:30:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Former-Uber-CSO-Charged-with-Covering-Up-Data-Breach/2020-08-21T11:33:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/snapback-sanctions-iran-tensions/2020-08-24T10:20:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/With-5G-Power-Comes-Heightened-Threat-Risk/2020-08-25T13:29:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/retail-workplace-violence-covid19/2020-08-26T13:30:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/brenton-tarrant-sentenced-to-life-in-prison/2020-08-27T11:59:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/Report-Details-Threat-of-Connections-Between-White-Supremacist-Groups-and-Law-Enforcement/2020-08-28T12:48:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/august/paris-attack-accomplices-trial/2020-08-31T10:05:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/palm-oil-slave-labor/2020-10-01T12:49:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/NCSA-CISA-Kick-Off-Cybersecurity-Awareness-Month/2020-10-02T08:47:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/bombing-in-ink-alley/2020-10-02T08:40:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/countries-battle-spikes-covid/2020-10-05T09:50:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/security-history-first-american-train-robbery/2024-01-02T11:46:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/security-history-molly-maguires/2020-10-15T09:31:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Payment-Problems-Report-Documents-Struggle-to-Protect-Card-Data/2020-10-06T12:51:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/facebook-bans-qanon-groups-pages/2020-10-07T10:41:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/ISIS-Militants-Charged-With-Deaths-of-American-Hostages/2020-10-08T12:25:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/FBI-Thwarts-Plot-to-Kidnap-Michigan-Governor/2020-10-09T11:45:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Food-Tampering-Cases-Illustrate-Classic-Insider-Threat-Risks/2020-10-13T12:26:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/covid-death-rates-outstrip-other-countries/2020-10-14T10:40:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/princeton-wage-gap-settlement/2020-10-15T13:43:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Crisis-Group-Highlights-Risk-of-Electoral-Violence-in-the-United-States/2020-10-16T14:12:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/teacher-murder-sparks-protests-radicalization-investigations/2020-10-19T11:50:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/US-Charges-Russians-for-Most-Destructive-Cyberattack-in-History/2020-10-20T13:09:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/police-brutality-protests-escalate-nigeria/2020-10-21T10:25:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/thousands-of-women-abused-by-deepfake-porn-bot/2022-04-19T14:40:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/goldman-sachs-to-pay-record-fine-to-resolve-bribery-investigation/2020-10-23T13:38:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Spain-Initiaties-a-Curfew-as-COVID-19-Cases-Rise/2020-10-26T12:04:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Preparing-for-Post-Election-Civil-Unrest/2020-10-27T10:54:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/facebook-bans-new-political-ads/2020-10-28T12:10:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/US-Agencies-Issue-Warnings-As-Ransomware-Hits-Healthcare-Institutions/2020-10-29T11:25:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/october/Extremist-Attacks-Continue-in-France/2020-10-30T13:34:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/carding-operator-guilty/2020-06-29T10:48:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/us-protests-escalate/2020-06-23T20:54:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Trump-threatens-suppression-of-protests/2020-06-23T20:54:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/eu-covid19-midlevel-threat/2020-06-23T20:54:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/tropical-storm-cristobal/2020-06-23T20:54:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Demonstrators-Worldwide-Demand-Police-Reform/2020-06-23T20:54:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/protesters-tested-covid19/2020-06-23T20:54:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/IBM-Discontinues-Facial-Recognition-Business-to-Advance-Racial-Equality/2020-06-23T20:54:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/pandemic-recession-opioid-risk/2020-06-23T20:54:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/boko-haram-attack/2020-06-23T20:54:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Health-and-Economic-Destruction-from-Pandemic-Continues/2020-06-23T20:54:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/covid19-spikes-pause-reopening-plans/2020-06-23T20:54:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Report-Says-CIA-Was-More-Focused-on-Cyber-Offense-Than-Protecting-Its-Assets/2020-06-23T20:54:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/north-korea-border-tension/2020-06-23T20:54:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/pge-guilty-of-84-counts-involuntary-manslaughter/2020-06-23T20:54:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Demonstrations-Strikes-Planned-for-Juneteenth-Celebration/2020-06-23T20:54:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/brazil-covid19-death-rates/2020-06-23T20:54:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Terror-in-Europe-Attacks-Decline-in-2019/2020-06-23T20:54:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/covid19-cyber-risks/2020-06-25T13:48:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/arbery-killers-indicted/2020-06-25T13:45:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Symantec-Alerts-31-Customers-To-Cyberattacks/2020-06-26T11:38:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/june/Terrorists-Attack-Pakistans-Stock-Exchange/2020-06-30T10:16:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/hong-kong-security-law-effective/2020-07-01T11:50:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/covid19-scams-keep-evolving/2020-07-02T10:33:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/encrochat-crime-investigations/2020-07-06T10:32:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Murder-in-US-Increases-While-Other-Violent-Crime-Declines/2020-07-07T12:41:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/pandemic-changes-hit-workplace-culture/2020-07-08T10:50:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/religious-employers-can-deny-birth-control/2020-07-09T13:26:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/u.s.-secret-service-forms-single-cyber-fraud-task-force/2020-07-10T12:43:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/south-africa-resumes-alcohol-sales-ban-as-covid-19-cases-spike/2020-07-13T10:07:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Companies-Adopting-Artificial-Intelligence-Are-Concerned-About-the-Risks/2020-07-14T11:36:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/covid-containment-face-coverings/2020-07-15T10:49:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Twitter-Breach-Targets-High-Profile-Accounts/2020-07-16T15:16:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Some-Nations-Show-Signs-of-Success-Stopping-COVID-19-Spread/2020-07-17T12:43:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/monsoon-season-displaces-millions/2020-07-20T10:35:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Federal-Tactics-Questioned-in-Portland-Trump-Vows-Expansion-to-Other-Cities/2020-07-21T13:14:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/ip-theft-chinese-consulate-closure/2020-07-22T10:30:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/more-agents-deployed-to-US-cities/2020-07-23T14:23:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/EU-US-Data-Sharing-Agreements-in-Question/2020-07-24T12:47:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/guerrilla-fighters-covid-restrictions-colombia/2020-07-27T12:17:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/Mysterious-Seed-Packages-Mailed-to-Addresses-Across-the-US/2020-07-28T11:28:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/second-wave-coronavirus-comes-early/2020-07-30T10:44:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/hunger-food-insecurity-rising-sharply-worldwide/2020-07-30T12:31:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/july/EU-Issues-First-Sanctions-For-Cyberattacks/2020-08-01T07:42:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/earthquake-hits-Idaho/2020-06-23T19:54:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/Idaho-Becomes-First-State-to-Prohibit-Some-Transgender-Athletes/2020-06-23T19:54:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/Pandemic-Spread-Places-New-Pressure-to-Protect-Essential-Workers/2020-06-23T19:54:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/nations-change-guidance-on-cloth-face-masks/2020-06-23T19:54:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/Stimulating-the-Worlds-Economies/2020-06-23T19:54:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/menindors-funeral/2020-06-23T19:54:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/teleworking-security-tips-from-DOD/2020-06-23T19:54:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/syrian-government-behind-2017-chemical-attacks/2020-06-23T19:54:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/South-Koreans-Test-Positive-for-COVID-19-Again/2020-06-23T19:54:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/natural-disaster-pandemic/2020-06-23T19:54:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/A-Peek-Behind-the-Curtain-of-Hindu-Nationalism/2020-06-23T19:54:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/EU-coronavirus-roadmap/2020-06-23T19:54:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/improving-cyber-hygiene/2020-06-23T19:54:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/leaders-face-increasing-pressure-to-reopen-segments-of-the-economy/2020-06-23T19:54:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/amid-pandemic-mass-violence-threats-remain/2020-06-23T19:54:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/GAO-Report-on-Terrorism-Risk-Insurance-Act-The-Program-Has-Been-Effective/2020-06-23T19:54:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/China-fighting-more-covid-cases/2020-06-23T19:54:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/Global-Report-on-Food-Crises/2020-06-23T19:54:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/Task-Force-to-Issue-Best-Practices-on-COVID-19-and-Employee-Safety/2020-06-23T19:54:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/ppe-shortages-fuel-black-market-recalls-confiscations/2020-06-23T19:54:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/US-Homeland-Security-Investigations-Launches-Site-Outlining-Pandemic-Related-Fraud-Strategy/2020-06-23T19:54:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/virginia-county-body-cameras/2020-06-23T20:53:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/april/iran-arms-ban-extension/2020-06-23T20:53:58-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-university/2020-07-23T14:01:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-furniture-retailer/2020-08-14T16:04:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-clothing-retailer/2022-04-22T12:01:36-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-microfinance/2020-07-08T16:22:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-finance/2020-08-14T16:11:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-chemicals/2020-06-29T10:32:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-agriculture/2020-07-08T16:35:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-manufacturer/2020-06-23T20:53:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/covid-case-study-ngo/2020-07-23T14:01:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/tracking-covid19-response-across-industries/2021-05-12T13:32:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/key-takeaways-from-pandemic-response/2021-05-12T13:24:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/research/Final-Report-Resilience-Business-Continuity-and-COVID-19/2022-04-25T09:34:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/COVID-19-Could-Accelerate-Drastic-Workplace-Changes/2020-06-23T20:54:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/covid19-changes-criminal-landscape/2020-06-23T20:54:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/Security-Officer-Killed-After-Altercation-Enforcing-Face-Covering-Order/2025-05-07T12:38:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/FISA-surveillance-warrants-report/2020-06-23T20:54:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/security-history-victory-in-europe/2020-06-23T20:54:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/world-password-day/2020-06-23T20:54:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/Europe-and-United-States-Ease-COVID-19-Shutdown-Measures/2020-06-23T20:54:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/security-officers-covid19-death-rate/2020-06-23T20:54:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/During-a-Crisis-Its-All-About-the-People/2020-06-23T20:54:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/online-voting-concerns/2020-06-23T20:54:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/kabul-hospital-massacre/2020-06-23T20:54:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/Unrest-Over-Coronavirus-Response-Spreads/2020-06-23T20:54:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/japan-germany-sinking-into-recession/2020-06-23T20:54:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/pandemic-produces-stressed-workforce/2020-06-23T20:54:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/fbi-link-terrorism-pensacola-shooting/2020-06-23T20:54:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/cyclone-amphan-landfall/2020-06-23T20:54:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/Chinas-Actions-Toward-Hong-Kong-Cause-Concern-Protests/2020-06-23T20:54:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/conspiracy-theories-election-interference/2020-06-23T20:54:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/minneapolis-protests/2020-06-23T20:54:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/may/New-York-Allows-Businesses-To-Deny-Entry-to-Unmasked-Individuals/2020-06-23T20:54:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/covid-outbreak-possible-at-nursing-home/2020-06-23T19:53:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/tennessee-trampled-by-tornadoes/2020-06-23T19:53:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Securitys-Role-as-Coronavirus-Affects-Supply-Chain-and-Business-Continuity/2020-06-23T19:53:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Locusts-and-a-Lack-of-Rain/2020-06-23T19:53:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/WHO-Calls-for-Global-Push-to-Stop-Coronavirus-Spread/2020-06-23T19:53:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/protesters-march-against-gender-based-violence-in-mexico-city/2020-06-23T19:53:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/The-Oil-Feud-of-2020/2020-06-23T19:53:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Biodefense/2020-06-23T19:53:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Harvey-Weinstein-Receives-23-Year-Prison-Sentence-for-Sex-Crimes/2020-06-23T19:54:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Officials-and-Executives-Mandate-Closures-to-Flatten-the-Curve/2020-06-23T19:54:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/covid-19-lockdowns-travel-restrictions/2020-06-23T19:54:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Cyber-Criminals-Use-Wide-Array-of-Pandemic-Inspired-Methods/2020-06-23T19:54:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/utah-hit-by-earthquake/2020-06-23T19:54:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/250000-race-discrimination-lawsuit-settlement/2020-06-23T19:54:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/CISA-Releases-Guidance-on-Essential-Personnel-to-Coronavirus-Response/2025-05-07T12:39:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/india-lockdown-covid19/2020-06-23T19:54:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Warranty-Fraud/2020-06-23T19:54:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Man-Charged-with-Terror-Threat-for-Alleged-Coughing-Incident/2020-06-23T19:54:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Guilty-Plea-to-New-Zealand-Mosques-Attacks/2020-06-23T19:54:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/Coronavirus-Pandemic-Accelerating-at-an-Exponential-Rate-Straining-Healthcare-and-Security/2020-06-23T19:54:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/covid19-africa-food-security/2020-06-23T19:54:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/march/US-Proposal-to-Combat-Child-Pornography-Raises-Serious-Security-Concerns/2020-06-23T19:54:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/illinois-recreational-marijuana/2020-06-23T19:52:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/United-States-Launched-Drone-Strike-to-Kill-Iranian-General/2020-06-23T19:52:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/bushfires-stress-resources-in-australia/2020-06-23T19:52:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/US-States-Increase-Security-Funding-in-Response-to-Hate-Crimes/2020-06-23T19:52:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Iran-Bombs-US-Bases-in-Iraq/2020-06-23T19:52:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/voting-machines-still-hackable/2020-06-23T19:52:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Internal-Boeing-Messages-Mocked-737-MAX-Regulators/2020-06-23T19:52:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/united-states-marshal-robert-forsyth/2020-06-23T19:52:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Screening-Enhanced-for-Saudi-Military-Students-After-Shooting/2020-06-23T19:52:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/US-Government-Skeptical-of-Chinese-Made-Drones/2020-06-23T19:52:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Plane-Dumps-Fuel-Before-Landing/2020-06-23T19:53:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/more-gun-control-for-virginia/2020-06-23T19:53:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Suspected-Neo-Nazis-Arrested-Ahead-of-Gun-Rights-Rally/2020-06-23T19:53:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/An-Armed-Congregation/2020-08-25T11:06:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/deadly-coronavirus-spreads/2020-06-23T19:53:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/music-recording-academy-sexual-harassment/2020-06-23T19:53:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/China-Further-Restricts-Travel-To-Contain-Outbreak/2020-06-23T19:53:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/shays-rebellion/2020-06-23T19:53:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/insurance-rates-climb-after-chilean-protests/2020-06-23T19:53:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Spotlight-on-Data-Privacy/2025-05-07T12:44:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/African-Locusts-Threaten-Food-Security/2020-06-23T19:53:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Coronavirus-Infects-Over-8000-Worldwide/2020-06-23T19:53:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2020/january/Security-Measures-Ramp-Up-for-Super-Bowl-Weekend/2020-06-23T19:53:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/un-secretary-general-issues-global-warming-warning/2020-06-23T19:52:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/Your-Security-Career-May-Not-Follow-the-Path-You-Expect/2023-06-29T14:00:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/Deadly-Protests-in-Iran/2020-06-23T19:52:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/strikes-in-france-shut-down-eiffel-tower/2020-06-23T19:52:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/Uber-Release-First-US-Safety-Report/2020-06-23T19:52:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/investigators-search-for-motive-in-pensacola-shooting/2020-06-23T19:52:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/Hong-Kong-Protests-Hit-6-Month-Mark/2020-06-23T19:52:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/jersey-city-shooting/2020-06-23T19:52:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/U.S.-Troops-Might-Soon-be-Able-to-Sue-for-Medical-Malpractice/2020-06-23T19:52:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/retailers-see-rise-in-organized-retail-crime/2020-06-23T19:52:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/protests-in-india-expand/2020-06-23T19:52:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/How-Converged-Are-Corporate-Security-Functions/2020-06-23T19:52:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/opm-improves-cybersecurity-after-mega-breach-but-challenges-remain/2022-04-22T13:03:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/porch-piracy/2020-06-23T19:52:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/top-risk-forecast-for-2020/2020-06-23T19:52:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/dhs-recommendations-faith-based-organizations/2020-06-23T19:52:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/december/happy-holidays/2020-06-23T19:52:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/Voting-Village-Visits-DC-to-Raise-Election-Security-Awareness/2020-06-23T19:51:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/Opioid-Uses-Impact-on-the-Workplace/2020-06-23T19:51:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/AI-Commission-Charts-Pathway-Forward-for-US/2020-06-23T19:51:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/feds-warn-of-election-hacking/2020-06-23T19:51:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/extreme-smog-season-in-india/2020-06-23T19:51:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/most-school-attackers-showed-warning-signs/2020-06-23T19:51:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/Designing-a-Security-Function-that-Works/2020-06-23T19:51:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/us-intellectual-property-at-risk/2020-06-23T19:51:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/doj-rolls-out-plan-to-reduce-gun-violence/2020-06-23T19:51:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/lone-offender-terrorism-report/2020-06-23T19:51:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/hong-kong-campus-conflict/2020-06-23T19:51:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/What-Does-Successful-Risk-Management-Look-Like/2020-06-23T19:52:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/us-guarding-revenues-reach-$29-billion/2020-06-23T19:52:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/GM-Sues-Fiat-Chrysler-Alleging-Bribery/2020-06-23T19:52:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/Russia-Spreading-Ukraine-Based-Hacking-Theory/2020-06-23T19:52:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/france-announces-plan-to-address-domestic-violence/2020-06-23T19:52:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/Democrats-Unveil-Their-Preferred-Online-Privacy-Law/2020-06-23T19:52:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/november/D-C-Expanding-Camera-Program/2020-06-23T19:52:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Thought-Controlled-Drones/2019-10-30T08:58:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/fbi-releases-crime-statistics/2020-06-23T19:51:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/assessed-risk-in-hong-kong/2020-06-23T19:51:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/whistleblowing-misinformation/2020-06-23T19:51:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/officials-ask-facebook-to-halt-end-to-end-encryption-efforts/2021-04-16T10:21:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/the-extinction-rebellion/2020-06-23T19:51:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Watchdog-critiques-dea-role-in-opioid-crisis/2020-06-23T19:51:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/US-Election-Security-Challenges/2020-06-23T19:51:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/most-data-breaches-come-from-inside/2020-06-23T19:51:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/thousands-of-californians-without-power-due-to-public-safety-shutoff/2020-06-23T19:51:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Boards-and-Execs-Do-Not-See-Risk-the-Same-Way/2020-06-23T19:51:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Reported-US-Nukes-in-Turkey/2019-10-17T10:52:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Darknet-Child-Pornography-Website-Hosts-Indicted/2024-01-16T15:15:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Cyber-Awareness-Focuses-On-Individual-Action/2020-06-23T19:51:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/antisemitic-incidents-plots-remain/2020-06-23T19:51:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Warehouse-Automation-and-the-Effect-on-the-Workplace/2020-06-23T19:51:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Deadly-Chilean-Protests/2019-10-23T12:57:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/traveler-information-breach/2020-06-23T19:51:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Storming-SCIF-Causes-Security-Breach-on-Capitol-Hill/2020-06-23T19:51:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/security-history-special-agent-tom-white/2024-01-02T11:32:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/Allocation-of-Security-Resources/2020-06-23T19:51:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/October/California-Goats-vs-Wildfires/2020-06-23T19:51:33-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/march/2019-08-26T20:28:31-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/june/2019-08-26T20:37:02-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/September/2019-08-22T17:04:14-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2018/December/2019-08-22T16:15:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/2019-sees-roughly-twice-as-many-domestic-terrorism-cases-as-international/2020-06-23T19:50:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/facebook-opposes-fake-accounts/2020-06-23T19:50:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/national-campus-safety-awareness-month/2020-06-23T19:50:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/Judge-Says-US-Terrorism-Watchlist-is-Unconstitutional/2020-06-23T19:50:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/welcome-to-gsx-2019/2020-06-23T19:50:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/refinery-attacks-affect-global-oil-production/2020-06-23T19:50:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/New-Research-on-Corporate-Security-Incidents/2020-06-23T19:50:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/New-US-National-Security-Adviser-Named/2020-06-23T19:50:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/edward-snowdens-permanent-record/2020-06-23T19:50:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/Report-Finds-World-is-Unprepared-for-Next-Global-Pandemic/2020-06-23T19:50:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/hong-kong-protests-continue-to-escalate/2020-06-23T19:50:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/Enhancing-Travel-Risk-Management-Programs/2020-06-23T19:51:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/Global-Sea-Levels-Rising-Faster-Than-Expected/2020-06-23T19:51:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/app-sued-over-BIPA-violation/2020-06-23T19:51:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/egyptian-protests-break-out-again/2020-06-23T19:51:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/september/Disinformation-Campaigns-Affected-at-Least-70-countries/2020-06-23T19:51:06-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/the-changing-landscape-of-security/2019-08-14T11:12:22-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/integrating-robots-in-the-workplace/2019-08-14T11:11:43-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/cyber-trumps-physical-as-biggest-threat/2020-06-23T19:17:54-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/terror-attacks-are-down-but-deaths-are-up/2019-08-14T11:10:21-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/employees-lead-managers-facilitate/2019-08-14T11:09:42-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/a-transformative-tuesday-for-education/2019-08-14T11:09:08-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/the-gsx-2018-exhibit-hall--an-interactive-learning-lab/2019-08-14T11:08:31-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/chase-shares-his-vision-for-asis/2019-08-14T11:07:49-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/attendees-get-a-jump-start-on-gsx/2019-08-14T11:07:09-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/exceptional-volunteers-receive-top-award/2019-08-14T11:06:30-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/u.s.-ospas-reward-security-excellence/2019-08-14T11:05:47-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/zakaria-touches-on-turmoil/2019-08-14T11:05:06-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/a-day-devoted-to-education/2019-08-14T11:04:30-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/microsofts-howard-wins-don-a.-walker-award/2019-08-14T11:03:55-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/marquez-memorial-honoree-to-be-recognized/2019-08-14T11:03:19-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/keynotes-to-address-security-challenges/2019-08-14T11:02:47-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/welcome-to-gsx/2019-08-14T11:02:13-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/security-cares-focuses-on-school-safety/2020-06-23T19:17:54-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/asis-advances/2020-06-23T19:17:55-04:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018/esrm-update-new-education-guidelines-and-maturity-model/2020-06-23T19:17:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/breaking-news-coverage/mass-shooting-at-new-zealand-mosques-leaves-numerous-dead-injured/2019-08-30T11:29:14-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/shooting-at-borderline-bar-in-thousand-oaks-california/2020-06-23T19:17:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/pittsburgh-shooting-updates-and-asis-houses-of-worship-resources/2020-06-23T19:17:52-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/multiple-people-shot-in-maryland-newsroom/2020-06-23T19:17:58-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/multiple-fatalities-in-texas-school-shooting/2020-06-23T19:18:00-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/deadly-toronto-vehicle-attack-what-we-know/2019-08-30T11:29:14-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/shooting-at-maryland-high-school-leaves-one-dead-sro-ends-threat/2020-06-23T19:18:03-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/breaking-news-coverage/multiple-fatalities-reported-at-south-florida-high-school-shooting/2020-06-23T19:18:07-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/breaking-news-coverage/live-updates-las-vegas-shooting/2019-08-30T11:27:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/Man-Who-Broke-into-Pelosi-House-Faces-Federal-Charges/2022-11-01T13:28:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/nine-mass-shootings-halloween-weekend/2022-11-09T11:12:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/november-legal-roundup/2022-11-03T13:42:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/manchester-inquiry-emergency-response-badly-wrong/2024-01-02T11:07:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/cdc-finds-alcohol-deaths-spiked-covid-pandemic/2022-11-08T12:06:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/US-Election-Day-Commences-with-Plenty-of-Tumult/2022-11-09T11:08:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/polish-police-europol-child-abuse-sting/2022-11-09T11:54:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/cyber-extortionists-release-sensitive-medical-records-ransomware-attack/2022-11-10T11:54:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/turkish-authorities-search-for-bombing-perpetrators/2022-11-14T12:29:40-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/Threat-Management-Team-Was-Investigating-Alleged-UVA-Shooter/2022-11-15T12:54:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/twitter-verification-impersonation-misinformation-reputational-risk/2022-11-21T07:49:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/speak-out-act-bill-passes-Congress/2022-11-17T13:55:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/World-Cup-Watch/2022-11-18T12:08:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/investigators-assess-LGBTQ-club-shooting-hate-crime/2022-11-21T12:08:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/Recent-Shootings-Call-Into-Question-Efficacy-of-Red-Flag-Laws/2022-11-22T13:56:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/insurgency-in-sahel-risks/2022-11-23T12:19:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/fcc-announces-authorization-ban/2022-11-29T15:23:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/Authorities-Dismantle-Super-Cartel-Operation-in-Europe/2022-11-30T11:04:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/november/Strange-Security-Santa-Is-Stolen-Taxidermied-Human-Foot-Almost-10000-Minks-and-More-Stories/2022-12-01T08:37:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Indonesia-Creates-Commission-To-Investigate-Soccer-Match-Tragedy/2022-10-06T08:37:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Banks-Face-Pressure-Over-Zelle-Payment-System/2022-10-04T13:25:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/security-provider-settles-discrimination-allegations/2022-10-05T11:40:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/joe-sullivan-conviction/2022-10-06T11:37:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/investigation-organized-crime-corrupt-port-workers/2022-10-07T12:41:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/maternity-fertility-benefits-to-retain-and-attract-talent/2022-10-11T12:56:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/revenge-missile-strikes-ukraine/2022-10-17T08:35:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/sandy-hook-families-win-defamation-suit/2022-10-13T12:41:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/New-Restrictions-on-US-Intelligence-Agencies-Reignite-EU-Data-Sharing-Effort/2022-10-14T12:26:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/haitian-security-health-safety-grows-dire/2022-10-17T12:18:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Chinese-President-Xi-Hails-the-Progress-He-Has-Made-Western-Nations-Respond-with-Warnings/2022-10-18T12:30:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/new-york-mass-shooter-followed-footsteps-previous-attackers-online/2022-10-19T12:10:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/tsa-cyber-rail-rules-2022/2022-10-20T12:47:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Ukraine-Update-Zelensky-Says-Russia-Plans-to-Destroy-Dam/2022-10-21T13:36:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/too-stressed-to-function/2022-10-24T09:59:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/FTC-Proposes-Holding-Drizly-CEO-Accountable/2022-10-25T10:46:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Sweet-Little-Lies/2022-10-26T12:27:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/legal-update-mass-attackers/2022-10-27T11:55:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/election-workers-face-wave-of-threats/2022-10-28T12:18:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/october/Strange-Security-Man-Bites-Dog-Woman-Unleashes-Bee-Attack-and-Oh-Yes-Power-Rangers/2022-10-31T15:38:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Mass-Shooting-Liability-Uvalde-Chesapeake-Survivors-and-Victims-File-Lawsuits/2022-12-06T10:28:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/China-to-Ease-Some-COVID-19-Restrictions/2022-12-02T10:48:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Gunshots-Damage-Two-North-Carolina-Substations/2022-12-05T12:28:29-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/One-in-Five-Workers-Worldwide-Experienced-Workplace-Violence-or-Harassment/2022-12-06T12:49:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/german-authorities-detain-alleged-far-right-extremists-aiming-to-topple-government/2022-12-07T11:32:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Griner-released-from-Russian-penal-colony/2022-12-08T12:51:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/New-Research-Identifies-Weaknesses-in-Policies/2022-12-09T11:35:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/mass-shooter-attacks-resident-committee-meeting-in-rome/2022-12-12T11:28:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/FBI-Hate-Crimes-Report-Plagued-by-Lack-of-Data/2022-12-13T14:18:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/french-court-convicts-eight-nice-terrorism-attack/2022-12-14T12:06:42-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/mass-protests-in-Peru/2022-12-15T13:18:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Kyiv-Initiates-Emergency-Blackout/2022-12-16T12:38:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/opportunistic-terrorists-adapt-UN-warns/2022-12-19T12:16:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Rapid-Growth-of-Sextortion-Targeting-Teenage-Boys-Alarms-Authorities/2022-12-20T10:59:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/china-hit-hard-wave-covid-infections/2022-12-21T12:37:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/december/Zelenskyy-visits-DC-gets-Patriot-defense-system/2022-12-22T12:10:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Strange-Security/2023-01-03T12:29:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/substation-attacks-heighten-scrutiny-electric-grid-risks/2023-01-04T13:06:34-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/nye-german-riots/2023-01-05T12:49:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Lawmakers-Mark-Second-US-Capitol-Attack-Anniversary/2023-01-06T12:30:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Authorities-Arrest-Hundreds-After-Mob-Storms-Government-Buildings-in-Brasilia/2023-01-09T12:30:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/German-Authorities-Detain-Suspects/2023-01-11T11:11:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Storms-Continue-to-Pummel-California/2023-01-11T14:10:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Gang-Steals-4-Million-Worth-of-Copper-from-Chilean-Port/2023-01-18T08:33:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/broken-trust-unpatchable-vulnerability/2023-01-13T12:43:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/2023-Technology-Trends-and-What-They-Mean-for-Security/2023-01-17T11:16:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/italy-celebrates-arrest-of-mafia-boss-fugitive/2023-01-23T13:12:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/ukraine-helicopter-crash/2023-01-19T12:51:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Despite-Increased-Awareness/2023-01-20T13:15:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/investigators-search-for-motive-california-mass-shooting/2023-01-24T09:04:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/Former-Top-Spy-Catcher-Indicted-on-Multiple-counts-of-Wrongdoing/2023-01-25T09:16:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/study-identifies-common-behaviors-mass-attackers/2024-01-29T08:40:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/spanish-letter-bomb-suspect-arrested/2023-01-26T11:24:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/five-memphis-cops-charged/2023-01-27T12:16:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/GAO-reiterates-need-for-stronger-antifraud-strategy/2023-01-30T12:31:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/january/January-2023-Strange-Security-Roundup/2023-01-31T12:42:33-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/Poor-Arson-Planning-Emu-Fighting-and-Bigfoot-Headline-This-Months-Strange-Security-News/2022-08-01T14:49:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/Al-Qaeda-Leader-Killed-in-Afghanistan-by-US-Drone-Strike/2022-08-02T11:56:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/concentrated-rainfall-floods-us-midwest/2022-08-03T12:10:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/taiwan-pla-danger-zones/2022-08-04T11:53:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/after-reopening-venues-attract-rowdy-crowds-not-security-staff/2022-08-05T10:46:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/whos-in-charge-water-utility-cybersecurity-checks/2022-08-08T12:15:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/Murders-Gun-Violence-Down-Slightly-in-2022/2022-10-26T13:41:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/do-device-free-driving-laws-reduce-crashes/2022-08-10T11:21:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/iranian-murder-for-hire-plot-of-bolton/2022-08-11T11:53:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/Lebanese-Man-Holds-Up-Beirut-Bank/2022-08-12T12:13:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/fbi-search-conspiracy-rhetoric/2022-08-15T12:05:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/160000-Pounds-of-Dead-Fish-Causes-Tension-Between-Germany-and-Poland/2022-08-16T12:50:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/american-companies-missing-threats-downplaying-risks/2022-08-17T11:36:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/latest-opioid-legal-battle-hits-pharmacies/2022-08-18T13:11:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/As-Tensions-Rise-Near-Zaporizhzhia/2022-08-19T12:40:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/al-shabab-extremists-attack-hotel-in-somalia/2022-08-22T11:59:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/twitter-security-whistleblower/2022-08-23T11:49:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/agency-uncovers-vulnerability-in-radioactive-material-protections/2022-08-24T12:54:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/drought-flooding-famine-war-in-Ethiopia/2022-08-25T09:48:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/China-Sets-New-Temperature-Records/2022-09-06T14:11:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/further-fraud-funds-confiscated/2022-08-29T11:38:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/Now-We-Know-How-Not-to-Do-an-Active-Shooter-Training/2022-09-06T14:01:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/august/cyberattack-hits-montenegro/2022-09-01T09:49:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/Verizon-2022-DBIR-Reveals-Rise-in-Ransomware/2022-06-01T12:04:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/saint-francis-tulsa-shooting/2022-06-02T13:01:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/cultural-property-crimes/2022-08-25T15:25:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/gunmen-with-explosives-attack-church-nigeria/2022-06-06T11:31:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/New-York-State-Enacts-New-Gun-Control-Measures/2022-06-07T13:06:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/dhs-warns-heightened-domestic-extremism-risk/2022-08-01T14:46:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/berlin-car-attack-2022/2022-06-09T12:32:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/june-heat-wave/2022-06-10T13:03:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/news-from-ukraine-june/2022-06-13T11:37:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/lgbtq-events-targeted-by-extremist-groups/2022-06-14T12:29:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/ransomware-pressure-cybersecurity-stress/2022-06-15T12:11:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/US-launches-task-force-to-address-online-abuse/2022-06-16T13:20:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/uk-home-office-authorizes-assange-extradition/2022-06-17T13:30:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/Air-Travel-Is-Overwhelmed-with-Summer-Deluge-of-Travelers/2022-06-21T13:32:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/texas-senate-hearing-clarifies-timeline/2022-06-22T09:23:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/Relief-Mission-Faces-Obstacles/2022-06-23T11:00:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/Contract-Security-Provider/2023-12-20T09:55:40-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/the-world-in-protests/2022-06-27T13:01:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/Survey-Says-Work-Stinks/2022-06-28T15:26:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/global-hunger-risks/2022-06-29T12:54:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/june/sans-2022-security-awareness-report/2022-06-30T13:14:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/Strange-Security-News-Roundup/2022-07-01T11:49:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/independence-day-mass-shooting/2022-07-05T14:02:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/widespread-flooding-sydney/2022-07-06T10:01:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/abuja-prison-break/2022-07-07T12:16:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/former-japanese-prime-minister-assassinated/2022-07-08T11:19:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/protesters-take-over-presidential-residence-in-sri-lanka/2022-07-11T11:00:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/A-More-Complete-Picture-of-the-Safety-Issues-at-the-Champions-League-Football-Match-Emerge/2022-07-12T14:57:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/nearly-half-us-murders-went-unsolved-in-2020/2024-01-08T10:07:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/Jury-Convicts-Former-CIA-Engineer/2022-07-14T13:09:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/The-Long-Tail-of-Log4j/2022-07-15T12:20:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/Franco-A-Germany-Extremism-Case/2022-07-19T08:53:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/US-Mass-Shootings-Continue-to-Take-Center-Stage/2022-07-20T11:11:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/intolerance-fueled-terrorism-national-security-threat/2022-07-20T11:56:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/cruel-summer-2022/2022-07-21T13:20:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/New-York-Governor-Candidate-Wards-Off-Assault/2022-07-22T12:02:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/WHO-Declares-Monkeypox-Outbreak/2022-07-25T11:01:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/Tensions-Rise-on-the-Tiny-Island-with-Outsized-Strategic-Importance/2022-07-26T14:55:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/worlds-worries-woes/2022-07-27T10:56:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/shanghai-breach-fallout/2022-07-28T11:31:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/july/Soaring-to-New-Heights/2022-07-29T11:55:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Unusual-Weapons-Fake-Socks-and-Lemonade-Stand-Fraud/2022-09-02T08:58:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/UN-Investigation-Finds-Human-Rights-Violations/2022-09-06T10:35:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Extreme-Violence-in-Mexico-Continues-to-Increase/2024-01-08T09:08:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/ransomware-poses-tough-lesson-for-school-districts/2022-09-07T12:33:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/both-suspects-in-canadian-mass-stabbing-dead/2022-09-09T08:45:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/EU-Poised-to-Introduce-Cybersecurity-Rules-for-IoT-Devices/2022-09-09T11:15:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Visa-to-Categorize-Gun-Sales-Climate-Change-Tipping-Points-and-More-Security-Related-News/2022-09-13T09:36:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/More-People-Fall-Victim-to-Modern-Slavery-New-Phishing-Schemes-and-Other-News/2022-09-13T09:53:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Former-Twitter-Security-Official-Testifies-Monarchy-Protestors-Progress-Fighting-Violent-Crime/2022-09-16T09:16:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/how-do-pandemics-end/2022-09-16T09:16:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/legal-roundup/2022-09-16T09:37:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/hurricane-fiona-knocks-out-power/2022-09-20T09:33:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Grand-Theft-Auto-Likely-Shows-Perils-of-Social-Engineering-Hack/2022-09-22T08:40:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/nyc-invests-in-subway-car-surveillance/2022-09-22T08:39:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/iran-protests-2022/2022-09-22T12:48:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Russia-Escalates-War-Effort/2022-09-23T11:34:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Swastika-Adorned-Gunman-Rampages-in-Russian-School/2022-09-28T08:38:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/New-Documentary-Revisits-Deadliest-Shooting-in-American-History/2023-12-19T11:45:17-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/florida-prepares-for-severe-blow-hurricane-ian/2022-09-28T11:27:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Danish-Swedish-Officials-Claim-Sabotage/2022-09-30T12:09:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Hurricane-Update-South-Carolina/2022-09-30T12:38:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/september/Stolen-Bake-Stands-Bourbon-and-Cow-Protests/2022-09-30T13:32:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Defacing-Art-Burglarizing-Bears-Pageantry-Fraud-and-Other-Unusual-News/2022-04-01T11:33:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/economic-spiral-drives-rare-protests-political-exodus-in-sri-lanka/2022-04-04T11:29:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/As-Zelensky-Makes-Plea-to-UN-International-Bodies-Open-War-Crimes-Investigations-in-Ukraine/2022-04-05T12:44:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/germany-announces-takedown-of-hydra-market/2022-04-06T12:19:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/lawrence-ray-found-guilty/2022-04-07T12:34:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Recent-Incidents-and-Exercises-Highlight-Electric-Grid/2023-11-16T11:48:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/majority-of-americans-strongly-worried-about-crime/2022-04-11T13:41:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Justice-Aims-to-Close-Ghost-Gun-Loopholes/2022-04-22T11:27:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/77-million-more-people-face-extreme-poverty-covid/2022-04-13T11:48:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/frank-james-arrested-for-nyc-subway-attack/2022-04-14T12:21:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/No-Longer-a-PIPEDREAM-SEVENTH-ICS-Focused-Malware-Discovered/2022-04-19T14:25:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/3-mass-shootings-hit-us-over-weekend/2022-04-18T11:29:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Tumult-Involving-Migration-from-Mexico-into-US-Continue-to-Escalate/2022-04-19T13:25:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/us-judge-dismisses-cdc-mask-mandate/2022-04-20T14:10:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/israel-palestinian-spring-2022-conflict/2022-04-21T16:25:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Held-Hostage-FBI-Raises-Alarm-on-Ransomware-Attacks/2022-04-22T11:43:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/Russia-Strikes-Rail-Fuel-Facilities/2022-04-25T12:55:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/UN-Says-Disaster-Risks-Are-Increasing/2022-04-26T14:20:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/us-law-enforcement-deaths-climbed-sharply-in-2021/2022-06-13T11:16:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/clarksville-ADA-noncompliant/2022-04-28T12:05:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/april/First-Human-in-the-United-States-Contracts-Avian-Flu/2023-03-17T16:28:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Symantec-Discovers-Advanced-Cyber-Espionage-Tool-Linked-to-China/2022-03-01T12:17:42-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/three-billion-people-highly-vulnerable-to-climate-change/2024-01-08T09:43:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/FTC-consumer-sentinel-network-report-2021/2022-03-03T14:04:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Military-Conflict-Causes-Fire-at-Nuclear-Power-Plant/2022-03-04T12:31:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/counterfeiters-adapted-and-thrived-during-covid19/2022-03-07T13:06:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Biden-Preparing-to-Announce-US-Cryptocurrency-Approach/2022-03-08T13:20:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/plethora-of-multinational-companies-announce-suspension-of-operations-in-russia/2022-03-09T10:33:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Jury-Convicts-U.S.-Capitol-Rioter-in-First-Trial-from-6-January-Attack/2022-03-10T12:36:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Cyberattack-Disrupts-Ukraines-Internet/2022-03-11T12:16:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/why-workers-quit/2022-04-11T15:57:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/German-Security-Worker-Strikes-Cause-Aviation-Disruptions/2022-03-15T11:47:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/ukrainian-refugee-crisis-raises-human-trafficking-concerns/2022-03-16T11:34:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/2022-fukushima-earthquake/2022-03-17T13:42:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Security-Contractors-And-Aid-Organizations-Ramp-Up-Ukrainian-Evacuations/2022-12-12T11:08:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/secret-service-report-advocates-behavioral-threat-assessment-for-violent-misogyny-risks/2022-06-14T12:46:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/US-Intelligence-Finds-Evidence-of-Increased-Russian-Probes-of-Cyber-Vulnerabilities/2022-04-19T14:32:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/The-Search-for-Answers-About-Crashed-Chinese-Airplane-Continues/2022-03-28T15:50:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/okta-lapsus$-breach/2022-04-19T14:28:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Europe-and-United-States-Announce-Agreement-in-Principle/2022-03-25T12:50:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/el-salvador-declares-state-of-emergency-following-spike-in-gang-violence/2022-03-28T12:05:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/Update-on-Safety-and-Security-in-Mexico/2022-03-29T14:08:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/un-warns-ukraine-food-crisis-catastrophe-on-top-of-catastrophe/2022-03-30T11:59:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/march/omicron-BA2/2022-03-31T09:58:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Wedding-Buzz-COVID-Boosters-Accordion-Wars-and-Other-Unusual-News/2022-05-02T11:29:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Firearms-Related-Deaths-Spike-Higher/2022-05-03T10:57:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/free-press-faces-threats-as-risks-of-jail-abuse-violence-rise/2022-05-04T11:56:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/hikvision-sanction-2023/2022-05-05T12:14:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Nearly-15-Million-People-Have-Died/2022-05-06T12:41:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/monthlong-new-mexico-wildfire-signals-rough-fire-season-ahead/2022-05-17T08:58:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Settlement-Would-Restrict-Database-Sales/2022-05-17T08:53:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/sri-lanka-violent-protests/2022-05-11T11:19:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/changes-lessons-learned-ukraine/2022-05-12T10:42:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Hong-Kong-Arrests-90-Year-Old-Cardinal-Under-National-Security-Law/2022-05-13T10:24:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/shooting-at-ny-supermarket-was-likely-hate-crime/2022-05-17T11:10:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Flood-Risks-and-Heat-Waves-Rise/2022-05-17T11:03:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/north-korea-announces-rapid-covid19-spread/2022-05-18T11:11:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/knowbe4-2022-security-culture-report/2022-05-19T11:58:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/good-faith-doj-cybersecurity-policy/2022-05-20T11:03:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/chicago-public-schools-data-breach/2022-05-23T12:35:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Cause-for-Caution-but-not-Alarm-as-Monkeypox-Spreads/2022-05-24T12:16:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/uvalde-texas-school-shooting/2022-05-25T10:52:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/noaa-predicts-heavy-hurricane-season/2022-05-26T11:51:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/International-Attacks-Stalled-But-Online-Terror-Spread/2022-05-27T12:55:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/may/Johnny-Cash-Unfortunate-Leak-The-Case-of-the-Mona-Lisa-Cake-Attack-the-Taste-of-Security-and-Other-Unusual-Security-News/2022-05-31T12:23:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/fbi-reports-another-rise-in-hate-crime-in-2020/2021-09-01T12:51:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/WhatsApp-Hit-With-Second-Largest-GDPR-Fine/2021-09-02T15:11:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Police-Kill-Extremist-who-Stabbed-Six-People-in-Grocery-Store-Attack/2021-09-03T10:31:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Profile-of-a-ransomware-target/2021-09-07T12:43:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/europe-faces-more-diversified-violent-cocaine-trade/2021-09-08T10:51:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/2021-increased-motor-vehicle-deaths/2021-09-09T12:03:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Twenty-Years-Later-Security-Ramifications-and-Reflections/2021-09-10T14:26:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/extreme-heat-expected-to-melt-labor-productivity/2021-09-13T11:10:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Organizations-Wrestle-with-How-to-Enforce-Health-Policies/2021-09-14T14:51:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/globalization-drives-disconnect-in-corporate-anticorruption-efforts/2021-09-15T12:07:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/ICC-investigate-Philippine-president-Duterte/2021-09-16T13:55:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Security-Personnel-on-High-Alert/2021-09-17T12:00:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/us-begins-mass-expulsion-of-haitian-migrants/2021-09-20T13:50:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/OSHA-Developing-Rules-to-Curb-Workplace-Heat-Related-Illnesses/2021-09-21T11:01:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/covid19-pushes-cities-to-revamp-overall-security-efforts/2021-09-22T11:32:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/canary-island-volcanic-eruption/2021-09-23T13:18:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Delegates-Call-on-UN-Security-Council/2021-09-24T11:50:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/welcome-to-gsx/2021-09-27T05:00:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Security-News-Roundup-27-September/2021-09-27T09:18:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/US-Homicides-Increase-Britain-Fuel-Shortages-Korean-Tensions/2021-09-28T08:40:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/Hospital-Issues-Panic-Buttons-Guidance-for-Hardening-VPNs/2021-09-29T09:40:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/september/targeting-broken-cameras/2021-09-30T07:49:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/preliminary-settlement-reached-over-zoombombing-privacy-issues/2021-08-02T10:36:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Iran-Blamed-for-Drone-Attack-on-Tanker-in-Gulf-of-Oman/2021-08-03T10:54:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/federal-agencies-lagging-behind-on-cybersecurity/2021-08-04T11:23:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Wildfires-and-Extreme-Heat-Grip-Southern-Europe/2021-08-05T12:49:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Apple-to-Roll-out-Photo-Scanning/2021-08-06T13:24:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/un-climate-report-sounds-alarm-bells-for-humanity-global-security/2021-08-09T12:21:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Mexico-Safety-and-Security-Update-Cartel-Threatens-to-Kill-Journalist/2021-08-10T13:05:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/taliban-continues-rapid-offensive-in-afghanistan/2021-08-11T11:08:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/COVID-19-News-Roundup/2021-08-12T11:21:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Allied-Troops-Deployed-to-Afghanistan-to-Aid-in-Embassy-Evacuations/2021-08-13T11:47:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/afghans-desperate-to-escape-taliban-stall-flights-at-airport/2021-08-16T12:09:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Earthquake-Tropical-Storm-Cause-Humanitarian-Crisis-in-Haiti/2021-08-17T12:19:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/student-arrested-in-Hong-Kong-for-advocating-terrorism/2021-08-18T10:08:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/blackberry-qnx-badalloc-vulnerability-announcement/2021-08-19T12:50:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Western-Allies-Scramble-to-Evacuate-Citizens-Afghans/2021-08-20T12:08:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/afghanistan-evacuations-face-is-terrorist-threats/2021-08-23T12:36:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/Luck-May-Have-Run-Out-for-Massachusetts-Family-Accused-of-Using-Lottery-for-Tax-Fraud/2021-08-24T12:32:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/flood-of-panic-calls-overwhelmed-capitol-police-protocols/2021-08-25T11:31:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/kabul-airport-bombing/2021-08-26T11:35:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/China-Approves-GDPR-Style-Privacy-Law/2021-08-27T08:28:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/hurricane-ida-knocks-out-power-in-new-orleans/2021-08-30T10:19:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/august/US-Forces-Complete-Withdrawal-From-Afghanistan/2021-08-31T12:21:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/today-in-security-history-from-mi-8-to-the-black-chamber/2021-06-10T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/report-on-preventing-nashville-bombing/2021-06-03T13:16:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/template2222/2021-06-01T14:31:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/meat-processing-plants-regroup-after-cyberattack/2021-06-02T09:47:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/spending-spikes-fraud-follows/2021-06-07T11:36:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/US-Supreme-Court-Narrows-Focus-of-Computer-Fraud-Law/2021-06-04T10:02:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Senate-Report-on-6-January-Capitol-Riot/2021-06-08T14:14:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/prevention-fatigue-exacerbates-covid19-spike-in-taiwan/2021-06-09T10:05:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/weekend-gun-violence-sparks-concerns/2021-06-14T11:28:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/chattanooga-cold-case-closed/2024-01-12T11:16:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/From-Ransomware-Payments-to-Fake-Apps-Catching-Crooks-to-Yes-Nuns/2021-06-11T11:53:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/heatwave-fries-pacific-northwest/2021-06-28T10:37:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Company-Executives-Pay-the-Price-for-Investigative-Overreaches/2021-06-15T11:30:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/biden-releases-national-strategy-for-countering-domestic-extremism/2021-06-16T11:20:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/hong-kong-police-raid-newspaper-offices-under-security-law/2021-06-17T11:44:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/manchester-bombing-inquiry-finds-serious-security-shortcomings/2022-04-22T14:09:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Japan-Limits-Local-Fans-for-Tokyo-Olympics/2021-06-21T13:16:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Faking-Location-Data-Is-Easy-and-Can-Have-Serious-Consequences/2021-06-22T13:58:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Terrorists-Used-COVID-19-Pandemic-to-Spread-Propaganda-Exacerbate-Mistrust/2021-06-23T09:08:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Biden-Administration-Pledges/2021-06-24T11:48:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/Divisiveness-Spread-in-Advanced-Economies/2021-06-25T11:18:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/half-of-knowledge-workers-expected-to-work-remotely/2021-06-29T10:51:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/june/watchdog-finds-government-facial-recognition-uncertainty/2021-06-30T12:42:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/school-shooting-in-russia-prompts-gun-control-order/2021-05-12T10:27:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/multiagency-operation-shuts-down-online-child-abuse-platform/2021-05-03T10:16:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Driver-of-Armored-Vehicle-Expertly-Avoids-Assailants/2021-05-04T12:00:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/temperatures-continue-to-tick-upwards-noaa-finds/2021-05-05T11:47:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Protests-in-Colombia-Continue/2021-05-06T14:49:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Idaho-School-Shooting-by-6th-Grader/2021-05-07T12:07:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/US-Pipeline-Cyberattack-Underscores-Infrastructure-Vulnerability/2021-05-10T13:48:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/clashes-escalate-as-israelis-and-palestinians-exchange-fire/2021-05-11T10:59:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/security-history-battle-of-matewan/2021-05-19T11:52:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Biden-Signs-Cybersecurity-Executive-Order/2021-05-13T13:27:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Fully-Vaccinated-People-Do-Not-Need-To-Wear-Masks-In-Most-Settings-CDC-Says/2021-05-14T12:47:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/eased-pandemic-restrictions-may-embolden-extremists/2021-05-17T11:31:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/CISA-Identifies-Possible-5G-Threat-Vectors/2021-05-18T13:44:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/fbi-logs-million-internet-crime-complaints/2021-05-19T14:55:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/8-billion-in-aslr-impacts-with-hurricane-sandy/2021-05-20T11:02:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Israel-and-Hamas-Agree-to-Cease-Fire/2021-05-21T13:20:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/flight-diverted-to-arrest-opposition-journalist/2021-05-25T12:45:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Report-Outlines-DEI-Action-Steps/2023-03-17T16:23:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/texas-poised-to-allow-people-to-carry-handguns-without-licenses/2021-05-27T21:00:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/san-jose-shooting/2021-05-27T14:04:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/may/Hacking-Group-Behind-SolarWinds-Conducts-Massive-Phishing-Campaign-Microsoft-Says/2021-05-28T12:25:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/charged-with-conspiracy-national-security-law-crackdown/2021-03-01T10:20:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Two-Americans-Alleged-to-Have-Helped-Embezzler-Escape-Extradited-to-Japan/2021-03-02T15:11:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/council-urges-american-investment-in-ai/2021-03-03T11:40:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/opioid-fallout-continues/2021-03-04T16:57:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Microsoft-Urges-Customers-to-Patch-to-Mitigate-Effect-of-Latest-0-Day-Exploits/2021-03-05T13:08:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/farmer-protests-india-continue-to-grow/2021-03-08T12:42:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Governments-Around-the-World-Contemplate-Vaccine-Passports/2021-03-09T13:05:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/breach-surveillance-cameras-sparks-credential-concerns/2021-03-10T14:54:42-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/another-global-endemic-violence-against-women/2021-03-11T13:55:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Review-Finds-LAPD-Failures-Led-to-Mishandling-of-Summer-Civil-Unrest/2021-03-12T12:58:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/junta-declares-martial-law-in-areas-of-myanmar/2021-03-15T10:49:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Pandemic-Intensifies-Violence-Poverty-and-Inequality-Borne-by-Women/2021-03-16T12:06:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/report-details-foreign-influence-operations-us-elections/2021-03-17T13:43:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/atlanta-area-spa-shootings/2021-03-18T13:07:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Americans-Report-42-Billion-Lost-to-Cybercrime-and-Fraud-in-2020/2023-10-31T20:44:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/mass-kidnap-for-ransom-attacks-continue-in-nigeria/2021-03-22T11:46:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/Mass-Shooting-Leaves-10-Dead-in-Boulder/2021-03-23T11:05:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/brazil-faces-higher-death-toll-amid-political-infighting-covid-variants/2021-03-24T10:27:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/record-breaking-australian-floods/2021-03-25T13:26:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/The-Security-Challenges-Around-The-Globe-We-Followed-This-Week/2021-03-26T13:57:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/myanmar-security-forces-open-fire-on-funerals-protesters/2021-03-29T11:01:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/On-Many-Fronts-News-on-the-Pandemic-is-Mixed/2021-03-30T13:17:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/march/dod-issues-training-extremism-detection-intervention/2022-04-22T13:41:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/inoculation-efforts-underway-worldwide/2021-01-04T10:41:36-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/FAA-Issues-Final-Rules-on-Drone-Use/2021-01-05T13:08:36-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/pharmacist-tampers-with-doses-of-vaccine/2021-01-06T12:00:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/Trump-Supporters-Storm-Capitol-Building-Breaching-Security/2021-01-06T15:40:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/capitol-building-riots/2021-01-07T13:21:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/beginning-2021-brings-major-security-challenges/2021-01-08T10:53:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/billion-dollar-disaster-record-broken-in-2020/2021-02-04T14:51:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/U-S-Laws-Address-Deepfakes/2023-12-15T16:10:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/fbi-warns-of-armed-protests-across-united-states/2021-01-13T12:16:36-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/faa-unruly-passenger-policy/2021-01-14T13:15:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/CISA-Warns-of-Cloud-Service-Attacks/2021-01-15T10:19:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/biden-executive-orders-coronavirus/2021-01-21T13:10:17-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/marguerite-harrisons-mission-to-moscow/2021-01-25T08:00:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/Discrepancies-in-Security-Regulations-Pose-Risks-to-Critical-Infrastructure/2021-01-22T12:37:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/isis-claims-responsibility-for-baghdad-bombings/2021-01-25T11:39:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/The-Unemployment-Gold-Mine-Fraudsters-Steal-Billions/2021-01-26T13:15:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/lockdown-hopelessness-spurring-student-mental-health-concerns/2021-02-05T14:59:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/Michigan-Governors-Would-Be-Wolverine-Watchmen-Kidnapper-Pleads-Guilty/2021-01-28T13:18:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/january/Global-Law-Enforcement-Effort-Takes-Down-EMOTET/2021-01-29T08:51:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Pro-Democracy-Leaders-Found-Guilty-in-Hong-Kong/2021-04-01T12:14:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Train-Derailment-in-Taiwan-Kills-at-Least-50/2021-04-02T11:10:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/militant-attack-mozambique-thousands-citizens-flee/2021-04-05T11:26:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Headaches-from-2019-Facebook-Data-Breach-Continue/2021-04-06T12:34:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/pandemic-amplified-antisemitism-online-report-found/2021-04-07T11:35:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Biden-Announces-Limited-Executive-Actions-for-Greater-Gun-Control/2021-04-08T14:18:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/intelligence-council-predicts-future-tensions/2021-04-09T12:33:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/disruption-at-iranian-atomic-site-called-nulcear-terrorism/2021-04-12T11:33:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Tensions-Rise-in-Minneapolis-Region/2021-04-13T14:07:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/us-withdraw-troops-from-afghanistan-september/2021-04-14T10:35:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/death-of-william-j-burns-american-detective/2024-01-12T11:12:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/new-sanctions-levied-on-russia/2021-04-15T13:14:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Gunman-Kills-8-in-Shooting-at-FedEx-Warehouse/2021-04-16T11:55:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/half-us-adults-receive-at-least-one-vaccine-dose/2021-04-19T10:24:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/France-Passes-Law-to-Protect-Police/2021-04-20T13:50:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/swift-verdict-chauvin-case-breaks-tension-over-potential-unrest/2021-04-21T11:04:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Coronavirus-Stresses-Healthcare-Systems-Workers-Worldwide/2021-04-22T13:56:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/EU-Commission-Unveils-Regulations-For-High-Risk-Artificial-Intelligence-Technologies/2021-04-23T12:43:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/fatal-stabbing-triggers-terrorism-investigation-in-france/2021-04-26T11:53:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Police-Departments-Hit-by-Ransomware/2021-04-27T14:23:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/agency-partnership-zeroes-in-on-human-smugglers-at-border/2021-04-28T12:41:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Jury-Convicts-Man-For-Social-Media/2021-04-29T14:54:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/april/Taskforce-Issues-Recommendations-To-Combat-Rise-of-Ransomware/2021-04-30T12:48:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/eu-organized-crime-groups-fueling-rise-in-violent-crime/2021-02-01T10:33:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Report-Details-Hate-Trends-in-2020/2021-02-02T12:33:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/osha-issues-new-guidance-covid-prevention-programs/2021-02-03T09:58:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Climate-Change-to-Amplify-Security-Risks-in-South-Asia/2021-02-04T13:09:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Prepping-for-Super-Bowl-Sunday-During-a-Pandemic/2021-02-05T12:58:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/mass-protests-continue-in-myanmar-after-coup/2021-02-08T12:19:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Hacker-Attempts-to-Poison-Florida-City-s-Water-Supply/2021-02-09T14:05:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/nyc-council-unveils-legislation-package-for-police-accountability/2021-02-10T10:55:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Canadian-Intelligence-Director-Brands-China-a-Threat/2021-02-11T14:43:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/conspiracy-charges-for-militia-members-capitol-attack/2021-02-12T16:05:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Unusual-Weather-Pattern-Creates-Emergencies/2021-02-16T12:24:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/anti-separatist-legislation-passed-by-french-national-assembly/2021-02-17T10:32:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/N95-shortages-stockpiles-shams/2021-02-18T13:01:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/CISA-Announces-Global-Strategy-to-Address-Critical-Infrastructure-Threats/2021-02-19T12:30:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Summer-Protests-Spark-Bills-Aimed-at-Curbing-Unrest/2021-02-23T15:01:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/Despite-Military-Threats-Protests-Grow-in-Myanmar/2021-02-22T14:28:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/senate-hearings-dig-into-intelligence-breakdowns-in-capitol-riot/2021-02-24T11:49:40-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/winter-storms-continue-to-stress-aging-us-infrastructure/2021-02-25T14:57:29-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/US-President-Biden-Orders-National-Supply-Chain-Security-Review/2021-02-26T10:54:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/february/arrest-robert-hanssen-american-spy/2021-03-08T13:32:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/US-Prisons-on-Lockdown-Nationwide/2022-02-02T13:28:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/Using-Blockchain-for-Supply-Chain-Visibility-in-the-Food-Sector/2022-02-03T10:42:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/ISIS-leader-and-civilians-killed-in-US-raid/2022-02-03T12:54:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/beijing-winter-olympics-open-amidst-boycotts/2022-02-07T10:52:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/mexican-cartel-wars-escalate-with-IEDs/2022-02-07T11:20:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/US-Charges-Chinese-Firm-with-Walkie-Talkie-Technology-Theft/2022-02-08T11:56:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/canadian-antivaccine-protest-blocks-international-trade-route/2022-02-09T11:02:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/the-gambling-nun/2022-02-10T11:23:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/Super-Bowl-Security-Teams-Are-Ready/2022-02-11T12:48:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/covid19-fraud-could-cost-UK-government-billions/2022-02-14T12:14:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/Despite-Hopeful-Headlines-Russia-Ukraine-Crisis-Remains-Tense/2022-02-15T12:59:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/conspiracy-theories-exacerbated-extremism-threats-in-2021/2022-02-16T11:53:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/france-eu-withdrawal-from-mali/2022-02-17T12:35:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/World-Leaders-Gather-at-Munich-Security-Conference/2022-02-18T11:51:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/Research-Highlights-Growing-Physical-Security-Threats/2022-02-22T13:06:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/nations-leverage-sanctions-against-russia-after-incursions-in-ukraine/2022-02-23T11:31:34-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/three-men-pled-guilty-to-planned-attack-on-power-grid/2022-02-24T13:28:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/Russia-Invades-Ukraine-Causing-Ramp-Up-of-Kyiv-and-Civilian-Defenses/2022-02-25T14:34:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/february/the-second-front-in-ukraine-cyberattacks-disinformation-defenses/2022-02-28T12:00:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/lockdown-procedures-saved-lives-in-michigan-shooting-sheriff-says/2021-12-01T12:00:29-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/early-warning-systems-natural-disasters/2021-12-02T12:44:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/TSA-Announces-New-Cyber-Requirements/2021-12-03T15:18:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/tensions-high-in-nagaland/2021-12-06T10:50:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/US-Military-Sees-Ransomware-as-National-Security-Threat/2021-12-07T09:43:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/alcohol-misuse-hit-record-highs-during-lockdowns/2021-12-08T10:33:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/securitas-buys-black-decker-alarm-company/2022-04-07T15:12:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/Parents-of-School-Shooting-Survivors-File-Lawsuit/2021-12-10T12:22:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/software-vendors-scramble-to-address-log4j-vulnerability/2021-12-13T11:41:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/In-Germany-Injury-that-Occurs-on-Morning-Commute-from-Bedroom-to-Home-Office-Is-a-Work-Related-Injury/2021-12-14T11:31:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/americans-keep-forgetting-firearms-in-luggage/2021-12-15T10:50:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/gao-report-less-lethal-force-reporting/2021-12-16T10:21:18-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/Meta-Takes-Action-Against-Surveillance-for-Hire-Firms/2021-12-17T11:58:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/latest-tiktok-trend-school-violence-warnings/2021-12-20T10:32:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/US-Military-Updates-Its-Guidance-on-Handling-Extremism/2021-12-21T13:40:35-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/omicron-surge-spurs-lockdowns-testing-pushes/2021-12-22T11:07:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/december/parkland-fbi-lawsuit-failed-settlement/2021-12-23T12:25:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/airport-risks-stall-5g-rollout/2022-01-19T10:30:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/fire-guts-parts-of-south-africa-parliament-complex/2022-01-03T09:47:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/US-Marshals-Arrest-84000-Fugitives-in-2021/2022-01-04T11:34:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/omicron-drives-covid19-spike-in-united-states/2022-01-05T10:18:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/capitol-riot-anniversary/2022-01-06T13:02:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Kazakhstans-Leader-to-Quell-Rebellion/2022-01-07T10:43:36-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/china-races-to-contain-covid19-outbreak-in-tianjin/2022-01-10T09:00:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/US-Russian-Talks-on-Ukraine-Go-Nowhere/2022-01-11T12:42:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/extreme-weather-triggered-billions-in-insured-losses/2022-01-12T11:17:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/the-Pokemon-police/2022-01-13T11:13:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Ukraine-And-Russia-Arrest-Ransomware-Actors-As-Talks-Stall/2022-01-14T11:32:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Security-Training-Saves-Synagogue-Hostages/2022-04-21T16:51:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Red-Cross-hack/2022-01-20T14:49:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Airstrikes-in-Yemen-Kill-at-Least-70-and-Cause-Nationwide-Internet-Outage/2022-01-21T12:26:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/people-distrust-by-default-study-finds/2022-01-24T12:08:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/Gunman-Opens-Fire-in-German-University-Lecture-Hall/2022-01-25T11:45:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/crowd-surge-at-cameroon-soccer-match-sparks-investigation/2022-01-26T14:52:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/justice-counts-launch/2022-01-27T14:07:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/IRS-Announces-New-Biometric-Requirements/2022-01-28T13:26:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2022/january/fraud-goes-viral-on-social-media/2022-01-31T10:22:31-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/february/2022-02-03T16:35:26-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/april/2022-04-06T16:34:32-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/may/2022-07-14T14:46:23-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/august/2022-08-01T09:22:47-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/october/2022-10-01T08:34:00-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/template-article/2022-11-14T11:57:56-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2022/december/2022-12-02T10:49:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/rfid-and-weapons-tracking/2021-10-01T08:06:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/us-agencies-need-documentation-continuous-improvement/2021-10-04T11:40:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Report-Details-Appalling-Extent-of-French-Catholic-Church-Child-Sex-Abuse/2021-10-05T12:12:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/one-third-of-employees-observed-cannabis-use-at-work-survey-finds/2021-10-06T12:18:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Pakistan-5.9-earthquake-2021/2021-10-07T11:59:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/US-Creates-Cryptocurrency-Enforcement-Team/2021-10-08T12:30:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/US-Couple-Charged-with-Attempting-to-Sell-Nuclear-Submarine-Secrets/2021-10-12T11:40:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/university-cancels-class-amid-mental-health-crisis/2021-10-13T12:03:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Norway-bow-and-arrow-attack/2021-10-14T12:05:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/US-Joint-Advisory-Warns-Water-Sector-of-Ongoing-Cyber-Threats/2021-10-15T11:52:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/UK-reevaluates-politician-security-after-stabbing-attack/2021-10-18T11:17:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/puerto-rico-blackouts-and-protests/2021-10-19T12:36:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/kidnapping-in-haiti-on-sharp-incline-missionaries-abducted/2021-10-20T11:37:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/booster-shots/2021-10-21T13:26:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/New-US-Assessments-Highlight-Climate-Change-Risks/2021-10-22T14:16:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/ngos-continue-to-leave-hong-kong/2021-10-25T11:18:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Gunman-Attacks-Shopping-Mall-in-Boise/2021-10-26T11:36:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/return-to-in-person-classes-spurs-violence-behavioral-challenges/2021-10-27T10:34:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Another-Day-Another-Report-of-Cyber-Attacks-and-Resulting-Fallout/2021-10-28T10:50:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/october/Officials-Arrest-12-Alleged-Ransomware-Actors/2021-10-29T11:04:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/UN-report-global-racism/2021-07-26T13:57:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Russian-Intelligence-Services-Conducting-Global-Brute-Force-Campaign/2021-07-02T12:33:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Thousands-of-Companies-Likely-Compromised-in-Latest-Ransomware-Attack/2021-07-06T15:40:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/haiti-president-assassinated/2021-07-07T10:15:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/air-force-majorly-responsible-for-2017-mass-shooting/2021-07-08T13:34:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Suspects-Detained-in-Haiti/2021-07-09T12:20:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/gangs-security-forces-clash-violently-venezuela/2021-07-12T10:50:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Police-Arrest-Four-Who-Had-Large-Weapons-Cache-Near-Baseballs-All-Star-Game/2021-07-13T11:44:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/protests-escalate-into-looting-violence-in-south-africa/2021-07-14T10:10:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Report-Finds-Failure-in-FBI-Response-to-Child-Abuse-Related-to-Convicted-Gymnastics-Doctor/2021-07-15T14:00:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/U-S-Takes-Steps-to-Combat-Ransomware/2021-07-16T10:59:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Journalists-Activists-Among-Those-Surveilled-by-Governments-Via-Pegasus-Hack/2021-07-19T14:06:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/First-Felony-Sentence-Handed-Down-to-Capitol-Rioter/2021-07-20T12:59:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/United-States-Says-Chinese-State-Sponsored-Actors/2021-07-21T13:23:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/el-machete-self-defense-group/2021-07-22T12:49:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Olympics-Begin-in-Tokyo-with-Security-Measures-in-the-Spotlight/2021-07-23T11:43:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/un-report-finds-africa-hardest-hit-by-terrorism-in-2021/2021-07-26T10:45:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/California-New-York-City-Mandate-COVID-19-Vaccine-for-Government-Workers/2021-07-27T12:37:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/tech-counterterrorism-organization-expands-focus/2021-07-28T11:01:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/Cuban-Government-Lashes-Back-at-Protesters/2021-07-29T12:41:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/july/new-data-on-delta-emerges/2021-07-30T12:07:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/covid19-death-toll-reaches-five-million/2021-11-01T10:30:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/New-Techniques-Pave-Way-for-Dark-Web-Marketplaces-to-Flourish/2022-04-07T14:56:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/ransomware-actors-use-financial-events-to-select-targets/2021-11-03T10:29:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/US-air-rage-epidemic-continues/2021-11-04T12:23:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/Chinas-New-Data-Privacy-Law-Goes-Into-Effect/2021-11-05T11:33:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/deadly-crowd-surge-houston-concert/2022-04-22T14:20:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/The-Good-Guys-Score-Wins-Against-Ransomware-Criminals/2021-11-09T11:45:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/conflict-in-ethiopia-escalates/2021-11-10T11:12:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/EU-Officials-Threaten-Increased-Sanctions/2021-11-12T11:58:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/europe-reemerges-as-covid19-epicenter-sparking-lockdowns/2021-11-15T10:52:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/Russia-Blows-Up-Satellite-in-Latest-Escalation-of-Space-Militarization/2021-11-16T12:42:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/mitigating-information-disorder-risk-requires-whole-of-society-approach/2021-11-17T11:14:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/more-than-100000-overdose-deaths-in-US/2021-11-18T13:15:42-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/CISA-Launches-ChemLock-Program-to-Share-Security-Expertise/2021-11-19T13:07:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/confusion-chaos-after-driver-plows-through-holiday-parade/2021-11-22T13:25:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/Rash-of-Swarming-Snatch-and-Run-Incidents-Hits-High-End-Retailers/2021-11-23T12:31:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/legal-roundup-white-nationalist-rally-organizers-found-liable/2021-11-24T10:39:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/who-announces-new-variant-of-concern/2021-11-29T12:30:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2021/november/Chinese-Authorities-Contract-Facial-Recognition-Use-Track-Journalists-Others/2021-11-30T12:19:25-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/external-retail-theft/2025-11-03T11:37:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/harvard-explosion/2025-11-04T14:14:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/air-travel-delays/2025-11-05T11:53:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/sexual-assault-mexico-president/2025-11-06T15:08:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/$10-Million-Damages-to-Abby-Zwerner/2025-11-07T11:28:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/Climate-Disasters-Displace-Millions/2025-11-10T11:57:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/new-delhi-car-explosion-investigation/2025-11-11T11:47:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/cyber-insurance-claims/2025-11-12T12:20:17-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/schools-btam-study/2025-11-13T13:58:33-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/ciso-compensation/2025-11-14T10:48:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/journalist-online-abuse/2025-11-17T11:08:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/extremist-site-links/2025-11-18T12:26:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/louvre-security-upgrade/2025-11-19T10:28:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/mass-corporate-layoffs/2025-11-21T14:42:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/UK-Inquiry-Lack-of-COVID-19-Response/2025-11-21T12:58:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/nigeria-school-abduction/2025-11-24T12:14:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/de-wever-austere-pressure-attempt-another-strike/2025-11-25T12:51:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/november/armed-conflict-food-insecurity/2025-11-26T10:26:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/secret-sauce-protection-and-other-strange-security/2025-12-01T08:06:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/cyclones-senyar-ditwah-southeast-asia/2025-12-02T11:39:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/mass-killings-decrease/2025-12-03T10:26:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/Executive-Protection-One-Year-After-UnitedHealthcare/2025-12-05T09:54:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/Suspect-Arrested-Charged-Pipe-Bomb-DNC-RNC/2025-12-05T10:32:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/incogni-report-3-in-4-doctors-info-exposed/2025-12-08T10:40:35-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/flash-mob-robberies/2025-12-09T10:42:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/Avoidable-Security-Failures-Enabled-Louvre-Heist/2025-12-10T13:25:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/dizzying-risk-outlook/2025-12-11T11:59:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/Trump-Signs-AI-EO/2025-12-12T10:29:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/bondi-beach-shooting/2025-12-15T12:03:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/brown-university-shooting/2025-12-23T10:50:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/345-park-ave-lawsuit/2025-12-17T11:17:36-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/2026-risk-factors-around-the-world/2025-12-18T13:08:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/Trump-Speeds-Up-Marijuana-Rescheduling/2025-12-19T12:31:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/silverware-theft-elysee-palace/2025-12-22T10:29:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/readers-choice-2025/2025-12-23T09:23:29-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/december/editors-choice-2025/2025-12-30T10:38:12-05:00weekly0.5/security-management-magazine/articles/2025/12/research-executive-protection/benchmarking/2025-12-08T08:08:55-05:00weekly0.5/security-management-magazine/articles/2025/12/research-executive-protection/consultants-EP/2025-12-08T08:08:55-05:00weekly0.5/security-management-magazine/articles/2025/12/research-executive-protection/executive-impediments/2025-12-08T08:08:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/strange-security/2025-10-03T08:22:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/sensitive-work-information-AI/2025-10-06T11:51:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/stolen-tequila/2025-10-07T13:42:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/text-scams-2025/2025-10-08T10:54:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/EU-encryption-laws/2025-10-09T13:42:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/Judge-Temporarily-Bars-Trump-Admin/2025-10-10T11:35:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/calid-wildfire-new-laws/2025-10-14T13:42:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/gen-z-protests/2025-10-15T11:35:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/Outrage-Over-Cambodian-Scam-Centers/2025-10-16T15:26:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/No-Kings-Rallies-Prep/2025-10-17T12:56:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/louvre-raid/2025-10-20T12:42:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/measles-outbreak-2025/2025-10-21T13:33:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/ai-assistant-news-inaccuracies/2025-10-22T10:39:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/guard-force-turnover/2025-10-23T12:32:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/Museum-Security-Louvre-Heist/2025-10-24T14:55:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/remote-work-headwinds/2025-10-27T13:57:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/hurricane-melissa-jamaica/2025-10-28T12:35:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/mali-fuel-blockade/2025-10-29T11:26:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/internal-conflicts-cyberattacks/2025-10-30T12:04:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/october/strange-holiday-strange-security/2025-10-31T12:11:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/strange-cultural-properties-security/2025-07-01T10:15:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/NASA-cyber-risk-management/2025-07-02T12:07:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/europe-mediterranean-heat-wave-/2025-07-03T13:54:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/flash-floods-texas/2025-07-07T10:39:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/gangs-in-peru-extort-schools/2025-07-08T11:25:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/marco-rubio-ai-faker/2025-07-09T12:06:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/marks-spencer-cyberattack/2025-07-10T11:52:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/Requirements-General-Purpose-AI-Providers/2025-07-11T11:43:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/strava-privacy-settings/2025-07-14T09:59:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/african-democracies/2025-07-15T15:08:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/catastrophic-malware-potential/2025-07-16T15:11:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/kut-hypermarket-mall-fire/2025-07-17T12:49:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/Security-Operational-Resilience-Planning/2025-07-21T10:26:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/public-school-mental-health-screening/2025-07-21T10:54:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/europol-online-policing-concept-paper/2025-07-22T13:21:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/healthcare-workplace-violence/2025-07-23T11:04:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/personal-security-for-executives/2025-07-24T12:23:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/Thailand-Cambodia-Border-Conflict/2025-07-28T13:06:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/disaster-misinformation/2025-07-28T12:17:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/345-park-ave-shooting/2025-07-29T12:43:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/Global-Data-Breach-Costs-Drop/2025-07-30T12:22:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/july/st-paul-cyberattack/2025-07-31T11:22:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/strange-security-macaque-edition/2025-08-01T16:04:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/gore-sites-extremism/2025-08-04T11:54:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/Montana-Manhunt/2025-08-05T13:15:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/flashpoint-midyear-report-2025/2025-08-06T13:30:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/shooting-at-military-base/2025-08-07T12:03:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/Disclosure-Camera-System-Vulnerability/2025-08-08T11:42:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/wildfire-season/2025-08-11T11:36:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/trump-home-rule-act-section-740/2025-08-12T16:13:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/agentic-ai-managers/2025-08-13T12:07:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/canada-biometric-management-guidance/2025-08-14T13:39:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/Violence-as-a-Service-Recruits-Young-People/2025-08-18T12:15:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/israel-protests/2025-08-18T11:52:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/new-zealand-soldier-spy-convicted/2025-08-19T12:39:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/False-Information-Top-Threat/2025-08-20T11:30:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/south-african-parliament-members-attacked/2025-08-21T11:35:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/swatting-villanova/2025-08-22T11:25:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/camp-flood-preparedness-texas/2025-08-25T12:17:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/power-outage-map/2025-08-26T12:40:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/quiet-cracking/2025-08-27T12:36:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/annunciation-church-shooting/2025-08-28T10:57:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/cyber-crime-at-scale/2025-08-28T12:19:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/august/labubu-strange-security/2025-08-29T09:39:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/transunion-shinyhunters-hack/2025-09-02T12:32:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/fentanyl-trafficking-metrics/2025-09-03T10:34:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/AI-in-natural-disasters/2025-09-04T11:57:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/dc-sues-end-occupation/2025-09-05T12:29:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/fuel-theft-crackdown/2025-09-08T12:09:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/nepal-mass-protest/2025-09-09T13:18:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/bloquons-tout/2025-09-10T11:55:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/charlie-kirk-assassination/2025-09-15T08:51:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/Hoax-Threats-HBCUs/2025-09-12T12:27:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/kirk-death-suspect/2025-09-12T13:22:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/political-violence-risks/2025-09-15T12:26:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/silo-busting/2025-09-16T12:00:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/business-traveler-risks/2025-09-17T11:53:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/italy-ai-law/2025-10-03T08:59:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/EU-Sanctions-Ban-Russian-LNG/2025-09-19T10:16:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/war-risk-insurance/2025-09-22T11:13:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/fake-FBI-website/2025-09-23T11:48:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/world-security-report/2025-09-24T07:43:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/ep-research-benchmarks/2025-09-25T13:17:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/Trump-Left-Wing-Violence/2025-09-26T13:09:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/september/out-of-office/2025-09-28T08:00:06-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/advertise2020/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/february/2025-02-01T07:57:05-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/april/2025-04-01T10:41:08-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/june/2025-06-01T09:01:56-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/august/2025-08-01T14:14:40-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/october/2025-10-07T12:35:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2025/december/2025-12-01T07:49:48-05:00weekly0.5/security-management-magazine/articles/2025/08/research-security-intelligence/fast-facts/2025-08-25T08:13:42-04:00weekly0.5/security-management-magazine/articles/2025/08/research-security-intelligence/farmer-donkey/2025-08-25T13:46:26-04:00weekly0.5/security-management-magazine/articles/2025/08/research-security-intelligence/intelligence-impact-disruptions/2025-08-25T08:13:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/strange-security-animals-edition/2025-06-02T13:21:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/attack-on-marchers/2025-06-03T13:39:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/workplace-abuse-report-bias/2025-06-04T10:10:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/fbi-2024-active-shooter-report/2025-06-05T13:19:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/Trump-Travel-Ban/2025-06-06T09:34:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/LA-protests-vs-national-guard/2025-06-09T14:16:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/austria-school-shooting/2025-06-10T14:34:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/colombia-violence/2025-06-11T12:18:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/security-leadher/2025-06-12T10:29:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/Trump-National-Guard/2025-06-13T10:52:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/minnesota-politicians-shot/2025-06-16T11:49:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/overtourism-in-europe-protests/2025-06-17T13:45:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/raise-act/2025-06-18T11:39:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/Vacates-SIG-SAUER-Penalty/2025-06-20T13:17:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/scattered-spider/2025-06-23T12:08:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/church-shooting-averted/2025-06-24T14:40:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/red-flag-law-texas/2025-06-25T09:17:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/Terror-Arrests-EU/2025-06-26T10:13:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/lawsuit-against-tennesee-ban-immigrant-harboring/2025-06-27T08:56:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/june/firefighter-shooting/2025-06-30T12:18:25-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/advertise-archives/advertise2020/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/april-strange-security/2025-05-01T12:21:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/recruitment-red-flags/2025-05-02T09:02:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/lady-gaga-concert-threats/2025-05-05T10:13:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/copper-thefts/2025-05-06T13:18:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/Conclave-Security/2025-05-07T12:39:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/deepfake-generators/2025-05-09T07:16:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/europol-operation-poweroff/2025-05-08T14:13:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/illicit-opioid-use/2025-05-12T12:46:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/white-collar-crime-FBI/2025-05-13T13:10:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/employer-survey/2025-05-14T09:51:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/3-studies-remote-work-preferences/2025-05-20T10:12:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/hate-amplified-vs-judges/2025-05-16T13:35:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/fertility-clinic-attack/2025-05-19T10:59:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/security-consultant-attack/2025-05-20T13:00:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/doge-danger/2025-05-21T13:38:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/milgrim-lischinsky/2025-05-22T12:33:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/Campaign-Hacking-IP-Cameras/2025-05-23T10:39:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/resilient-construction/2025-05-27T11:32:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/employee-turnover/2025-05-28T11:49:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/project-nola-use-under-review/2025-05-29T13:22:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/may/Cryptocurrency-Investors-Up-Security/2025-05-30T11:12:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/nola-heightened-security-super-bowl/2025-02-03T12:34:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/XE-group-vulnerabilities/2025-02-04T11:36:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/executive-protection-trends/2025-02-05T09:34:33-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/orebro-campus-risbergska-shooting/2025-02-06T12:16:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/Government-Security-Professionals-DOGE/2025-02-07T14:13:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/school-grant-priorities/2025-02-10T13:13:23-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/gaza-ceasefire-in-danger-of-crumbling/2025-02-11T10:57:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/fcpa-investigations-pause/2025-02-12T11:50:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/munich-car-crash-into-demonstration/2025-02-13T12:16:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/Looking-for-Love-Romance-Scams/2025-02-14T14:09:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/preliminary-ukraine-peace-talks/2025-02-18T12:54:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/alleged-coup-bolsonaro/2025-02-19T11:06:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/US-Designates-Cartels-as-Terror-Orgs/2025-02-20T12:12:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/Europol-Framework-Ethical-Technology-Use/2025-02-21T12:22:25-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/york-hospital-shooting/2025-02-24T11:39:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/State-Actors-Hacktivists-Critical-Infrastructure-Attacks/2025-02-25T11:47:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/ai-workplace-potential/2025-02-26T11:12:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/german-carnival-IS-threats/2025-02-27T12:40:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/february/February-2025-Strange-Security/2025-02-28T08:55:09-05:00weekly0.5/security-management-magazine/articles/2025/02/asis-research-security-trends/fast-facts/2025-02-24T07:43:58-05:00weekly0.5/security-management-magazine/articles/2025/02/asis-research-security-trends/measuring-security-business-role/2025-02-24T07:43:58-05:00weekly0.5/security-management-magazine/articles/2025/02/asis-research-security-trends/bonus-trends/2025-03-12T14:03:26-04:00weekly0.5/security-management-magazine/articles/2025/02/asis-research-security-trends/curious-about-ai/2025-02-24T07:43:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/vishing/2025-03-03T10:48:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/train-cargo-thefts-on-rise/2025-03-04T11:24:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/terrorism-resurgence/2025-03-05T11:35:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/freedom-shield-accidental-bombing/2025-03-06T11:23:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/ransom-letter-scams/2025-03-07T11:17:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/nonideological-extremism/2025-03-10T12:58:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/tesla-protests/2025-03-11T12:09:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/retail-credential-harvesting/2025-03-12T11:29:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/ntsb-midair-collision-investigation/2025-03-13T13:56:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/Reflections-Pandemic-Response/2025-03-14T14:23:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/north-macedonia-nightclub-fire/2025-03-17T11:02:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/bollywood-movie-India-tensions/2025-03-18T11:39:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/flashpoint-report/2025-03-19T12:27:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/Police-Arrest-Michigan-Suspect/2025-03-20T11:54:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/Fire-London-Substation/2025-03-21T14:08:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/istanbul-mass-protests/2025-03-24T11:47:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/japan-court-dissolves-unification-church/2025-03-25T14:27:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/com-networks/2025-04-07T09:12:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/T2V-cancellation/2025-03-27T15:09:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/drone-corporate-espionage/2025-03-28T11:41:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/march/myanmar-earthquake/2025-03-31T11:44:52-04:00weekly0.5/security-management-magazine/articles/2025/03/research-active-assailants/proactive-active-assailant-intervention/2025-03-24T08:13:47-04:00weekly0.5/security-management-magazine/articles/2025/03/research-active-assailants/fast-facts/2025-03-24T14:47:41-04:00weekly0.5/security-management-magazine/articles/2025/03/research-active-assailants/critical-element-time/2025-03-24T08:13:48-04:00weekly0.5/security-management-magazine/articles/2025/03/research-active-assailants/workplace-violence-fatalities/2025-03-24T08:13:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/strange-security-long-live-pigs/2025-04-01T10:41:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/medical-device-cybersecurity-gaps/2025-04-07T09:11:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/2025-security-threats-in-labor-supply-chains/2025-04-03T14:30:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/Pew-AI-Research/2025-04-07T09:09:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/columbia-arrest-powers/2025-04-14T09:23:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/bypassing-biometric-screening/2025-04-08T14:44:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/east-harlem-gang-war/2025-04-14T09:25:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/jet-set-nightclub-collapse/2025-04-10T13:00:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/goodbye-National-Cryptocurrency-Enforcement-Team/2025-04-11T15:35:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/shapiro-arson-attack/2025-04-14T12:18:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/fake-news-susceptibility/2025-04-15T14:31:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/device-searches-customs/2025-04-16T11:20:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/shutdown-tracking-office/2025-04-17T12:08:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/Son-Sheriffs-Deputy-FSU/2025-04-21T09:08:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/Oklahoma-City-30th-Anniversary/2025-04-18T15:44:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/scam-government-approach/2025-04-21T10:50:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/coeur-dalene-security/2025-04-22T13:57:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/el-paso-gunman-sentencing/2025-04-23T08:17:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/manager-stress/2025-08-27T10:51:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/verizon-dbir-2025/2025-04-25T09:55:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/vancouver-ramming-incident/2025-04-28T14:50:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/Georgia-negligent-security-law/2025-04-29T15:16:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/april/enterprise-ep-spending/2025-04-30T12:44:59-04:00weekly0.5/security-management-magazine/articles/2025/01/burnout/polycrisis-behavioral-consequences/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/surveillance-review/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/editors-note/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/fast-facts-polycrisis/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/jungle-of-trust/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/tackling-burnout/2025-01-01T08:39:57-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/space-exploration-resilience/2025-01-03T13:42:32-05:00weekly0.5/security-management-magazine/articles/2025/01/burnout/social-media-crisis-response/2025-01-28T08:50:35-05:00weekly0.5/security-management-magazine/articles/2025/01/garages/legal-report-parking-liability/2025-01-13T07:48:13-05:00weekly0.5/security-management-magazine/articles/2025/01/garages/fast-facts/2025-01-13T07:48:14-05:00weekly0.5/security-management-magazine/articles/2025/01/garages/lighting-standards/2025-01-13T07:48:14-05:00weekly0.5/security-management-magazine/articles/2025/01/garages/parking-security-solutions/2025-01-13T07:48:14-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/ai-incident-reports/2025-01-21T10:51:20-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/watergate-incident-report/2025-01-20T09:13:54-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/public-private-partnerships/2025-01-20T09:13:54-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/incident-reporting-form-sections/2025-01-20T09:13:54-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/cornerstone-enterprise-risk-management/2025-01-20T09:13:54-05:00weekly0.5/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-security-improvement/2025-02-18T16:41:07-05:00weekly0.5/security-management-magazine/articles/2025/02/convenience-stores/fast-facts/2025-02-10T08:47:07-05:00weekly0.5/security-management-magazine/articles/2025/02/convenience-stores/sheetz-convenience-coordination/2025-02-18T16:40:28-05:00weekly0.5/security-management-magazine/articles/2025/02/convenience-stores/convenience-store-incidents/2025-02-10T07:43:22-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/prioritize-belonging-inclusion/2025-03-01T08:48:10-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/RTO-wellbeing/2025-03-01T08:00:23-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/workplace-safety-training/2025-03-01T08:00:22-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/ally-leadership/2025-03-01T08:00:24-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/executive-order-compliance/2025-03-01T08:00:23-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/editors-note/2025-03-01T08:00:22-05:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/polarized-distrustful-culture/2025-03-10T08:38:19-04:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/national-security-pandemics/2025-03-10T08:38:19-04:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/world-health-organization/2025-03-10T08:38:20-04:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/fast-facts/2025-03-10T08:38:19-04:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/post-covid-security/2025-03-14T16:56:55-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/crafting-metrics-story/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/fast-facts/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/data-journalism/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/shine-beyond-numbers/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/how-to-measure-roi/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/fast-facts/2025-04-14T09:07:42-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-facilities-managers/2025-04-18T15:47:30-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-safety-directors/2025-04-18T15:46:41-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-psychologists/2025-04-18T15:47:48-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-nurses/2025-04-18T15:45:31-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-resource-officers/2025-04-18T15:45:42-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/school-security-partners/2025-04-14T07:59:09-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/fast-facts/2025-04-21T07:47:40-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/measure-sustainability/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/data-backed-proposals-that-resonate/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/csuite-language/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/beyond-greenwashing/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/asis-upskill-finances/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/graffiti-protocols/2025-04-30T12:00:10-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/campus-protest-slu/2025-07-10T13:18:53-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/fast-facts/2025-04-30T12:00:10-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/rules-of-engagement-document/2025-04-30T12:00:10-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/security-for-marches-rallies/2025-04-30T12:00:10-04:00weekly0.5/security-management-magazine/articles/2025/05/extreme-temperatures/extreme-heat-effects/2025-05-12T07:33:42-04:00weekly0.5/security-management-magazine/articles/2025/05/extreme-temperatures/heat-safety-patrols/2025-05-12T07:33:42-04:00weekly0.5/security-management-magazine/articles/2025/05/extreme-temperatures/heat-standards-regulations/2025-05-12T07:33:42-04:00weekly0.5/security-management-magazine/articles/2025/05/extreme-temperatures/fast-facts/2025-05-12T07:33:42-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/broaden-threat-assessments/2025-06-16T08:21:17-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/considerate-executive-protection/2025-06-16T08:21:17-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/fast-facts/2025-06-16T14:37:26-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/six-months-executive-protection/2025-06-16T08:21:17-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/orders-of-protection/2025-06-16T08:21:17-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/fast-facts/2025-06-23T08:48:02-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/federal-regulations-access/2025-06-23T08:48:02-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-egress/2025-06-23T08:48:02-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/inclusive-mindset/2025-06-23T08:48:02-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/emergency-response-plans/2025-06-23T08:48:02-04:00weekly0.5/security-management-magazine/articles/2025/07/career-competency/self-assessment/2025-07-01T18:48:14-04:00weekly0.5/security-management-magazine/articles/2025/07/career-competency/what-csos-prioritize/2025-07-01T08:39:15-04:00weekly0.5/security-management-magazine/articles/2025/07/career-competency/fast-facts/2025-07-01T08:39:15-04:00weekly0.5/security-management-magazine/articles/2025/07/career-competency/upskilling-professional-growth/2025-07-01T08:41:05-04:00weekly0.5/security-management-magazine/articles/2025/07/USIP/timeline/2025-07-21T08:31:50-04:00weekly0.5/security-management-magazine/articles/2025/07/USIP/vendor-vulnerability/2025-07-21T08:31:50-04:00weekly0.5/security-management-magazine/articles/2025/07/USIP/reviving-security/2025-07-21T08:31:50-04:00weekly0.5/security-management-magazine/articles/2025/07/concerts/outdoor-surveillance-trends/2025-07-14T11:49:56-04:00weekly0.5/security-management-magazine/articles/2025/07/concerts/live-event-risk-management/2025-07-14T08:02:07-04:00weekly0.5/security-management-magazine/articles/2025/07/concerts/fast-facts/2025-07-14T08:02:07-04:00weekly0.5/security-management-magazine/articles/2025/07/concerts/outdoor-event-security/2025-07-23T17:26:16-04:00weekly0.5/security-management-magazine/articles/2025/08/threat-assessment/web-of-influence/2025-08-18T08:05:41-04:00weekly0.5/security-management-magazine/articles/2025/08/threat-assessment/fast-facts/2025-08-18T08:05:41-04:00weekly0.5/security-management-magazine/articles/2025/08/threat-assessment/vicarious-targets/2025-08-18T08:54:20-04:00weekly0.5/security-management-magazine/articles/2025/08/threat-assessment/tackling-online-radicalization/2025-08-18T08:05:41-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/security-value-proposition/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/book-club/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/CIA-change-management/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/fast-facts/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/steadily-navigate-organizations-path/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/holistic-security-change/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/team-management-concepts/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/resistance-into-readiness/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/substation-perimeters/2025-10-21T15:14:40-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/project-delivery-conundrum/2025-09-15T07:59:25-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/vehicle-ramming/2025-09-15T07:59:25-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/fast-facts/2025-09-15T07:59:25-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/data-centers/2025-10-21T15:01:55-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/therapy-dogs/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/fast-facts/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/critical-incident-stress-management/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/memorials-rememberance-days/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/5-skills-of-effective-post-incident-security-leaders/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/for-violent-incident-recovery/2025-09-22T08:00:17-04:00weekly0.5/security-management-magazine/articles/2025/10/flooding/fast-facts/2025-10-13T08:56:28-04:00weekly0.5/security-management-magazine/articles/2025/10/flooding/water-emergencies/2025-10-13T08:56:28-04:00weekly0.5/security-management-magazine/articles/2025/10/flooding/flood-risk-assessment/2025-10-13T08:56:28-04:00weekly0.5/security-management-magazine/articles/2025/10/flooding/sustainable-landscaping/2025-10-13T08:56:28-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/employee-terminations/2025-10-20T08:14:55-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/adversarial-personalities/2025-10-20T08:14:55-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/fast-facts/2025-10-20T08:14:55-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/gaslighting/2025-10-20T08:14:55-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/securing-public-spaces/2025-10-20T08:14:56-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/risk-priority-mapping-erm/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/times-of-uncertainty/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/global-disinformation-regulations/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/truth-under-siege/2025-11-01T07:58:52-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/top-10-risks/2025-11-03T08:17:07-05:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/fast-facts/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/esrm-intelligence-geopolitics/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/why-resilience-matters/2025-11-01T07:54:41-04:00weekly0.5/security-management-magazine/articles/2025/11/multitenant/canny-communication/2025-11-10T07:52:47-05:00weekly0.5/security-management-magazine/articles/2025/11/multitenant/layered-access-control/2025-11-10T07:52:47-05:00weekly0.5/security-management-magazine/articles/2025/11/multitenant/fast-facts/2025-11-10T07:52:47-05:00weekly0.5/security-management-magazine/articles/2025/11/multitenant/cpted-must-haves/2025-11-10T07:52:47-05:00weekly0.5/security-management-magazine/articles/2025/11/title-ix-investigations/independent-investigations-help-schools-move-forward-on-title-IX/2025-11-17T08:03:09-05:00weekly0.5/security-management-magazine/articles/2025/11/title-ix-investigations/7-tips-for-conducting-sensitive-interviews-from-a-veteran-investigator/2025-11-17T08:03:09-05:00weekly0.5/security-management-magazine/articles/2025/11/title-ix-investigations/a-title-ix-primer-for-investigators/2025-11-17T08:03:09-05:00weekly0.5/security-management-magazine/articles/2025/11/title-ix-investigations/fast-facts/2025-11-17T08:03:09-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/to_retain_security_talent_start_with_reframing_its_value/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/silent_skills_loud_impact_recruiting_and_retaining_intelligence_talent_in_the_private_sector/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/why_unified_workplaces_are_a_leadership_priority/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/from_officer_to_leader_rethinking_leadership_development_in_security/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/competitive-job-market/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/employee-recognition-program/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/career-growth-strategies/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/guard-retention/2025-12-18T09:36:28-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/executive-skills-video/2025-12-15T08:04:29-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/strange-security-december/2025-01-02T08:48:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/Bourbon-Street-Reopens/2025-01-03T13:02:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/flax-typhoon-integrity-tech/2025-01-06T11:56:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/nation-states-cut-the-cords-in-emerging-form-of-warfare/2025-01-07T13:03:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/los-angeles-fires/2025-01-08T11:15:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/Israel-amenment-13-IPPL/2025-01-09T13:15:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/ATF-Analysis-Firearms-Trafficking/2025-01-10T12:41:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/la-county-wildfires-cost/2025-01-13T12:04:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/reexamining-new-orleans-vehicle-attack/2025-01-14T16:31:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/forced-labor/2025-01-15T11:45:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/israel-hamas-war-ceasefire-proposed/2025-01-16T14:01:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/arctic-blast/2025-01-21T09:44:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/trump-day-one-actions/2025-01-21T16:44:31-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/state-threat-security-risks/2025-01-22T11:20:55-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/germany-hungary-lover-boy-takedown/2025-01-23T13:22:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/Risk-Report-2025/2025-01-24T13:33:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/goma-capture-congo-M23/2025-01-27T12:01:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/ICE-enforcement-actions/2025-01-28T14:31:40-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/dei-executive-order-compliance/2025-01-29T12:31:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/Tragedy-in-the-Potomac/2025-01-30T14:18:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2025/january/strange-security/2025-01-31T14:10:57-05:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/soft-skills-for-CSOs/2023-12-20T09:44:01-05:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/fast-facts-empathy/2023-11-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/emotional-intelligence/2024-01-08T09:27:36-05:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/editors-note/2023-11-01T15:36:56-04:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/communication-lessons-crisis-negotiator/2023-12-20T11:31:46-05:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/culture-cybersecurity-punch/2024-01-16T15:07:50-05:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/behavioral-red-flags-potential-violence/2023-12-20T11:25:01-05:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/device-data-risk-assessment/2024-01-08T10:28:17-05:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/fast-facts-14-questions/2023-11-27T09:21:53-05:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/continuous-physical-risk-assessment/2023-12-15T16:23:06-05:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/philosophy-security-risk-assessment/2024-01-02T12:07:30-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/integration-investigation-speed-retail/2023-12-11T08:25:26-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/2022-retail-employee-theft-video/2023-12-11T08:25:26-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/retail-insiders-steal/2024-01-08T10:17:48-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/retail-intelligence-objectives/2024-01-12T16:12:05-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/technology-solutions-retail-theft/2024-01-02T11:52:49-05:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/internal-theft-sours-retail-relationships/2023-12-12T12:27:37-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-response-escalation/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/board-cyber-scrutiny/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/Cyber-skill-gap-CEOs/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/breaking-silos/2023-12-20T11:15:25-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/video-data-breach-costs/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/infographic-proactive-incident-response/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/cyber-incident-speed/2023-12-20T09:18:53-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/heightened-board-involvement-cybersecurity/2023-12-18T11:49:57-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/options-based-responses-to-violent-threats/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/dark-green-ideologies/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/impact-opportunities-geopolitical-climate/2024-01-01T09:26:49-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/leaderless-resistance/2024-01-01T09:26:49-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/intelligence-to-address-extremism/2024-01-01T09:26:49-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/mental-health-extremism/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/fast-facts-intelligence-gathering/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/levels-of-security-glass/2024-01-01T09:26:49-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/editors-note-untruths/2024-01-08T11:07:40-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/peace-stability-partnerships-with-communities/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/terrorism-sahel/2024-01-01T09:26:49-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/cultural-properties-civil-unrest/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/forensic-tactical-linguistics/2024-01-02T08:34:17-05:00weekly0.5/security-management-magazine/articles/2024/01/extremism/golden-rules-redefining-counterterrorism/2024-01-01T09:26:48-05:00weekly0.5/security-management-magazine/articles/2024/01/k9/k9-security-detect-deter-deescalate/2024-01-15T08:17:02-05:00weekly0.5/security-management-magazine/articles/2024/01/k9/k9-security-trauma-therapy/2024-01-16T15:35:56-05:00weekly0.5/security-management-magazine/articles/2024/01/k9/video-how-dogs-noses-work/2024-01-15T08:17:02-05:00weekly0.5/security-management-magazine/articles/2024/01/k9/popular-working-dogs-for-security/2024-01-15T08:17:02-05:00weekly0.5/security-management-magazine/articles/2024/01/healthcare-cybersecurity/healthcare-cybercriminals-patient-health/2024-01-22T13:56:24-05:00weekly0.5/security-management-magazine/articles/2024/01/healthcare-cybersecurity/AI-automation-insider-risks/2024-01-22T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/01/healthcare-cybersecurity/cyberattack-patient-safety/2024-01-22T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/01/healthcare-cybersecurity/fast-facts-healthcare-cyberattacks/2024-01-24T11:11:54-05:00weekly0.5/security-management-magazine/articles/2024/02/wpv-retail/soft-skills-retail-safety/2024-02-12T07:52:54-05:00weekly0.5/security-management-magazine/articles/2024/02/wpv-retail/practical-steps-retail-employees-safe/2024-02-12T07:52:54-05:00weekly0.5/security-management-magazine/articles/2024/02/wpv-retail/infographic-shoplifter-aggression/2024-02-12T07:52:54-05:00weekly0.5/security-management-magazine/articles/2024/02/wpv-retail/fast-facts-safe-retail-workers/2024-02-12T07:52:54-05:00weekly0.5/security-management-magazine/articles/2024/02/access-control/fast-facts/2024-02-19T09:01:41-05:00weekly0.5/security-management-magazine/articles/2024/02/access-control/infographic-visitor-management-aspects/2024-03-25T08:56:19-04:00weekly0.5/security-management-magazine/articles/2024/02/access-control/ways-to-make-access-control-more-effective/2024-03-25T08:55:25-04:00weekly0.5/security-management-magazine/articles/2024/02/access-control/getting-visitor-management-right/2024-02-19T09:01:42-05:00weekly0.5/security-management-magazine/articles/2024/02/access-control/access-control-consultants/2024-02-19T09:01:42-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/early-detection-privacy/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/code-compliant-school-security/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/school-security-layers/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/4-strategic-steps/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/crisis-intervention-in-schools/2025-03-25T12:37:20-04:00weekly0.5/security-management-magazine/articles/2024/03/schools/case-study-key-cabinet-school-security/2024-03-04T09:29:40-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/editors-note-collaborative-teams/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/k12-safety-challenges-technology-design/2024-03-01T09:45:40-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/fast-facts-behaviors-of-concern/2024-03-01T09:45:08-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/context-perception-school-security/2024-03-01T09:44:57-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/school-principals-band-together/2024-03-01T09:44:41-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/weighing-development-k12-risk-assessment/2024-03-01T11:32:19-05:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/soft-target-balancing-act/2024-03-11T08:14:48-04:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/fast-facts-soft-target/2024-03-11T08:14:48-04:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/crash-ratings-101/2024-03-11T08:14:47-04:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/active-assailants-open-spaces/2024-03-11T08:14:48-04:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/fire-door-modifications/2024-03-11T08:14:48-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/fast-facts/2024-03-21T08:40:13-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/infographic-CSF-worldwide/2024-03-18T08:22:51-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/NIST-top-of-your-list/2024-03-18T08:22:51-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/improving-on-a-good-thing-NIST/2024-03-18T08:22:51-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/how-peers-use-NIST-CSF/2024-03-18T08:22:51-04:00weekly0.5/security-management-magazine/articles/2024/04/cannabis/fast-facts-crash-and-grab/2024-04-15T07:58:31-04:00weekly0.5/security-management-magazine/articles/2024/04/cannabis/alarming-trends-in-cannabis-crime/2024-04-16T17:01:10-04:00weekly0.5/security-management-magazine/articles/2024/04/cannabis/access-control-fundamentals/2024-04-15T07:32:01-04:00weekly0.5/security-management-magazine/articles/2024/04/cannabis/secure-storage-cannabis-standard/2024-04-15T07:32:02-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/casino-safety-guidelines/2024-04-22T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/fast-facts/2024-04-22T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/guest-services-to-mitigate-security-risks/2024-04-22T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/concierge-guarding-skills-QA/2024-04-22T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/the-art-of-concierge-guarding/2024-04-22T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/difficult-workplace-conversations/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/infographic-employee-support/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/fast-facts/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/ed-note-overcome-workplace-dysfunction/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/confronting-weight-bias/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/is-your-workplace-toxic/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/publicly-humiliating-events/2024-05-02T09:55:00-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/promote-positive-workplace-culture/2024-05-01T07:29:40-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/famous-zoo-escapes/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/biosecurity-in-zoos/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/zoo-security-standards/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/columbus-zoo-rekeying/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/zoo-weapon-response-teams/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/fast-facts-avian-influenza/2024-05-13T08:16:05-04:00weekly0.5/security-management-magazine/articles/2024/05/audio/fast-facts/2024-05-20T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/05/audio/daily-commute-duty-of-care/2024-05-20T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/05/audio/gunshot-detection/2024-05-20T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/05/audio/audio-marketplace/2024-05-20T08:56:55-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/crisis-preparedness-plan/2024-06-17T12:05:57-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/fast-facts-fake-news/2024-06-17T08:05:09-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/deepfakes-in-todays-digital-landscape/2024-06-17T08:05:09-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/deepfake-frauds-cryptocurrency/2024-06-17T08:05:09-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/generative-ai-crimes/2024-06-17T08:05:09-04:00weekly0.5/security-management-magazine/articles/2024/06/food/beverage-fraud/2024-06-24T08:08:35-04:00weekly0.5/security-management-magazine/articles/2024/06/food/fast-facts-food-defense/2024-06-24T08:08:27-04:00weekly0.5/security-management-magazine/articles/2024/06/food/food-fraud-types/2024-06-24T08:08:18-04:00weekly0.5/security-management-magazine/articles/2024/06/food/beverage-corruption-recapping/2024-06-24T08:08:10-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/translate-language-security-career-transition/2023-08-31T08:00:58-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/professional-coach-hybrid-work-challenges/2023-08-31T12:38:09-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/fast-facts-professional-development/2023-08-31T09:41:52-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/qa-workforce-skills-for-future-of-security/2023-08-31T08:00:59-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/mission-first-people-always/2024-01-12T11:39:13-05:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/editors-note-workforce-of-the-future/2023-08-31T08:00:59-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/first-time-managers/2023-08-31T08:00:59-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/be-better-mentor/2023-08-31T08:00:59-04:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/asis-career-resources/2023-08-31T08:00:59-04:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/swarm-leadership-boston-marathon-bombing-response/2024-01-16T15:02:47-05:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/training-pre-and-post-boston-bombing/2024-01-08T10:16:28-05:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/scalable-event-management-phoenix-style/2023-11-01T12:37:47-04:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/retrospective-event-stadium-security/2023-11-01T12:37:08-04:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/steps-to-improve-situational-awareness-at-events/2023-11-01T12:36:03-04:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/boston-marathon-bombing-timeline/2023-12-19T11:39:57-05:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/fast-facts-incident-response-tech/2023-09-11T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/09/esrm/influence-in-esrm-maturity/2023-11-01T12:29:16-04:00weekly0.5/security-management-magazine/articles/2023/09/esrm/esrm-maturity/2023-11-01T12:28:54-04:00weekly0.5/security-management-magazine/articles/2023/09/esrm/key-roles-esrm/2023-11-01T12:28:02-04:00weekly0.5/security-management-magazine/articles/2023/09/esrm/fast-facts-esrm-benefits/2023-11-01T12:26:33-04:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/retrofit-vs-upgrade/2023-10-26T10:13:55-04:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/site-survey/2023-09-25T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/infographic-elements-facility-risk-assessment/2024-01-16T15:04:20-05:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/complex-design-elements/2024-01-02T12:19:17-05:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/what-is-cpted/2023-10-02T08:25:05-04:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/irreplaceable-aspects-security-system-design/2023-11-01T13:15:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/strange-security-august-2023/2023-09-01T11:06:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/moroccan-tourists-killed-in-algerian-waters/2023-09-05T10:26:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/cop-city-rico-charges/2023-09-06T11:23:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/prison-escape-roundup-2023/2023-09-07T13:02:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/Militants-Attack-Military-Camps-Civilian-River-Boat-in-Mali/2023-09-08T11:38:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/roundup-morocco-quake-europol-crime-more/2023-09-11T10:01:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/roundup-security-spending-new-covid-shots/2023-09-12T09:47:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/roundup-floods-in-libya-deepfakes/2023-09-13T10:14:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/legal-roundup/2023-09-14T10:02:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/bringing-down-the-house/2023-09-19T09:56:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/belgian-school-arson/2023-09-18T11:20:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/drone-swarms-good-bad-and-terrifying/2023-12-14T12:59:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/australia-bushfire-summer/2023-09-20T11:07:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/Killing-of-Sikh-Activist-Strains-Canada-India-Relations/2023-09-21T12:03:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/Civil-Rights-Group-Files-Suit/2024-01-02T11:28:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/facial-recogntion-soccer-club/2023-09-25T11:59:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/lax-oversight-marijuana-online-sales/2023-09-26T12:14:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/Middle-east-salary-survey/2023-09-27T12:15:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/sport-survey-findings-2023/2023-09-28T12:01:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/september/Suicide-Bombings-Disturb-Celebrations-in-Pakistan-in-Latest-String-of-Violent-Attacks/2023-09-29T11:32:42-04:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/drowsy-driving-risk/2023-10-16T08:04:16-04:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/telematics-road-safety/2023-10-16T13:00:51-04:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/road-travel-safety/2023-10-16T08:04:16-04:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/fast-facts-secondary-crashes/2023-10-16T08:04:16-04:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/infographic-risky-roads/2023-10-16T08:04:16-04:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/effective-separations-alumni/2023-12-13T11:29:44-05:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/workplace-violence-employee-separations/2024-01-08T10:27:20-05:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/pathway-to-violence-video/2023-10-23T07:58:34-04:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/key-types-terminations/2024-01-12T16:10:18-05:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/lawful-firing-in-UK/2023-11-01T12:19:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/strange-security-wine-and-cell-phones/2023-10-02T13:44:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/un-endorses-kenya-mission-to-haiti/2023-10-03T11:39:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/cyber-budget-growth/2023-10-04T10:30:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/america-on-strike/2023-10-05T15:11:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/California-Workplace-Violence-Prevention/2023-12-15T16:03:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/hamas-attack-on-israel-has-global-ramifications/2024-01-08T10:22:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/firearms-confiscated-us-schools/2023-10-11T13:36:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/europol-2023-hackathon/2024-01-12T11:18:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/security-company-sues-air-canada/2023-10-16T09:35:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/extremist-tensions-israel-hamas-war/2023-10-16T11:32:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/fbi-data-says-us-less-violent/2023-10-17T11:02:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/catalytic-converter-theft-scheme/2023-10-18T10:51:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/oil-conference-protest/2023-10-19T11:35:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/police-footage-of-chinese-consulate-attacker/2023-10-20T12:48:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/CEO-geopolitical-strategy/2023-12-15T16:00:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/europol-quantum-computing/2023-10-24T10:54:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/hurricane-otis-hits-mexico/2023-10-25T12:46:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/maine-mass-shootings/2023-10-26T11:57:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/european-wind-power-security/2023-10-27T11:05:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/AI-executive-order-2023/2023-10-30T13:20:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/october/strange-security-absurd-october-2023/2023-10-31T11:27:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/gaza-medical-evacuations/2023-11-01T11:59:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/sec-charges-solarwinds/2024-01-02T11:33:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/sam-bankman-fried-conspiracy-fraud/2024-01-12T11:18:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/red-flags-mass-shooters/2023-12-20T09:53:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/italy-albania-announce-agreement/2023-11-07T13:53:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/brian-jeffrey-raymond-guilty-plea-deal/2024-01-02T11:56:18-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/gambino-crime-family-arrests/2023-12-20T11:21:19-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/cyberattack-australian-ports/2023-11-13T11:21:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/polysubstance-drug-use/2023-11-14T10:21:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/climate-change-damage/2023-11-15T12:46:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/gridex-2023/2023-12-20T11:52:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/atm-bomb-thieves-netherlands-germany/2024-01-12T10:58:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/security-officer-new-hampshire-hospital/2024-01-12T16:14:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/Houthi-Seize-Ship-in-Red-Sea/2024-01-08T09:45:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/europol-osint-taskforce-ukraine-russia/2024-01-12T16:13:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/hamas-israel-ceasefire/2023-11-27T12:13:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/guidelines-to-ensure-AI-security/2023-11-28T13:32:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/finland-closing-borders-with-russia/2024-01-08T10:48:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/november/shoplifting-research-ccj/2023-11-30T10:55:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/November-strange-security-news/2023-12-20T11:41:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/russia-lgbtq-extremist/2024-01-08T09:10:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/retail-security-officer-dies-in-philadelphia/2023-12-05T12:38:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/drone-strike-kaduna-maulud/2023-12-06T15:19:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/23andme-data-breach/2023-12-13T10:42:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/microsoft-russian-disinformation-ukraine-report/2024-01-08T10:18:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/MA-lawsuit-NSC-131-harassment/2023-12-11T12:31:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/news-on-china-highlights-extensive-role/2024-01-08T10:20:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/netherlands-counterterrorism/2023-12-20T11:23:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/EU-AI-Act-deal/2023-12-14T14:27:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/hong-kong-activist-bounty/2023-12-15T11:14:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/michigan-state-mass-shooting-settlement/2024-01-02T12:28:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/SEC-final-material-incident-report-rules/2023-12-19T11:35:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/sudan-civil-war/2023-12-20T15:42:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/strange-security-helpers/2023-12-21T14:54:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/2023-editors-favorite-articles/2023-12-22T06:00:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/december/what-were-watching/2023-12-22T06:00:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/july-2023-strange-security/2023-08-01T14:54:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/trump-obstruction-indictment/2023-08-02T12:07:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/niger-coup-evacuations/2023-08-03T12:20:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/NYC-Couple-Pled-Guilty-to-Conspiring/2023-08-04T10:54:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/tanker-tensions/2023-08-07T13:12:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/china-announces-facial-recognition-regulations/2024-01-02T12:22:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/scotus-ghost-gun-regulation/2023-08-09T10:47:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/greece-croatia-violence-uefa-champions-league/2023-08-14T13:26:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/Ecuador-Arrests-Six-Suspected-Villavicencio/2023-08-11T11:27:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/hawaii-wildfires/2023-08-14T10:59:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/radicalism-persists-in-afghanistan/2023-08-15T15:55:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/beta-testing-app-scam/2023-08-16T11:06:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/British-Museum-Launches-Security-Review/2023-08-17T12:16:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/Twenty-Thousand-People-Ordered-to-Evacuate/2023-08-18T11:16:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/multinational-cyber-investigation-africa/2023-08-21T11:44:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/influence-of-CSPOA-increasing/2023-08-22T11:49:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/extreme-weather-fries-midwest/2023-08-23T11:38:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/prigozhin-plane-crash/2023-08-24T11:51:14-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/EU-Regulations-Go-into-Effect/2023-08-25T11:12:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/jacksonville-shooting/2023-08-28T11:51:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/polish-pranksters-or-russian-saboteurs/2023-08-29T09:43:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/human-trafficking-cyber-fraud-mills/2023-08-30T12:26:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/august/us-shooting-roundup/2023-08-31T13:24:41-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/workplace-rules-dei/2023-07-03T07:45:57-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/infographic-elements-workplace-inclusion/2023-07-03T16:01:48-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-decisions-and-morale/2023-07-03T07:45:57-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/talent-sourcing-in-physical-security/2023-07-03T07:45:56-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/fast-facts-microaggressions/2023-07-06T08:34:32-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/dei-business-sustainability/2024-01-02T12:34:18-05:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/women-at-work-narrative/2023-07-03T07:45:58-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/invest-in-inclusion/2024-01-08T10:42:54-05:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/wrongful-detention-consulate-action/2023-07-24T08:07:59-04:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/security-challenges-travel-professionals/2023-07-24T08:07:59-04:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/work-travel-espionage/2023-07-24T08:07:59-04:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/fast-facts-travel-risk-indicators/2023-07-24T08:07:59-04:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/train-travelers-wrongful-detention-risks/2024-01-02T12:36:13-05:00weekly0.5/security-management-magazine/articles/2023/07/nonprofit-security/fast-facts-ransomware-payment-stages/2023-07-17T08:06:12-04:00weekly0.5/security-management-magazine/articles/2023/07/nonprofit-security/csos-eye-nonprofit-security-challenges/2023-07-17T10:19:51-04:00weekly0.5/security-management-magazine/articles/2023/07/nonprofit-security/ransomware-attacks-on-nonprofits/2024-01-02T11:35:25-05:00weekly0.5/security-management-magazine/articles/2023/07/nonprofit-security/best-practices-for-preventing-ransomware/2023-07-17T08:06:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/heat-wave-deaths/2023-07-03T12:37:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/independence-day-mass-shootings/2023-07-05T10:39:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/Japans-Busiest-Port-Restarts-Operations/2023-07-06T12:02:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/South-Korean-Officials-Green-Light-Plan-to-Release-Fukushima-Wastewater/2023-07-07T12:55:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/el-paso-shooter-sentencing/2023-07-10T11:56:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/eu-us-reach-another-privacy-agreement-2023/2023-07-11T13:32:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/cyber-espionage-attack-email/2023-07-12T11:40:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/extreme-climate-round-up-2023/2023-07-13T13:08:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/White-House-Releases-Plan-To-Implement-National-Cybersecurity-Strategy/2023-07-14T12:15:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/black-sea-grain-deal-food-insecurity/2023-07-17T12:55:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/law-allows-french-authorities-access/2023-07-19T10:54:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/cyber-labeling-program/2023-07-19T10:39:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/New-Zealand-Shooting-Leaves-Three-Dead/2023-07-20T12:41:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/Major-Tech-Companies-Commit-to-Voluntarily-Regulate-Development-of-AI/2023-07-21T12:41:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/NYC-Protest-Settlement/2023-07-24T12:32:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/protests-erupt-in-israel-over-judicial-reforms/2023-07-25T12:34:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/brussels-bombing-trial/2023-07-26T11:44:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/scientists-july-record-heat/2023-07-27T12:22:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/SEC-Adopts-New-Cyber-Disclosure-Rules/2023-12-15T16:05:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/july/student-bullying-death-lawsuit/2023-07-31T12:24:29-04:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/Drones-fire-management/2025-01-27T16:03:10-05:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/the-diversification-of-the-drone-market/2025-01-27T16:02:53-05:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/types-of-UAS/2023-05-22T08:05:58-04:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/security-implications-drones/2025-01-27T16:02:22-05:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/weaponized-drones/2023-10-31T21:21:53-04:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/fast-facts/2023-10-31T16:12:43-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/editors-note/2023-05-01T08:25:19-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/future-proofing/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/strategy-development/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/analyzing-business/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/robust-risk-management/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/lead-with-doubt/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/pyramid-of-skills/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/from-cso-to-sse/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/fast-facts/2023-05-01T08:29:03-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/infographic-people-skills/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/parametric-insurance/2023-05-15T06:35:02-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/climate-security-connections/2023-05-15T06:35:02-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/climate-change-violence-nexus/2023-12-15T16:00:00-05:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/sea-level-rise-infographic/2023-05-15T09:49:46-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/business-continuity-climate-change/2023-05-15T06:35:02-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/fast-facts-protests/2023-05-15T08:27:32-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/lake-chad-terrorism/2024-01-02T12:41:47-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/sudan-evacuations/2023-05-01T11:32:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/search-for-fugitive-continues/2023-05-02T10:42:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/serbia-school-shooting/2023-05-03T10:41:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/atlanta-shooting-healthcare-facility/2023-05-08T13:07:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/operation-pandora-vii/2023-05-05T15:49:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/covid-emergency-status/2023-05-08T12:28:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/violence-in-manipur-india/2023-05-09T12:03:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/snake-malware/2023-05-10T10:07:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/US-border-issues-as-title-42-ends/2023-05-11T12:55:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/organized-retail-crime/2023-05-12T12:36:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/Not-So-Happy-Meal-Suit/2023-05-15T17:12:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/dark-web-illuminates-threats-to-energy-companies/2023-05-16T12:37:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/Creating-an-Upstander-Culture/2023-05-17T15:17:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/may-2023-legal-round-up/2023-05-18T16:14:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/El-Nino-Greenhouse-Gases-Temperatures/2023-05-19T11:16:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/vehicle-theft-settlement/2023-05-22T11:44:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/china-deepfake-fraud-and-ai-laws/2023-05-23T13:21:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/what-a-worker-wants/2023-05-24T08:15:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/target-pride-backlash/2023-05-25T10:33:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/Record-Fine-Against-Meta/2023-05-26T12:45:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/Uganda-anti-gay-law/2023-05-30T12:53:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/may/may-2023-strange-security-animals-behaving-badly/2023-05-31T11:54:58-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/refocus-school-security-investments/2023-10-31T17:13:53-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/steps-for-school-safety-reporting/2023-10-31T17:12:28-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/infographic-risk-reporting-questions/2023-10-31T17:12:10-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/grant-writing-best-practices/2023-10-31T17:11:00-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/lessons-for-strong-school-security-culture/2024-01-08T09:13:17-05:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/prescott-schools-proactive-security/2023-10-31T17:09:55-04:00weekly0.5/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/seeking-revenue-cartel-fuel-thefts/2024-01-02T12:17:47-05:00weekly0.5/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/cartel-homicides-infographic/2023-06-14T10:08:22-04:00weekly0.5/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/fast-facts/2023-06-12T08:21:15-04:00weekly0.5/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/petroleum-jargon/2023-06-12T08:07:11-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/amazon-privacy-violation/2023-06-01T12:48:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/armed-school-security/2023-06-02T09:01:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/india-train-collision/2023-06-05T10:34:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/California-property-insurance-and-climate-change/2023-06-06T12:06:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/operation-fake-star/2023-06-07T10:41:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/mitigating-smoke-exposure/2023-06-08T14:29:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/verizon-dbir/2023-06-09T12:20:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/ip-thefts-on-the-rise/2023-06-12T14:03:46-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/biased-gender-social-norms-undervalue-women/2023-06-13T15:36:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/Alone-Together-Diffuse-Actors/2023-06-14T13:07:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/slow-eruption-from-Philippines-volcano/2023-06-15T11:43:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/Flight-Path-Compromised/2023-06-16T12:47:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/quiet-quitting-and-disengagement-persist/2023-06-20T10:26:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/natsec-cyber/2023-06-21T11:29:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/PWFA-effective-June-27/2023-06-22T13:34:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/strange-security-meets-golf-june-2023/2023-06-30T12:05:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/africa-terrorism-hotspot/2023-06-23T12:39:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/unodc-2023-world-drug-report/2023-06-26T12:16:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/U.S.-Agencies-Failure-of-Imagination/2023-06-27T12:36:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/threatening-language-ruling-scotus/2023-06-28T11:01:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/France-to-Deploy-40000-Police/2023-06-29T12:03:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/june/Florida-Jury-Acquits-Former-Parkland-SRO/2023-06-30T12:14:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/richneck-shooting-lawsuit/2023-04-03T15:35:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/Crowds-Gather-in-New-York-as-Trump-Faces-Charges/2023-04-04T16:33:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/TikTok-fine/2023-04-05T11:30:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/doj-settlement-sutherland-spring-church-shooting/2023-04-07T12:22:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/afghanistan-evacuation/2023-04-07T13:15:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/leaked-document-investigation/2023-04-10T11:43:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/louisville-bank-shooting/2023-04-11T12:17:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/xylazine-threat/2023-04-12T10:27:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/Classified-Leak-Is-Result-of-Man-Trying-to-Impress-Online-Group-of-Friends/2023-04-19T07:55:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/French-Security-Teams-Restrict-Access/2023-04-14T12:38:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/fentanyl-trafficking-charges/2023-04-19T11:13:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/US-Takes-Action-Against-Secret-Chinese-Police-Station-Operating-in-Manhattan/2023-04-18T11:17:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/DOD-classified-materials-investigation/2023-04-19T09:05:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/Sudan-civil-war/2023-04-21T11:04:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/Partnerships-People-Technology-Working-Together/2023-04-21T12:36:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/german-airport-strike/2023-04-24T10:33:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/When-It-Comes-to-Cyber-Protection-Cooperation-May-Be-the-Best-Defense/2023-04-25T11:22:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/ukraine-tech-cluster-drones/2023-04-26T12:16:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/doj-active-shooter-report-2022/2023-04-28T11:09:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/april/april-2023-strange-security/2023-04-28T11:49:55-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/february/2021-11-15T14:51:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/april/2021-11-15T14:51:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/june/2021-11-15T14:51:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/august/2021-11-15T14:51:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/october/2021-11-15T14:51:29-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2021/december/2021-11-29T16:09:40-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/february/2023-02-01T14:05:21-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/april/2025-03-17T12:21:17-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/june/2023-06-01T12:32:43-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/august/2023-08-21T12:11:36-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/october/2023-10-03T10:44:16-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2023/december/2023-11-30T14:01:30-05:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/mass-layoff-insider-threat/2023-12-15T16:01:52-05:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/types-of-insider-threats/2023-04-19T11:09:42-04:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/avoiding-layoff-mistakes/2023-04-17T09:17:25-04:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/WARN-Act-Layoffs/2023-04-17T09:17:22-04:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/after-snowden/2024-01-08T09:36:23-05:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/insider-threat-costs/2023-12-13T13:58:51-05:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/operational-insider-threat-strategies/2023-04-17T09:20:48-04:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/how-to-reduce-friction-in-fraud-prevention/2023-04-17T09:36:58-04:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/shaping-workplace-violence-mitigation-strategies/2025-01-27T16:01:36-05:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/principles-workplace-violence-prevention/2025-01-27T16:01:12-05:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/patient-room-video-technology/2025-01-27T16:00:56-05:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/hospital-hazardous-environments/2025-01-27T16:00:35-05:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/healthcare-framework/2023-04-24T08:30:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2023/01/focus-on-bomb-threats/2023-01-25T15:57:11-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2023/01/pipeline-security/2023-01-25T16:39:00-05:00weekly0.5/security-management-magazine/articles/2023/02/reputation-security/fast-facts-forces-behind-polarization/2023-02-13T09:43:04-05:00weekly0.5/security-management-magazine/articles/2023/02/reputation-security/infographic-who-do-we-trust/2023-02-13T08:22:31-05:00weekly0.5/security-management-magazine/articles/2023/02/reputation-security/redesigning-pandoras-box/2023-02-13T08:22:03-05:00weekly0.5/security-management-magazine/articles/2023/02/reputation-security/steps-to-build-protect-rebuild-trust-in-brand/2023-02-13T08:24:33-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/how-a-new-working-group-is-supporting-security-mental-health/2023-02-20T08:40:53-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/types-of-trauma-direct-vs-indirect/2024-04-08T08:39:45-04:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/teller-trauma/2023-02-20T08:40:53-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/6-ways-to-prioritize-security-mental-health/2024-01-08T10:02:57-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/how-to-shore-up-personal-resilience-against-vicarious-trauma/2023-12-15T16:01:19-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/common-signs-of-vicarious-trauma/2023-02-20T08:40:52-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/covid-drove-counterfeit-markets-online/2023-02-01T12:45:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/chaos-in-haiti-leaves-conspirators-facing-charges-in-US/2023-02-02T12:26:53-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/Peshawar-Mosque-Bomber-Gained-Access-with-Police-Officer-Disguise/2023-02-03T11:13:11-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/search-and-rescue-underway-turkey-syria-earthquake/2023-02-09T16:57:39-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/Domestic-Terrorists-Targeted-Baltimores-Electrical-Grid/2023-02-07T12:49:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/millions-at-risk-glacial-lake-floods/2023-02-08T11:39:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/europol-2023-sex-trafficking-takedown/2023-02-09T12:44:50-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/Earthquake-Response-Search-and-Rescue-Continues/2023-02-10T15:42:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/four-high-altitude-objects-shot-down/2023-02-13T11:52:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/ICS-2022-in-Review/2023-02-14T12:00:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/private-security-company-principals-arrested-haitian-assassination/2023-02-15T12:20:17-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/umc-el-paso-shootings/2023-02-16T14:17:57-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/US-Department-of-Justice-Forms-Disruptive-Technology-Strike-Force/2023-02-17T12:44:58-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/Train-Derailment-Has-Far-Reaching-Implications/2023-02-21T14:29:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/mexican-security-leader-convicted/2023-02-22T11:57:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/winter-storm-series-Olive/2023-02-23T13:29:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/One-Year-Later-Ukrainian-Security-Practitioners-Reflect-on-Invasion-Anniversary/2023-02-24T13:35:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/FATF-updates-watchlist/2023-02-28T08:17:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/february/strange-security-february-2023/2023-02-28T08:19:18-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/5-ways-to-connect-with-boards-of-directors-about-cybersecurity-and-digital-transformation/2025-01-27T15:59:37-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/how-to-leverage-metrics-and-benchmarking/2025-01-27T15:59:25-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/questions-to-ask-peers-business-value/2025-01-27T15:59:10-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/rise-of-the-ai-chatbot/2023-03-01T09:57:56-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/how-to-make-your-pitch-more-convincing/2025-01-27T15:58:37-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/profits-from-professionalism/2025-01-27T15:58:12-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/how-to-establish-and-defend-preventative-maintenance-plan/2025-01-27T15:57:52-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/why-unifying-security-systems-helps-make-your-case-to-csuite/2025-01-27T15:57:25-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/how-to-measure-risk-monitoring-activities/2025-01-27T15:57:12-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/steps-to-improve-presentation-skills/2023-03-01T08:02:06-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/strategies-for-long-term-buy-in/2025-01-27T15:56:43-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/choosing-convincing-colors/2023-03-01T08:02:06-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/infographic-threat-monitoring/2023-03-20T08:16:57-04:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/steps-to-mitigate-crime-risk/2025-01-27T15:50:22-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/fast-facts/2023-03-20T08:16:57-04:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/PRAY-model/2025-01-27T15:50:00-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/intelligence-collection/2025-01-27T15:49:49-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/underlying-extremism-motivations/2025-01-27T15:49:37-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/extremism-against-places-of-worship/2025-01-27T15:49:14-05:00weekly0.5/security-management-magazine/articles/2023/03/investigations/remote-interview-dynamics/2025-01-27T15:51:28-05:00weekly0.5/security-management-magazine/articles/2023/03/investigations/fast-facts-investigative-pillars/2023-03-27T08:31:35-04:00weekly0.5/security-management-magazine/articles/2023/03/investigations/infographic-investigation-elements/2023-03-27T07:57:44-04:00weekly0.5/security-management-magazine/articles/2023/03/investigations/investigation-bias/2025-01-27T15:51:04-05:00weekly0.5/security-management-magazine/articles/2023/03/investigations/international-investigations/2025-01-27T15:50:52-05:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/emergency-kit-tips/2023-03-20T11:10:48-04:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/government-coordinated-evacuation/2023-03-13T09:09:43-04:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/emergency-evacuation-policy/2023-03-13T09:09:43-04:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/wildfire-evacuation-basics/2023-03-13T09:09:43-04:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/emergency-evacuations/2023-03-13T09:09:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/deadline-to-delete-tiktok/2023-03-01T11:39:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/manchester-inquiry/2023-03-02T14:48:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/New-National-Cybersecurity-Strategy-Shifts/2023-03-03T12:27:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/gang-violence-haiti/2024-01-08T08:58:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/23-Cop-City-Protestors-Arrested-Face-Charges-of-Domestic-Terrorism/2023-03-07T13:45:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/cartel-abduction/2023-03-08T11:51:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/2023-annual-threat-assessment-us-intelligence/2023-03-09T13:57:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/Turkey-Election-Moved-Up-as-Earthquake-Recovery-Response-Efforts-Continue/2023-03-10T14:33:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/asylum-seekers/2023-03-13T11:32:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/fbi-hate-crimes-data/2023-03-14T13:27:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/ic3-2022-report/2023-03-15T12:06:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/UN-Watchdog-More-than-2-Tons-of-Natural-Uranium-Missing/2023-03-16T11:26:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/french-retirement-protests/2023-03-17T13:45:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/ipcc-report/2023-03-20T12:16:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/Authorities-Prepare-for-Unrest-in-Case-Manhattan-DA-Charges-Trump/2023-03-21T14:22:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/met-police-report/2023-03-22T12:04:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/california-tornado-5-dead/2023-03-23T09:48:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/antisemitism-united-states-2022/2023-03-24T09:46:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/UK-child-strip-searches/2023-03-27T11:01:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/Shooter-Kills-Six-at-Nashville-Private-Elementary-School/2023-03-28T11:22:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/US-Executive-Order-Bans-Government-Use-of-Commercial-Spyware/2023-03-28T14:05:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/Europol-Research-Shares-How-ChatGPT/2023-12-14T12:51:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/deadly-mexico-migrant-center-fire-38-dead/2023-03-30T13:17:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2023/march/March-2023-strange-security/2023-04-03T12:49:18-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/fast-facts/2024-11-01T13:46:36-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/deescalation-communication/2024-11-01T13:45:27-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/editors-note-metacognition/2024-11-01T13:45:16-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/broset-violence-checklist/2024-11-01T13:45:05-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/emotional-dysregulation/2024-11-01T13:44:52-04:00weekly0.5/security-management-magazine/articles/2024/11/cpted/cpted-legislation-florida/2024-11-11T06:18:45-05:00weekly0.5/security-management-magazine/articles/2024/11/cpted/fast-facts/2024-11-11T06:18:33-05:00weekly0.5/security-management-magazine/articles/2024/11/cpted/hostile-vegetation/2024-11-11T06:18:20-05:00weekly0.5/security-management-magazine/articles/2024/11/cpted/activity-generators/2025-05-06T14:50:49-04:00weekly0.5/security-management-magazine/articles/2024/11/cpted/global-conflict-crime-prevention/2024-11-11T06:17:55-05:00weekly0.5/security-management-magazine/articles/2024/11/cpted/landscaping-cpted/2024-11-11T06:17:44-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/private-investigator-career/2024-11-18T06:06:16-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/state-of-occupational-fraud/2024-11-18T06:06:16-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/tipline-elements/2024-11-21T13:49:13-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/internal-fraud-investigations/2024-11-18T13:12:38-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/fast-facts/2024-11-18T06:10:34-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/fraud-investigation-team-roles/2024-11-18T06:06:16-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/loan-fraud-detection/2024-11-18T06:06:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/risk-appetites-influence/2024-01-02T13:00:24-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/south-korea-knife-attack/2024-01-03T13:50:41-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/statehouse-bomb-threat-hoax/2024-01-12T11:20:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/iran-kerman-twin-bombings/2024-01-05T13:24:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/UN-economic-forecast/2024-01-08T12:05:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/explosion-in-fort-worth/2024-01-16T15:16:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/equador-declares-state-of-emergency/2024-01-16T09:25:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/disinformation-risk-election-year/2024-01-11T12:50:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/ebay-spiders-cockroaches/2024-01-16T09:23:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/yemen-houthi-militants-disrupt-shipping/2024-01-16T11:17:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/lgbtq-nightclub-shooter-federal-plea-agreement/2024-01-17T12:46:02-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/sro-use-mental-health-schools/2024-01-22T08:50:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/uvalde-school-shooting-doj-report/2024-01-19T13:35:35-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/remote-work-emergency-directive/2024-01-22T11:58:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/dangerous-court-storming-tradition/2024-01-30T15:55:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/dating-attacks-colombia/2024-01-24T12:04:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/malaga-luxury-theft-arrest/2024-02-01T09:08:34-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/Audit-Finds-GSA-Purchased-Non-Compliant-Cameras/2024-01-31T14:43:10-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/CISO-growing-pains/2024-01-29T11:36:09-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/farmers-lay-siege-to-paris/2024-01-30T11:38:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/january/jan2024-strange-security/2024-01-31T12:54:08-05:00weekly0.5/security-management-magazine/articles/2023/08/esg/integrating-esg-into-security-management/2024-01-08T09:48:28-05:00weekly0.5/security-management-magazine/articles/2023/08/esg/infographic-esg-organizational-value/2023-08-14T08:10:04-04:00weekly0.5/security-management-magazine/articles/2023/08/esg/esg-primer-for-security-practitioners/2023-08-14T08:10:05-04:00weekly0.5/security-management-magazine/articles/2023/08/esg/esrm-principles-for-esg-initiatives/2023-08-14T08:10:05-04:00weekly0.5/security-management-magazine/articles/2023/08/esg/esg-fast-facts/2023-08-14T08:10:05-04:00weekly0.5/security-management-magazine/articles/2023/08/cryptocurrency/money-laundering-crypto/2023-11-01T12:53:56-04:00weekly0.5/security-management-magazine/articles/2023/08/cryptocurrency/infographic-trends-in-cryptocurrency-crime/2023-11-01T12:51:41-04:00weekly0.5/security-management-magazine/articles/2023/08/cryptocurrency/fast-facts-crypto-investment-scam/2024-01-02T12:06:25-05:00weekly0.5/security-management-magazine/articles/2023/08/cryptocurrency/How-digital-currency-changes-crime/2024-01-02T12:27:02-05:00weekly0.5/security-management-magazine/articles/2024/12/red-team/stress-test-security-programs/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/articles/2024/12/red-team/hybrid-architecture/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/articles/2024/12/red-team/fast-facts/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/articles/2024/12/red-team/lock-design-rules/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/articles/2024/12/red-team/cross-silo-red-team-findings/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/february/2024-02-08T15:08:14-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/april/2024-04-25T09:41:02-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/june/2024-06-01T08:47:13-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/August/2024-07-31T14:12:15-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/october/2024-11-07T11:33:31-05:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2024/december/2024-12-04T10:37:33-05:00weekly0.5/security-management-magazine/articles/2024/07/convergence/5-critial-controls-for-industrial-system-security/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/water-utility-converged-defense/2024-07-01T16:06:51-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/emerging-technology-asymmetric-threats/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/GridEx-planning/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/fast-facts/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/editors-note-uncertainty/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/convergence-in-utilities-industry/2024-07-01T13:22:16-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/diversifying-supply-chains/2024-07-15T08:08:23-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/fast-facts-crisis-management/2024-07-15T08:08:23-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/value-of-resilience/2024-07-15T08:08:23-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/create-crisis-managment-team/2024-07-15T08:08:24-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/disaster-medicine-resilience/2024-07-15T08:08:24-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/crisis-response-playbook/2024-07-15T08:08:24-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/adjust-your-expectations/2025-06-11T12:17:49-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/steps-to-prepare-for-new-position/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/drive-private-sector-employee-growth/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/Public-sector-experience-for-security-technology/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/corporate-vernacular-translated/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/Two-year-map-for-career-transitions/2025-05-07T12:41:23-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/transitioning-from-police-work-to-business-world/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/fast-facts-resumes/2025-06-11T12:18:29-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/cross-sector-culture-differences-will-knehr/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/editors-note/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/anders-noyes/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/scott-wolford/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/james-mehta/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/fast-facts-socs/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/what-to-avoid-soc-planning/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/modernizing-socs/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/gsoc-evolution/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/in-house-virtual-SOC/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/why-ergonomics-matter-in-socs/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/create-an-effective-SOC/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/centralized-secaas/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/ATM-crime-risks/2024-09-16T20:31:52-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/1930s-robbery-investigations/2024-09-16T08:24:34-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/historical-heists/2024-09-16T08:24:34-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/robbery-data-infographic/2024-09-16T08:24:34-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/robbery-deterrence/2024-09-16T08:24:34-04:00weekly0.5/security-management-magazine/articles/2024/08/biometrics/employee-resistance-biometrics/2024-08-12T08:18:11-04:00weekly0.5/security-management-magazine/articles/2024/08/biometrics/fast-facts/2024-08-12T08:18:11-04:00weekly0.5/security-management-magazine/articles/2024/08/biometrics/presentation-attack-detection/2024-08-12T08:18:11-04:00weekly0.5/security-management-magazine/articles/2024/08/biometrics/biometric-ROI-myths/2024-08-12T08:18:11-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/fast-facts/2024-08-19T11:27:12-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/mitigating-active-shooter-risk/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/training-documentation-checklist/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/security-guard-risk-mitigator/2024-09-13T10:38:43-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/security-company-litigation-protection/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/who-owns-sb553-implementation/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/5-reasons-security-gets-sued/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/polling-place-security/2024-10-21T12:42:31-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/fast-facts/2024-10-21T12:42:19-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/foreign-influence-attacks/2024-10-21T12:42:08-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/election-riot-concerns/2024-10-21T12:41:56-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/attorney-judge-threats/2024-10-21T12:41:37-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/politically-charged-threats/2024-10-21T12:41:24-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/culture-security-differentiator/2024-10-22T08:11:14-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/culture-informed-training/2024-10-21T08:15:26-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/workplace-safety-training/2024-10-21T08:15:27-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/fast-facts/2024-10-21T08:15:27-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/new-technology-security-culture/2024-10-21T08:15:27-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/cultura-diferenciador/2024-10-21T08:15:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Data-Commissioner-Rules-UKs-GPS-Monitoring-Of-Migrants-Is-Illegal/2024-03-01T17:11:44-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/gang-violence-haiti-jailbreak/2024-03-04T11:23:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/appeals-court-dei-ruling/2024-03-11T09:00:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/clery-act-liberty-university-fine/2024-03-06T12:15:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/yemen-houthis-fatal-missile-strike-True-Confidence/2024-03-11T09:01:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Investigation-Finds-Uvalde-Police-Officers-Acted-in-Good-Faith/2024-03-11T17:52:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/EU-drug-market-resilience/2024-03-11T12:49:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/annual-report-from-us-intel-agencies/2024-03-12T14:42:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/lgbtq-hate-crimes-in-schools/2024-03-13T10:19:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/EU-AI-Act-passes/2024-03-19T11:24:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/ICE-to-Require-Agents-Wear-Body-Worn-Cameras/2024-03-18T08:41:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Grindavik-Blue-Lagoon-evacuated-after-Icelandic-volcano-erupts/2024-03-18T14:19:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/paris-olympics-security-challenges/2024-03-19T13:55:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Hong-Kong-Passes-National-Security-Law/2024-03-21T08:31:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/epa-white-house-water-threats/2024-03-21T15:51:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Security-Vulnerability-Allows-Attackers-Unlock-Hotel-Rooms/2024-03-22T14:57:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/terror-attack-in-russia/2024-03-25T11:04:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/baltimore-bridge-collapses/2024-03-26T10:41:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/apt31-hacking-group-charges/2024-03-27T11:50:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/2024-disinformation-efforts/2024-04-02T09:33:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/march/Analyzing-the-Occupational-Fraud-Problem/2024-04-01T12:49:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/Strange-Security-Roundup/2024-04-02T08:51:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/world-central-kitchen-air-strike/2024-04-02T11:16:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/eclipse-planning-and-safety/2024-04-03T11:07:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/taiwan-earthquake-recovery-efforts/2024-04-05T11:26:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/Europol-Identifies-Characteristics-Most-Threatening/2024-04-05T11:25:52-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/drone-attack-power-plant-ukraine/2024-04-09T10:25:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/crime-spree-targeting-small-museums/2024-04-10T09:04:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/feds-thwart-idaho-church-attack/2024-04-11T11:22:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/bate-urgessa-assassination/2024-04-11T11:49:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/us-measles-outbreak/2024-04-12T12:50:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/australia-mall-stabbing/2024-04-15T11:57:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/protesters-block-traffic/2024-04-16T11:45:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/GAO-fraud-estimates/2024-04-17T10:57:53-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/germany-arrests-two-russian-spies/2024-04-19T11:01:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/DOE-Extends-Title-IX-Protections/2024-04-22T08:39:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/protest-roundup/2024-04-22T13:44:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/how-to-overcome-stigma-about-mental-health-programs/2024-04-24T10:57:57-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/FTC-noncompete-agreements/2024-04-24T12:30:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/The-Number-of-Women-in-Cyber/2024-04-25T12:12:24-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/global-state-of-hunger/2024-04-29T08:34:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/olympics-security-contractors/2024-04-29T10:46:43-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/april/strange-security-animal-edition/2024-04-30T10:14:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/Suspect-Charged-in-Assassination-Attempt/2024-05-17T10:58:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/DHS-critical-infrastructure-guidance/2024-05-01T12:32:08-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/2024-us-treasury-state-sanctions/2024-05-03T08:59:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/Verizon-DBIR-Compromised/2024-05-03T12:04:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/deadly-flooding/2024-05-06T12:24:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/boeing-employees-falsify-reports/2024-05-07T10:43:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/FDIC-toxic-workplace/2024-05-08T11:28:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/attacks-against-german-politicians/2024-05-09T12:20:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/Meeting-the-AI-Moment/2024-05-10T10:01:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/gun-theft-from-vehicles/2024-05-13T11:11:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/memes-highlight-threat-to-financial-systems/2024-05-14T11:44:16-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/Slovak-Prime-Minister-Fico-Shot/2024-05-15T10:56:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/MIT-brothers-charged-with-stealing-$25-million-from-bots/2024-05-16T12:10:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/iran-president-helicopter-crash/2024-05-20T11:39:44-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/EPA-issues-alert-on-cyber-vulnerabilities-of-water-supply/2024-05-21T11:04:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/mexico-heat-wave-2024/2024-05-22T13:06:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/uvalde-city-settlement/2024-05-23T11:11:25-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/NOAA-Predicts-Above-Normal-Hurricane-Season/2024-05-24T11:13:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/new-caledonia-unrest/2024-05-28T12:34:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/FTC-impersonation-fraud/2024-05-29T11:03:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/EU-invetigators-move-against-Russian-bribes/2024-05-30T12:07:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/may/judge-juror-safety-measures/2024-05-31T13:26:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/may-2024-strange-security/2024-06-03T10:49:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/federal-fraud-trial-attempted-bribe/2024-06-04T11:38:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/mass-migration-extremism-climate/2024-06-05T11:14:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/navex-2024-whistleblower-report/2024-06-06T09:58:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/French-Police-Arrest-Man/2024-06-07T13:35:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/north-korea-trash-balloons-south-korea-k-pop/2024-06-10T13:50:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/european-parliamentary-elections/2024-06-11T12:55:41-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/chiquita-colombia-AUC-lawsuit/2024-06-12T12:25:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/work-injuries-dei/2024-06-13T12:05:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/Germany-Ramps-Up-Security-Efforts-as-UEFA-EURO-2024-Begins/2024-06-14T14:03:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/baghdad-counterterrorism-vandals-restaurants/2024-06-17T13:34:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/cautious-optimism-on-global-business/2024-06-18T11:34:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/heat-dome/2024-06-20T11:52:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/NYPD-Officers-Responding-Unconfirmed-Gunshots/2024-06-21T13:11:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/More-than-1300-Die-During-Hajj/2024-06-24T12:21:26-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/FBI-active-shooter-data/2024-06-25T13:00:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/indonesia-ransomware/2024-06-26T11:27:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/one-fifth-of-workers-report-daily-loneliness/2024-06-28T07:58:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/june/2024-security-leadher/2024-06-27T12:18:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/June-2024-Strange-Security/2024-07-01T08:31:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/california-sb553-workplace-violence-prevention/2024-07-02T13:14:20-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/DOL-proposed-heat-safety-rule/2024-07-03T11:19:27-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/boeing-fraud-guilty-plea-deal/2024-07-08T11:50:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/companies-slow-to-deploy-safety-technology/2024-07-09T12:18:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/ai-bot-farm-russian-disinformation/2024-07-10T11:03:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/nato-summit-2024-china-enabler-to-russia/2024-07-11T12:52:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/Hotel-Operator-Fires-Security-Personnel/2024-07-12T16:15:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/trump-assassination-political-violence/2024-07-15T14:46:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/copa-america-football-final-security-breaches/2024-07-16T14:21:48-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/houston-line-worker-threats/2024-07-17T11:22:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/doweedos-fda-ftc/2024-07-18T12:19:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/secret-service-scrutiny-assassination-attempt/2024-07-19T14:54:58-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/crowdstrike-software-error/2024-07-22T14:53:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/cheatle-testimony-assassination-attempt/2024-07-23T10:59:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/security-incidents-as-paris-olympics-set-to-begin/2024-07-24T12:25:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/ny-school-shooting-drills-too-realistic/2024-07-25T12:52:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/Arsonits-Attack-Rail-Lines-in-France/2024-07-26T13:00:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/golan-heights-rocket-strike/2024-07-29T11:56:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/cost-of-data-breach/2024-07-30T12:09:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/july/association-risk-management/2024-07-31T12:18:44-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/risk-management-infographic/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/research-summary/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/security-job-descriptions-risk-management/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/consultant-risk-management-shortcomings/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/fast-facts/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/school-hate-crimes/2024-02-01T11:53:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/china-critical-infrastructure-FBI/2024-02-05T08:36:05-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/chile-wildfires/2024-02-05T12:10:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/US-border-crisis-reaches-far-from-border/2024-02-06T12:48:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/crumbley-school-shooting-verdict/2024-02-07T09:48:42-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/ransomware-payments/2024-02-08T09:43:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/FCC-Bans-Robocalls-Using-AI-Generated-Voices/2024-02-09T11:55:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/texas-AM-closure-qatar/2024-02-12T11:51:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/former-employee-attacks-office-in-greece/2024-02-13T10:22:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/antisemitism-safety-survey/2024-02-14T09:48:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/kc-chiefs-superbowl-parade-shooting/2024-02-15T13:21:30-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/fraudsters-leverage-AI-in-2024/2024-02-16T13:55:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/lockbit-ransomware-disrupted/2024-02-20T11:42:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/dual-national-detained-russia/2024-02-21T11:15:54-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/isoon-data-leak/2024-02-22T14:22:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/Rising-Global-Tensions-Make-Industrial-Environments-Ripe-Target/2024-02-25T14:45:00-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/complexities-global-security-market-report/2024-02-26T14:05:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/cyber-defense-agencies-issue-cloud-computing-alert/2024-02-27T11:35:51-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/sensitive-data-for-sale/2024-02-28T13:08:38-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/february/February-Strange-Security-Long-Read-Edition/2024-02-29T12:03:49-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/strange-security-summer-of-weirdness/2024-08-01T13:58:13-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/Massive-Prisoner-Exchange/2024-08-02T14:12:28-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/misinformation-southport-stabbing/2024-08-05T11:29:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/nfl-stadiums-to-use-facial-recognition/2024-08-06T11:17:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/Former-Hotel-Employees-Charged-with-Murder/2024-08-07T13:43:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/aha-hisac-joint-bulletin-post-ransomware-attacks/2024-08-08T13:57:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/swift-concerts-canceled-terrorism/2024-08-09T12:33:55-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/UK-Authorities-Arrest-Suspect-for-Stabbing/2024-08-12T11:44:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/auto-theft-united-states-fbi/2024-08-13T12:11:05-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/sham-raid-extortion/2024-08-14T12:08:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/mpox-2024-outbreak-global-health-emergency-WHO/2024-08-15T15:39:09-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/orlando-businesses-attacked-by-gaza-protestor/2024-08-16T10:07:40-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/national-public-data-breach/2024-08-19T13:22:47-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/peaceful-protests-at-DNC/2024-08-20T10:05:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/lewiston-maine-shooting-commission-findings/2024-08-21T11:14:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/california-gets-tough-on-retail-crime/2024-08-23T08:32:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/diamond-shruumz-recall/2024-08-22T12:28:19-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/cbp-pregnancy-discrimination-case/2024-08-26T12:45:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/founder-of-telegram-app-arrested-in-france/2024-08-27T08:12:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/south-africa-corruption-investigations/2024-08-28T12:46:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/outbreak-summer-in-the-united-states/2024-08-29T13:39:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/august/California-Passes-Major-AI-Regulation/2024-08-30T11:16:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/strange-security-drugs-in-strange-places/2024-09-03T11:47:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/grenfell-tower-inquiry/2024-09-04T09:47:15-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/apalachee-school-shooting/2024-09-05T13:14:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/US-Charges-5-GRU-Officers-1-Civilian-With-Conspiracy/2024-09-06T09:42:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/RWSA-retail-workplace-violence/2024-09-09T09:16:54-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/indictment-provides-insight-into-white-supremacist-terror/2024-09-10T18:03:51-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/Insider-Interference/2024-09-13T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/prison-strip-search-settlement/2024-09-11T11:34:56-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/typhoon-yagi-aftermath-vietnam/2024-09-12T13:20:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/trump-assassination-attempt-golf-course/2024-09-16T10:44:23-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/what-will-the-future-of-work-look-like/2024-09-17T13:20:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/Creating-a-Safe-Space/2024-09-20T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/pager-attack-supply-chain/2024-09-18T11:44:01-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/SM-at-GSX/2024-09-23T07:36:06-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/europol-ameripol-joint-phishing-dismantling/2024-09-19T13:16:42-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/improving-museum-security/2024-09-27T09:01:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/september/outsourcing-in-security/2024-09-30T11:39:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/How-the-biden-administration-memo-affects-private-sector/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/strange-security/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/where-conflict-in-middle-east-is-headed/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/dhs-2024-homeland-threat-assessment/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/Federal-Jury-Convicts-Three-Former-Memphis-Police-Officers/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/socioeconomic-risk-dirty-bomb/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/water-utility-experiences-cyber-incident/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/skills-shortage-cybersecurity/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/hurricane-milton-helene/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/TD-Bank-Pled-Guilty/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/chinese-north-korean-actions-underscore-volatility/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/california-retail-crime/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/rtx-950-million-fine/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/ATM-attack-arrests/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/CISO-executive-support-risk/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/cuba-power-outage-hurricane-oscar/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/DOJ-Unseals-Charges-Against-Four-Iranians/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/europol-operation-opson-xiii/2024-10-25T12:59:59-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/APA-survey-american-stress/2024-10-28T12:24:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/delta-crowdstrike-deuling-lawsuits/2024-10-29T12:55:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/healthcare-security-survey/2024-10-30T11:55:22-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/october/October-strange-security/2024-10-31T11:14:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/Cyber-Practitioners-Look-to-Become-More-Strategic/2024-11-01T13:03:00-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/secret-service-rally-security-gaps/2024-11-04T12:20:32-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/russian-plot-to-sabotage-cargo-transport/2024-11-05T10:24:04-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/drone-substation-attack/2024-11-06T10:19:43-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/europol-29-arrests-money-laundering-drug-traffickers/2024-11-07T11:23:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/Amsterdam-Initiates-Security-Crack-Down/2024-11-08T13:18:46-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/man-drives-vehicle-into-community-exercise-facility/2024-11-12T12:40:56-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/soccer-matches-anti-israel-protests/2024-11-13T16:25:03-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/2024-ballot-measure-roundup/2024-11-14T10:20:13-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/Valencia-Leader-Admits-Mistakes/2024-11-15T12:15:22-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/epa-november-warning-water-cybersecurity-risks/2024-11-18T13:25:48-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/Smog-shuts-down-new-delhi/2024-11-19T11:44:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/CISA-Releases-New-Guidance-Venue-Security/2024-11-20T14:00:12-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/jan-6-rioter-murder-conspiracy-conviction/2024-11-21T10:44:19-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/Intelligence-Agencies-Warn-Defense-Industrial-Base/2024-11-22T12:45:20-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/AI-malware-scam/2024-11-25T10:32:16-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/former-employee-allegedly-hid-expenses/2024-11-26T11:46:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/november/blue-yonder-ransomware/2024-11-27T10:36:06-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/strange-security-november/2024-12-02T10:50:27-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/AI-enable-esrm-growth/2024-12-03T12:43:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/salt-typhoon/2024-12-04T12:27:14-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/unitedhealthcare-executive-protection/2024-12-12T12:42:18-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/IAIS-GMIR-2024/2024-12-05T13:08:33-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/McKinsey-Subsidiary-to-Pay-to-Resolve-Investigation/2024-12-06T11:46:15-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/fragmented-world/2024-12-09T12:08:08-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/alleged-unitedhealthcare-assassin-captured/2024-12-10T13:21:59-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/job-satisfaction/2024-12-11T08:46:40-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/nfl-nba-player-homes-burglarized-fbi/2024-12-12T12:32:26-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/aftermath-CEO-attack/2024-12-13T15:06:07-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/cyber-leader-skill-gaps/2024-12-16T11:01:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/surge-of-drone-reports/2024-12-17T12:46:01-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/EU-Terror-Incidents-Rose/2024-12-18T12:23:45-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/SM-favorites-of-2024/2024-12-20T09:04:37-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/favorite-articles/2024-12-23T08:20:28-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2024/december/workplace-injuries-trends-brookings/2024-12-19T13:37:21-05:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/health-officials-strive-to-fend-off-ebola-outbreak-in-democratic-republic-of-congo/2020-06-23T19:16:45-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/bulgarian-records-exposed-data-breach/2020-06-23T19:17:02-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/ebola-outbreak-republic-of-congo/2020-06-23T19:17:03-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/british-airways-faces-record-fine-for-data-breach/2020-06-23T19:17:04-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/two-us-festivals-attacked-over-weekend/2020-06-23T19:17:07-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/small-planes-at-risk-for-cyberattack/2020-06-23T19:17:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/july/GAO-discusses-2020-census-risks/2020-06-23T19:17:12-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/labor-department-new-retirement-rule/2020-06-23T19:17:17-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/weekend-mass-shooting-domestic-terrorism/2020-06-23T19:49:38-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/What-Policies-May-Arise-from-Weekend-Tragedies/2020-06-23T19:49:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/fbi-arrests-weapon-hoarding-teen/2020-06-23T19:49:49-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/nfl-security-head-shares-leadership-and-learning-guidance/2020-06-23T19:49:50-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/americans-largely-approve-of-airport-biometrics-for-security/2020-06-23T19:50:10-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/eighty-charged-in-massive-online-fraud-scheme/2020-06-23T19:50:18-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/us-military-failing-to-track-installation-access/2020-06-23T19:50:21-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/georgia-mandates-ransomware-training-for-state-employees/2020-06-23T19:50:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/Armed-Man-Creates-Chaos-at-Missouri-Walmart/2020-06-23T19:50:29-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/NIST-releases-draft-security-recommendations-for-iot-devices/2020-06-23T19:50:30-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/hackers-used-websites-to-gain-access-to-iphones-for-years/2020-06-23T19:50:31-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/google-and-uber-engineer-facing-criminal-charges/2020-06-23T19:50:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/hurricane-warning-issued/2020-06-23T19:50:32-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/assessing-the-risk-of-third-parties/2020-06-23T19:50:33-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/detective-kate-warne/2020-06-23T19:50:34-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/us-drone-shot-down-over-yemen/2020-06-23T19:50:35-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/partnerships-with-local-first-responders/2020-06-23T19:50:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/child-abuse-lawsuits-filed-in-new-york/2020-06-23T19:50:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/protests-close-hong-kong-airport/2020-06-23T19:50:36-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/increasing-floods-leave-the-uninsured-vulnerable/2020-06-23T19:50:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/august/security-history-hattie-lawton/2020-06-23T19:50:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/june/industrial-security-day/2020-06-23T19:50:39-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/may/security-history-haymarket-affair/2020-06-23T19:50:37-04:00weekly0.5/security-management-magazine/latest-news/today-in-security/2019/may/the-bath-school-bombing/2020-06-23T19:50:38-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/june/2019-08-23T09:40:54-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/march/2019-08-23T10:42:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/September/2019-08-23T10:32:19-04:00weekly0.5/security-management-magazine/monthly-issues/security-technology/archive/2019/december/2019-12-01T06:00:11-05:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/the-dark-web-protecting-brand-reputation-and-assets/2018-05-31T18:04:34-04:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/managing-data-extortion-crises/2018-05-31T18:05:01-04:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/business-continuity-preparing-for-the-aftermath-of-an-active-shooter-incident/2018-05-31T18:05:13-04:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/best-practices-to-prevent-workplace-violence/2018-05-31T18:05:29-04:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/aviation-lessons-on-combating-insider-threat/2018-05-31T14:49:19-04:00weekly0.5/security-news/news/asis-tv/gsx-session-spotlights/medical-cannabis-security/2018-06-08T11:43:22-04:00weekly0.5/security-news/news/asis-tv/gsx-exhibitor-profiles/johnson-controls-2018/2018-05-31T18:04:20-04:00weekly0.5/security-news/news/asis-tv/gsx-exhibitor-profiles/orion-entrance-control-2018/2018-05-31T18:08:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/july/2019-08-28T09:38:23-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/june/2019-08-28T09:38:08-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/august/2019-08-28T09:38:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/may/2019-08-28T09:37:53-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/april/2019-08-28T09:37:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/march/2019-08-28T09:37:24-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/february/2019-08-28T09:37:10-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/january/2019-08-28T09:36:11-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/september/2019-08-28T18:10:14-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/october/2019-10-01T07:38:54-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/november/2019-10-24T11:33:15-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2019/december/2019-12-01T08:34:59-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/january/2019-08-28T09:42:04-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/february/2019-08-28T09:41:45-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/march/2019-08-28T09:41:24-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/april/2019-08-28T09:41:05-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/may/2019-08-28T09:43:23-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/june/2019-08-28T09:42:24-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/july/2019-08-28T09:40:46-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/august/2019-08-28T09:40:26-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/september/2019-08-28T09:40:10-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/october/2019-08-28T09:39:54-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/november/2019-08-28T09:39:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2018/december/2019-08-28T09:39:22-04:00weekly0.5/security-management-magazine/articles/2019/07/retailers-prepare-for-active-assailants/2023-04-28T11:24:48-04:00weekly0.5/security-management-magazine/articles/2019/07/under-pressure-managing-team-wellness/2020-06-23T19:16:37-04:00weekly0.5/security-management-magazine/articles/2019/07/july-legal-report/2020-06-23T19:16:46-04:00weekly0.5/security-management-magazine/articles/2019/07/border-burnout/2020-06-23T19:16:49-04:00weekly0.5/security-management-magazine/articles/2019/07/companies-look-to-retain-cyber-talent/2020-06-23T19:16:51-04:00weekly0.5/security-management-magazine/articles/2019/07/how-culture-influences-disaster-recovery/2024-01-12T16:17:12-05:00weekly0.5/security-management-magazine/articles/2019/07/bringing-back-power-to-puerto-rico/2020-06-23T19:16:56-04:00weekly0.5/security-management-magazine/articles/2019/07/book-review-click-here-to-kill-everybody/2020-06-23T19:16:58-04:00weekly0.5/security-management-magazine/articles/2019/07/editors-note-human-problems/2020-06-23T19:17:10-04:00weekly0.5/security-management-magazine/articles/2019/07/July-2019-SM-online/2020-06-23T19:17:11-04:00weekly0.5/security-management-magazine/articles/2019/07/no-vacancy-for-human-trafficking/2020-06-23T19:49:39-04:00weekly0.5/security-management-magazine/articles/2019/07/a-security-revolution/2020-06-23T19:49:39-04:00weekly0.5/security-management-magazine/articles/2019/07/who-owns-the-san-jose-galleon/2024-01-08T09:34:01-05:00weekly0.5/security-management-magazine/articles/2019/07/july-2019-asis-news/2020-06-23T19:49:52-04:00weekly0.5/security-management-magazine/articles/2019/07/book-review-reducing-crime-a-companion-for-police-leaders/2020-06-23T19:49:52-04:00weekly0.5/security-management-magazine/articles/2019/07/book-review-security-and-loss-prevention/2020-06-23T19:49:53-04:00weekly0.5/security-management-magazine/articles/2019/07/certification-profile-garrett-packett-cpp/2020-06-23T19:49:54-04:00weekly0.5/security-management-magazine/articles/2019/07/july-2019-industry-news/2020-06-23T19:49:54-04:00weekly0.5/security-management-magazine/articles/2019/07/flashback-to-1959/2020-06-23T19:49:55-04:00weekly0.5/security-management-magazine/articles/2019/08/Threat-Actors-Increasingly-Target-The-C-Suite/2020-06-23T19:49:41-04:00weekly0.5/security-management-magazine/articles/2019/08/managing-business-traveler-health-and-safety/2020-06-23T19:49:42-04:00weekly0.5/security-management-magazine/articles/2019/08/gao-recommends-nuclear-terrorism-prevention-program-assessment/2020-06-23T19:49:43-04:00weekly0.5/security-management-magazine/articles/2019/08/investigators-team-up-to-battle-cross-border-financial-crime/2020-06-23T19:49:44-04:00weekly0.5/security-management-magazine/articles/2019/08/how-chicagos-willis-tower-is-renovating-security/2020-06-23T19:49:46-04:00weekly0.5/security-management-magazine/articles/2019/08/for-business-continuity-accept-the-unexpected/2023-01-30T15:36:56-05:00weekly0.5/security-management-magazine/articles/2019/08/announcing-the-2019-asis-book-of-the-year/2024-10-04T16:42:01-04:00weekly0.5/security-management-magazine/articles/2019/08/august-2019-sm-online/2020-06-23T19:49:47-04:00weekly0.5/security-management-magazine/articles/2019/08/editors-note-perfect-timing/2020-06-23T19:49:48-04:00weekly0.5/security-management-magazine/articles/2019/08/using-your-own-story/2022-02-02T12:16:58-05:00weekly0.5/security-management-magazine/articles/2019/08/book-review-brand-under-fire/2020-06-23T19:49:55-04:00weekly0.5/security-management-magazine/articles/2019/08/Book-Review-GDPR-Compliance/2020-06-23T19:49:56-04:00weekly0.5/security-management-magazine/articles/2019/08/august-2019-asis-news/2020-06-23T19:49:56-04:00weekly0.5/security-management-magazine/articles/2019/08/certification-profile-jean-charles-gris-cpp/2020-06-23T19:49:56-04:00weekly0.5/security-management-magazine/articles/2019/08/August-2019-Industry-News/2020-06-23T19:49:56-04:00weekly0.5/security-management-magazine/articles/2019/08/get-to-know-malcolm-smith-cpp/2020-06-23T19:49:57-04:00weekly0.5/security-management-magazine/articles/2019/08/book-review-homeland-security/2020-06-23T19:49:57-04:00weekly0.5/security-management-magazine/articles/2019/08/legal-report-august-2019/2020-06-23T19:49:57-04:00weekly0.5/security-management-magazine/articles/2019/08/climate-change-as-a-national-security-threat/2020-06-23T19:49:58-04:00weekly0.5/security-management-magazine/articles/2019/08/case-study-the-silent-sensors/2020-06-23T19:49:58-04:00weekly0.5/security-management-magazine/articles/2019/08/august-2019-marketplace/2020-06-23T19:50:17-04:00weekly0.5/security-management-magazine/articles/2019/06/digital-threats-to-high-value-targets/2023-04-21T14:28:37-04:00weekly0.5/security-management-magazine/articles/2019/06/Corruption-and-culture/2020-06-23T19:16:59-04:00weekly0.5/security-management-magazine/articles/2019/06/young-and-incarcerated/2020-06-23T19:17:00-04:00weekly0.5/security-management-magazine/articles/2019/06/danger-on-two-wheels/2020-06-23T19:17:00-04:00weekly0.5/security-management-magazine/articles/2019/06/june-editors-note-warnings/2020-06-23T19:17:06-04:00weekly0.5/security-management-magazine/articles/2019/06/June-2019-SM-Online/2020-06-23T19:17:07-04:00weekly0.5/security-management-magazine/articles/2019/06/your-first-90-days-as-a-new-leader/2023-12-13T10:55:16-05:00weekly0.5/security-management-magazine/articles/2019/06/Extremist-Attacks-Rise-as-Polarization-Increases/2020-06-23T19:17:10-04:00weekly0.5/security-management-magazine/articles/2019/06/cryptojacking-outpaces-ransomware-attacks/2020-06-23T19:17:13-04:00weekly0.5/security-management-magazine/articles/2019/06/security-lessons-learned-from-hurricane-harvey/2020-06-23T19:17:17-04:00weekly0.5/security-management-magazine/articles/2019/06/Case-study-panic-bars-in-california-college/2020-06-23T19:17:18-04:00weekly0.5/security-management-magazine/articles/2019/06/june-2019-legal-report/2020-06-23T19:17:19-04:00weekly0.5/security-management-magazine/articles/2019/06/four-emerging-trends-in-casino-and-gaming-security/2020-06-23T19:17:20-04:00weekly0.5/security-management-magazine/articles/2019/06/june-2019-industry-news/2020-06-23T19:17:21-04:00weekly0.5/security-management-magazine/articles/2019/06/certification-profile-joseph-souza-cpp-psp/2020-06-23T19:17:21-04:00weekly0.5/security-management-magazine/articles/2019/06/june-2019-asis-news/2020-06-23T19:17:22-04:00weekly0.5/security-management-magazine/articles/2019/06/book-review-murder-in-the-classroom-a-practical-guide-for-prevention/2020-06-23T19:17:24-04:00weekly0.5/security-management-magazine/articles/2019/06/book-review-global-security/2020-06-23T19:17:26-04:00weekly0.5/security-management-magazine/articles/2019/06/book-review-anthrax-attacks/2020-06-23T19:17:27-04:00weekly0.5/security-management-magazine/articles/2019/06/book-review-cyber-threat-intelligence/2020-06-23T19:17:27-04:00weekly0.5/security-management-magazine/articles/2017/12/held-hostage/2020-06-23T19:18:09-04:00weekly0.5/security-management-magazine/articles/2017/12/leading-while-female/2019-08-27T09:59:22-04:00weekly0.5/security-management-magazine/articles/2017/12/a-new-social-world/2019-08-27T09:56:39-04:00weekly0.5/security-management-magazine/articles/2017/12/looking-back-a-year-of-change/2019-08-27T10:05:31-04:00weekly0.5/security-management-magazine/articles/2017/12/call-for-help/2019-08-21T14:40:38-04:00weekly0.5/security-management-magazine/articles/2017/12/an-identity-crisis/2020-06-23T19:18:09-04:00weekly0.5/security-management-magazine/articles/2017/12/grudges/2020-06-23T19:18:10-04:00weekly0.5/security-management-magazine/articles/2017/12/december-2017-industry-news/2019-08-27T10:14:37-04:00weekly0.5/security-management-magazine/articles/2017/12/hire-better/2019-08-27T10:16:28-04:00weekly0.5/security-management-magazine/articles/2017/12/december-2017-legal-report/2019-08-27T10:12:20-04:00weekly0.5/security-management-magazine/articles/2017/12/blurred-lines/2019-08-27T09:31:15-04:00weekly0.5/security-management-magazine/articles/2017/12/cutting-edge-criminals/2020-06-23T19:18:11-04:00weekly0.5/security-management-magazine/articles/2017/12/postal-peculiarities/2019-08-27T09:27:20-04:00weekly0.5/security-management-magazine/articles/2017/12/certification-profile-jose-carlos-degiorgis-cpp/2019-08-27T10:08:04-04:00weekly0.5/security-management-magazine/articles/2017/12/book-review-disaster-volunteers/2019-08-27T09:43:05-04:00weekly0.5/security-management-magazine/articles/2017/12/book-review-safe-hiring/2019-08-27T10:00:07-04:00weekly0.5/security-management-magazine/articles/2017/12/december-2017-sm-online/2019-09-11T14:06:24-04:00weekly0.5/security-management-magazine/articles/2017/12/december-2017-legal-report-resources/2019-08-27T10:21:07-04:00weekly0.5/security-management-magazine/articles/2017/11/november-2017-sm-online/2019-08-27T17:01:01-04:00weekly0.5/security-management-magazine/articles/2017/11/november-2017-legal-report-resources/2019-08-27T16:59:41-04:00weekly0.5/security-management-magazine/articles/2017/11/fake-news-real-threats/2023-02-13T16:39:07-05:00weekly0.5/security-management-magazine/articles/2017/11/the-unseen-threat/2019-08-27T19:27:49-04:00weekly0.5/security-management-magazine/articles/2017/11/the-future-is-flexible/2019-08-27T19:23:52-04:00weekly0.5/security-management-magazine/articles/2017/11/november-2017-asis-news/2019-08-27T19:31:59-04:00weekly0.5/security-management-magazine/articles/2017/11/subway-surveillance/2019-08-27T19:04:46-04:00weekly0.5/security-management-magazine/articles/2017/11/the-zero-day-problem/2019-08-27T19:09:22-04:00weekly0.5/security-management-magazine/articles/2017/11/editors-note-fakery/2019-08-27T17:12:04-04:00weekly0.5/security-management-magazine/articles/2017/11/november-2017-industry-news/2019-08-27T19:41:12-04:00weekly0.5/security-management-magazine/articles/2017/11/november-2017-legal-report/2019-08-27T19:38:41-04:00weekly0.5/security-management-magazine/articles/2017/11/slipping-through-the-cracks/2019-08-27T19:01:24-04:00weekly0.5/security-management-magazine/articles/2017/11/highway-to-hurt/2019-08-27T17:18:36-04:00weekly0.5/security-management-magazine/articles/2017/11/securing-elections/2019-08-27T17:37:29-04:00weekly0.5/security-management-magazine/articles/2017/11/william-j-powers-iii-cpp/2020-08-05T17:01:14-04:00weekly0.5/security-management-magazine/articles/2017/11/book-review-art-of-invisibility/2019-08-27T19:11:35-04:00weekly0.5/security-management-magazine/articles/2017/11/book-review-insider-threats/2019-08-27T18:57:44-04:00weekly0.5/security-management-magazine/articles/2017/11/book-review-bully-proof-workplace/2019-08-27T17:23:13-04:00weekly0.5/security-management-magazine/articles/2017/10/october-2017-sm-online/2019-08-27T17:04:08-04:00weekly0.5/security-management-magazine/articles/2017/10/october-2017-legal-report-resources/2019-08-27T17:05:40-04:00weekly0.5/security-management-magazine/articles/2017/10/the-unique-threat-of-insiders/2020-05-08T13:59:51-04:00weekly0.5/security-management-magazine/articles/2017/10/empowered-international-teams/2019-08-27T20:31:51-04:00weekly0.5/security-management-magazine/articles/2017/10/driving-a-security-transition/2019-08-27T20:24:07-04:00weekly0.5/security-management-magazine/articles/2017/10/october-2017-asis-news-asis-europe-to-tackle-big-data-artificial-intelligence/2019-08-27T20:41:23-04:00weekly0.5/security-management-magazine/articles/2017/10/schoolhouse-guardians/2019-08-27T20:11:49-04:00weekly0.5/security-management-magazine/articles/2017/10/driving-the-business/2020-06-23T19:18:14-04:00weekly0.5/security-management-magazine/articles/2017/10/editors-note-accidents/2019-08-27T19:55:11-04:00weekly0.5/security-management-magazine/articles/2017/10/october-2017-industry-news-supporting-the-troops/2019-08-27T20:51:21-04:00weekly0.5/security-management-magazine/articles/2017/10/employee-theft/2019-08-27T20:35:23-04:00weekly0.5/security-management-magazine/articles/2017/10/october-2017-legal-report-record-keeping-asset-seizures-and-more/2019-08-27T20:44:46-04:00weekly0.5/security-management-magazine/articles/2017/10/mobile-mayhem/2019-08-27T20:06:50-04:00weekly0.5/security-management-magazine/articles/2017/10/stress-test/2019-08-27T19:58:20-04:00weekly0.5/security-management-magazine/articles/2017/10/embassy-evacuations/2019-08-27T20:03:15-04:00weekly0.5/security-management-magazine/articles/2017/10/certification-profile-caress-kennedy-cpp/2019-08-27T20:48:45-04:00weekly0.5/security-management-magazine/articles/2017/10/book-review-hijacking-violence-in-the-skies/2019-08-27T19:49:07-04:00weekly0.5/security-management-magazine/articles/2017/10/book-review-misbehavior-in-organizations/2019-08-27T19:51:52-04:00weekly0.5/security-management-magazine/articles/2017/09/klososky-opines-on-the-future-of-technology/2020-06-23T19:18:15-04:00weekly0.5/security-management-magazine/articles/2017/09/osac-gives-threat-update/2020-06-23T19:18:16-04:00weekly0.5/security-management-magazine/articles/2017/09/national-security-threats/2020-06-23T19:18:16-04:00weekly0.5/security-management-magazine/articles/2017/09/the-problem-with-data/2020-06-23T19:18:16-04:00weekly0.5/security-management-magazine/articles/2017/09/creating-a-diverse-security-team/2020-06-23T19:18:17-04:00weekly0.5/security-management-magazine/articles/2017/09/low-engagement-calls-for-new-management-practices/2020-06-23T19:18:17-04:00weekly0.5/security-management-magazine/articles/2017/09/say-thanks-national-security-officer-appreciation-week-kicks-off/2020-06-23T19:18:29-04:00weekly0.5/security-management-magazine/articles/2017/09/less-is-more-a-kiss-approach-to-esrm/2020-06-23T19:18:30-04:00weekly0.5/security-management-magazine/articles/2017/09/hackers-hit-equifax-compromising-143-million-americans-data/2020-06-23T19:18:31-04:00weekly0.5/security-management-magazine/articles/2017/09/september-2017-sm-online/2020-06-23T19:18:32-04:00weekly0.5/security-management-magazine/articles/2017/09/september-2017-legal-report-resources/2020-06-23T19:18:32-04:00weekly0.5/security-management-magazine/articles/2017/09/asis-awards-school-security-grant--more-asis-news/2020-06-23T19:18:33-04:00weekly0.5/security-management-magazine/articles/2017/09/safety-in-shared-spaces/2020-06-23T19:18:34-04:00weekly0.5/security-management-magazine/articles/2017/09/ai-the-force-multiplier/2020-06-23T19:18:34-04:00weekly0.5/security-management-magazine/articles/2017/09/editors-note-emotional/2020-06-23T19:18:35-04:00weekly0.5/security-management-magazine/articles/2017/09/protecting-fine-art-and-other-industry-news/2020-06-23T19:18:36-04:00weekly0.5/security-management-magazine/articles/2017/09/uniform-color-theory/2023-12-15T16:20:07-05:00weekly0.5/security-management-magazine/articles/2017/09/september-legal-report-coercion-marijuana-and-more/2020-06-23T19:18:37-04:00weekly0.5/security-management-magazine/articles/2017/09/go-with-the-flow/2020-06-23T19:18:37-04:00weekly0.5/security-management-magazine/articles/2017/09/global-water-risk/2020-06-23T19:18:38-04:00weekly0.5/security-management-magazine/articles/2017/09/partners-in-crimestopping/2020-06-23T19:18:38-04:00weekly0.5/security-management-magazine/articles/2017/09/a-professional-path/2020-06-23T19:18:38-04:00weekly0.5/security-management-magazine/articles/2017/09/five-insights-on-esrm/2020-06-23T19:18:38-04:00weekly0.5/security-management-magazine/articles/2017/09/calm-in-the-crucible/2020-06-23T19:18:39-04:00weekly0.5/security-management-magazine/articles/2017/09/peer-2-peer-protection/2020-06-23T19:18:39-04:00weekly0.5/security-management-magazine/articles/2017/09/an-education-connection/2020-06-23T19:18:40-04:00weekly0.5/security-management-magazine/articles/2017/09/qa-house-rules/2020-06-23T19:18:40-04:00weekly0.5/security-management-magazine/articles/2017/09/preparing-for-protests/2023-12-20T11:20:04-05:00weekly0.5/security-management-magazine/articles/2017/09/protests-its-in-the-details/2020-06-23T19:18:41-04:00weekly0.5/security-management-magazine/articles/2017/09/employee-protection-during-protests/2020-06-23T19:18:41-04:00weekly0.5/security-management-magazine/articles/2017/09/book-review-weakest-link/2020-06-23T19:18:43-04:00weekly0.5/security-management-magazine/articles/2017/09/book-review-soft-targets/2020-06-23T19:18:45-04:00weekly0.5/security-management-magazine/articles/2017/09/physical-security/2020-06-23T19:18:46-04:00weekly0.5/security-management-magazine/articles/2017/09/certification-profile-felix-giannini-cpp/2020-06-23T19:18:47-04:00weekly0.5/security-management-magazine/articles/2017/08/la-importancia-de-una-fusin/2020-06-23T19:18:49-04:00weekly0.5/security-management-magazine/articles/2017/08/the-guard-scheduling-conundrum/2020-06-23T19:18:51-04:00weekly0.5/security-management-magazine/articles/2017/08/new-employee-onboarding-guide/2020-06-23T19:18:53-04:00weekly0.5/security-management-magazine/articles/2017/08/august-2017-sm-online/2020-06-23T19:18:54-04:00weekly0.5/security-management-magazine/articles/2017/08/august-2017-legal-report-resources/2020-06-23T19:18:55-04:00weekly0.5/security-management-magazine/articles/2017/08/the-dirty-secret-of-drug-diversion/2022-05-05T16:44:56-04:00weekly0.5/security-management-magazine/articles/2017/08/securing-sacred-spaces/2020-06-23T19:18:57-04:00weekly0.5/security-management-magazine/articles/2017/08/how-to-protect-your-house-of-worship/2020-06-23T19:18:58-04:00weekly0.5/security-management-magazine/articles/2017/08/javits-embraces-high-tech-hospitality/2020-06-23T19:18:58-04:00weekly0.5/security-management-magazine/articles/2017/08/asis-news-asis-2017-updates-board-certifications-asis-nyc-recap-and-more/2020-06-23T19:18:59-04:00weekly0.5/security-management-magazine/articles/2017/08/identify-the-solution/2019-10-18T15:16:02-04:00weekly0.5/security-management-magazine/articles/2017/08/data-breach-trends/2020-06-23T19:18:59-04:00weekly0.5/security-management-magazine/articles/2017/08/editors-note-truth-and-lies/2020-06-23T19:19:00-04:00weekly0.5/security-management-magazine/articles/2017/08/industry-news-icelandic-prison-security-the-latest-government-contracts-and-partnerships-and-more/2020-06-23T19:19:01-04:00weekly0.5/security-management-magazine/articles/2017/08/legal-report-negligence-compensation-background-checks-and-more/2020-06-23T19:19:02-04:00weekly0.5/security-management-magazine/articles/2017/08/in-the-zone/2020-06-23T19:19:03-04:00weekly0.5/security-management-magazine/articles/2017/08/harassment-prevention/2020-06-23T19:19:03-04:00weekly0.5/security-management-magazine/articles/2017/08/esrm-a-shift-in-global-risk/2020-06-23T19:19:04-04:00weekly0.5/security-management-magazine/articles/2017/08/certification-profile-chuck-mccormick-psp/2020-06-23T19:19:05-04:00weekly0.5/security-management-magazine/articles/2017/08/book-review-data-hiding/2020-06-23T19:19:05-04:00weekly0.5/security-management-magazine/articles/2017/08/book-review-biosecurity/2020-06-23T19:19:06-04:00weekly0.5/security-management-magazine/articles/2017/08/book-review-network-video/2020-06-23T19:19:06-04:00weekly0.5/security-management-magazine/articles/2017/07/mentor-y-yo/2021-03-12T15:21:18-05:00weekly0.5/security-management-magazine/articles/2017/07/presta-atencin/2021-03-12T15:26:52-05:00weekly0.5/security-management-magazine/articles/2017/07/sm-online-july-2017/2020-06-23T19:19:15-04:00weekly0.5/security-management-magazine/articles/2017/07/legal-report-resources-july-2017/2020-06-23T19:19:16-04:00weekly0.5/security-management-magazine/articles/2017/07/asis-news-july-2017/2020-06-23T19:19:16-04:00weekly0.5/security-management-magazine/articles/2017/07/healthy-and-secure/2020-06-23T19:19:16-04:00weekly0.5/security-management-magazine/articles/2017/07/seeking-a-cyber-agenda/2020-06-23T19:19:17-04:00weekly0.5/security-management-magazine/articles/2017/07/editors-note-a-stronger-web/2020-06-23T19:19:17-04:00weekly0.5/security-management-magazine/articles/2017/07/july-2017-industry-news/2020-06-23T19:19:17-04:00weekly0.5/security-management-magazine/articles/2017/07/qa-whats-new-in-technology/2020-06-23T19:19:18-04:00weekly0.5/security-management-magazine/articles/2017/07/july-2017-legal-report/2020-06-23T19:19:18-04:00weekly0.5/security-management-magazine/articles/2017/07/extreme-measures/2020-06-23T19:19:19-04:00weekly0.5/security-management-magazine/articles/2017/07/senior-safety/2020-06-23T19:19:19-04:00weekly0.5/security-management-magazine/articles/2017/07/flawed-forensics/2020-06-23T19:19:20-04:00weekly0.5/security-management-magazine/articles/2017/07/houstons-game-day-solutions/2020-06-23T19:19:20-04:00weekly0.5/security-management-magazine/articles/2017/07/surveillance-on-the-fly/2020-06-23T19:19:21-04:00weekly0.5/security-management-magazine/articles/2017/07/it-takes-a-network/2020-06-23T19:19:21-04:00weekly0.5/security-management-magazine/articles/2017/07/the-meaning-of-a-merger/2020-06-23T19:19:22-04:00weekly0.5/security-management-magazine/articles/2017/07/a-psychological-price/2020-06-23T19:19:23-04:00weekly0.5/security-management-magazine/articles/2017/07/scenario-training-response-to-a-white-powder-scare/2020-06-23T19:19:24-04:00weekly0.5/security-management-magazine/articles/2017/07/certification-profile-malcolm-reid-cpp/2020-06-23T19:19:25-04:00weekly0.5/security-management-magazine/articles/2017/07/book-review-insider-threat/2020-06-23T19:19:26-04:00weekly0.5/security-management-magazine/articles/2017/07/book-review-the-ongoing-war/2020-06-23T19:19:27-04:00weekly0.5/security-management-magazine/articles/2017/07/book-review-interviewing/2020-06-23T19:19:28-04:00weekly0.5/security-management-magazine/articles/2017/06/protecting-executives-at-home/2021-10-18T12:52:03-04:00weekly0.5/security-management-magazine/articles/2017/06/un-museo-del-mundo-y-para-el-mundo/2021-03-12T15:30:34-05:00weekly0.5/security-management-magazine/articles/2017/06/protocolos-y-prcticas-anticuados-ponen-en-riesgo-la-revolucin-iot/2021-03-12T15:38:08-05:00weekly0.5/security-management-magazine/articles/2017/06/accesos-bajo-control/2021-03-12T15:40:36-05:00weekly0.5/security-management-magazine/articles/2017/06/sm-online-june-2017/2020-06-23T19:19:37-04:00weekly0.5/security-management-magazine/articles/2017/06/legal-report-resources-june-2017/2020-06-23T19:19:38-04:00weekly0.5/security-management-magazine/articles/2017/06/power-play-resilience--infrastructure/2020-06-23T19:19:38-04:00weekly0.5/security-management-magazine/articles/2017/06/what-the-u.s.-government-can-do-to-protect-the-grid/2020-06-23T19:19:39-04:00weekly0.5/security-management-magazine/articles/2017/06/mentor-me/2022-02-07T15:45:43-05:00weekly0.5/security-management-magazine/articles/2017/06/pay-attention/2020-06-23T19:19:40-04:00weekly0.5/security-management-magazine/articles/2017/06/loss-prevention-lab/2020-06-23T19:19:40-04:00weekly0.5/security-management-magazine/articles/2017/06/whos-who-in-retail-loss-prevention/2020-06-23T19:19:41-04:00weekly0.5/security-management-magazine/articles/2017/06/asis-news-june-2017/2020-06-23T19:19:42-04:00weekly0.5/security-management-magazine/articles/2017/06/tech-and-the-turnstile/2020-06-23T19:19:42-04:00weekly0.5/security-management-magazine/articles/2017/06/hacking-culture/2020-06-23T19:19:43-04:00weekly0.5/security-management-magazine/articles/2017/06/editors-note-diversity/2020-06-23T19:19:44-04:00weekly0.5/security-management-magazine/articles/2017/06/industry-news-june-2017/2020-06-23T19:19:45-04:00weekly0.5/security-management-magazine/articles/2017/06/canadas-marijuana-lessons/2020-06-23T19:19:45-04:00weekly0.5/security-management-magazine/articles/2017/06/legal-report-june-2017/2020-06-23T19:19:46-04:00weekly0.5/security-management-magazine/articles/2017/06/how-to-build-a-wall/2020-06-23T19:19:47-04:00weekly0.5/security-management-magazine/articles/2017/06/screening-on-standby/2020-06-23T19:19:48-04:00weekly0.5/security-management-magazine/articles/2017/06/redirecting-radicals/2020-06-23T19:19:49-04:00weekly0.5/security-management-magazine/articles/2017/06/certification-profile-anjali-sniadowski-cpp-psp/2020-06-23T19:19:50-04:00weekly0.5/security-management-magazine/articles/2017/06/book-review-compliance/2020-06-23T19:19:51-04:00weekly0.5/security-management-magazine/articles/2017/06/book-review-resilience-in-asia/2020-06-23T19:19:51-04:00weekly0.5/security-management-magazine/articles/2017/06/book-review-travel-risk/2020-06-23T19:19:52-04:00weekly0.5/security-management-magazine/articles/2017/05/stadium-and-soft-target-security-resources/2020-10-02T16:46:45-04:00weekly0.5/security-management-magazine/articles/2017/05/terror-attack-strikes-manchester-arena-what-we-know/2022-11-04T10:02:24-04:00weekly0.5/security-management-magazine/articles/2017/05/sm-online-may-2017/2020-06-23T19:19:57-04:00weekly0.5/security-management-magazine/articles/2017/05/legal-report-resources-may-2017/2020-06-23T19:19:57-04:00weekly0.5/security-management-magazine/articles/2017/05/asis-news-may-2017/2020-06-23T19:19:58-04:00weekly0.5/security-management-magazine/articles/2017/05/access-via-app/2020-06-23T19:19:59-04:00weekly0.5/security-management-magazine/articles/2017/05/insuring-data-loss/2020-06-23T19:19:59-04:00weekly0.5/security-management-magazine/articles/2017/05/editors-note-on-wolves/2020-06-23T19:19:59-04:00weekly0.5/security-management-magazine/articles/2017/05/industry-news-may-2017/2020-06-23T19:20:00-04:00weekly0.5/security-management-magazine/articles/2017/05/legal-report-may-2017/2020-06-23T19:20:02-04:00weekly0.5/security-management-magazine/articles/2017/05/minor-migrants/2020-06-23T19:20:03-04:00weekly0.5/security-management-magazine/articles/2017/05/the-roots-of-risk/2020-06-23T19:20:04-04:00weekly0.5/security-management-magazine/articles/2017/05/senegal-steps-up/2020-06-23T19:20:05-04:00weekly0.5/security-management-magazine/articles/2017/05/after-an-active-shooter/2020-06-23T19:20:06-04:00weekly0.5/security-management-magazine/articles/2017/05/responding-to-san-bernardino/2020-06-23T19:20:07-04:00weekly0.5/security-management-magazine/articles/2017/05/bully-for-you/2020-06-23T19:20:07-04:00weekly0.5/security-management-magazine/articles/2017/05/a-brief-history-of-bullying/2023-12-19T11:47:17-05:00weekly0.5/security-management-magazine/articles/2017/05/flying-solo/2020-06-23T19:20:09-04:00weekly0.5/security-management-magazine/articles/2017/05/cyber-travel-tips/2020-06-23T19:20:09-04:00weekly0.5/security-management-magazine/articles/2017/05/terrorists-check-in/2020-06-23T19:20:10-04:00weekly0.5/security-management-magazine/articles/2017/05/certification-profile-nicholas-g.-breiner/2020-06-23T19:20:11-04:00weekly0.5/security-management-magazine/articles/2017/05/book-review-info-risk/2020-06-23T19:20:11-04:00weekly0.5/security-management-magazine/articles/2017/05/book-review-biosecurity/2020-06-23T19:20:12-04:00weekly0.5/security-management-magazine/articles/2017/05/book-review-crime-prevention/2020-06-23T19:20:13-04:00weekly0.5/security-management-magazine/articles/2017/04/sm-online-april-2017/2020-06-23T19:20:16-04:00weekly0.5/security-management-magazine/articles/2017/04/legal-report-resources-april-2017/2020-06-23T19:20:16-04:00weekly0.5/security-management-magazine/articles/2017/04/asis-news-april-2017/2020-06-23T19:20:16-04:00weekly0.5/security-management-magazine/articles/2017/04/access-and-iris-scans/2020-06-23T19:20:17-04:00weekly0.5/security-management-magazine/articles/2017/04/cyber-war-games/2020-06-23T19:20:17-04:00weekly0.5/security-management-magazine/articles/2017/04/editors-note-symbiosis/2020-06-23T19:20:17-04:00weekly0.5/security-management-magazine/articles/2017/04/industry-news-april-2017/2020-06-23T19:20:18-04:00weekly0.5/security-management-magazine/articles/2017/04/qa-the-future-of-background-checks/2022-05-11T11:25:49-04:00weekly0.5/security-management-magazine/articles/2017/04/legal-report-april-2017/2020-06-23T19:20:18-04:00weekly0.5/security-management-magazine/articles/2017/04/perception-versus-reality/2020-06-23T19:20:18-04:00weekly0.5/security-management-magazine/articles/2017/04/communal-protection/2020-06-23T19:20:19-04:00weekly0.5/security-management-magazine/articles/2017/04/erm-best-practices/2020-06-23T19:20:19-04:00weekly0.5/security-management-magazine/articles/2017/04/redefining-loss/2020-06-23T19:20:19-04:00weekly0.5/security-management-magazine/articles/2017/04/the-evolution-of-airport-attacks/2020-06-23T19:20:20-04:00weekly0.5/security-management-magazine/articles/2017/04/cultivate-engagement/2020-06-23T19:20:21-04:00weekly0.5/security-management-magazine/articles/2017/04/how-organizations-prompt-different-levels-of-engagement/2020-06-23T19:20:21-04:00weekly0.5/security-management-magazine/articles/2017/04/surveillance-and-stereotypes/2024-01-02T11:59:47-05:00weekly0.5/security-management-magazine/articles/2017/04/certification-profile-timothy-mccreight-cpp/2020-06-23T19:20:23-04:00weekly0.5/security-management-magazine/articles/2017/04/book-review-disaster-management/2020-06-23T19:20:23-04:00weekly0.5/security-management-magazine/articles/2017/04/book-review-operational-policy-making/2020-06-23T19:20:23-04:00weekly0.5/security-management-magazine/articles/2017/04/a-conversation-with-the-director-of-the-u.s.-nbib/2022-05-11T11:26:31-04:00weekly0.5/security-management-magazine/articles/2017/03/outdated-protocols-and-practices-put-the-iot-revolution-at-risk/2021-03-12T15:35:55-05:00weekly0.5/security-management-magazine/articles/2017/03/women-in-executive-protection/2020-06-23T19:20:27-04:00weekly0.5/security-management-magazine/articles/2017/03/sm-online-march-2017/2020-06-23T19:20:28-04:00weekly0.5/security-management-magazine/articles/2017/03/legal-report-march-2017/2020-06-23T19:20:29-04:00weekly0.5/security-management-magazine/articles/2017/03/teller-trouble/2020-06-23T19:20:29-04:00weekly0.5/security-management-magazine/articles/2017/03/kidnapping-and-the-private-sector/2024-01-08T10:24:20-05:00weekly0.5/security-management-magazine/articles/2017/03/lessons-in-liability/2020-06-23T19:20:30-04:00weekly0.5/security-management-magazine/articles/2017/03/the-art-of-servant-leadership/2020-06-23T19:20:31-04:00weekly0.5/security-management-magazine/articles/2017/03/servant-leader-counterpoint-president-trump/2020-06-23T19:20:32-04:00weekly0.5/security-management-magazine/articles/2017/03/message-to-the-masses/2020-06-23T19:20:32-04:00weekly0.5/security-management-magazine/articles/2017/03/stopping-the-cyber-buck/2020-06-23T19:20:32-04:00weekly0.5/security-management-magazine/articles/2017/03/editors-note-trigger/2020-06-23T19:20:34-04:00weekly0.5/security-management-magazine/articles/2017/03/detention-tension/2020-06-23T19:20:34-04:00weekly0.5/security-management-magazine/articles/2017/03/industry-news-march-2017/2020-06-23T19:20:35-04:00weekly0.5/security-management-magazine/articles/2017/03/asis-news-march-2017/2020-06-23T19:20:35-04:00weekly0.5/security-management-magazine/articles/2017/03/five-ssh-facts/2020-06-23T19:20:36-04:00weekly0.5/security-management-magazine/articles/2017/03/legal-report-march-20172/2020-06-23T19:20:36-04:00weekly0.5/security-management-magazine/articles/2017/03/march-2017-letters-to-the-editor/2019-09-12T13:25:48-04:00weekly0.5/security-management-magazine/articles/2017/03/ramping-up-resilience/2020-06-23T19:20:36-04:00weekly0.5/security-management-magazine/articles/2017/03/a-picture-of-u.s.-crime/2020-06-23T19:20:36-04:00weekly0.5/security-management-magazine/articles/2017/03/certification-profile-shawn-reilly-cpp-psp/2020-06-23T19:20:36-04:00weekly0.5/security-management-magazine/articles/2017/03/book-review-security-culture/2020-06-23T19:20:37-04:00weekly0.5/security-management-magazine/articles/2017/03/travel-security-handbook/2020-06-23T19:20:37-04:00weekly0.5/security-management-magazine/articles/2017/02/sm-online-february-2017/2020-06-23T19:20:38-04:00weekly0.5/security-management-magazine/articles/2017/02/legal-report-resources-february-2017/2020-06-23T19:20:38-04:00weekly0.5/security-management-magazine/articles/2017/02/running-on-empty/2020-06-23T19:20:38-04:00weekly0.5/security-management-magazine/articles/2017/02/day-to-day-tactics/2020-06-23T19:20:39-04:00weekly0.5/security-management-magazine/articles/2017/02/trade-secrets-2.0/2020-06-23T19:20:39-04:00weekly0.5/security-management-magazine/articles/2017/02/supply-chain-strategies/2020-06-23T19:20:39-04:00weekly0.5/security-management-magazine/articles/2017/02/radioactive-remedies/2020-06-23T19:20:40-04:00weekly0.5/security-management-magazine/articles/2017/02/surveillance-is-instrumental/2020-06-23T19:20:40-04:00weekly0.5/security-management-magazine/articles/2017/02/rise-of-the-iot-botnets/2020-06-23T19:20:40-04:00weekly0.5/security-management-magazine/articles/2017/02/editors-note-interaction/2020-06-23T19:20:42-04:00weekly0.5/security-management-magazine/articles/2017/02/the-virtual-lineup/2020-06-23T19:20:42-04:00weekly0.5/security-management-magazine/articles/2017/02/industry-news-february-2017/2020-06-23T19:20:43-04:00weekly0.5/security-management-magazine/articles/2017/02/jack-lichtenstein-leaves-asis-offers-insights-on-trump/2020-06-23T19:20:44-04:00weekly0.5/security-management-magazine/articles/2017/02/legal-report-february-2017/2020-06-23T19:20:45-04:00weekly0.5/security-management-magazine/articles/2017/02/no-one-at-the-wheel/2020-06-23T19:20:47-04:00weekly0.5/security-management-magazine/articles/2017/02/the-road-to-resilience/2020-06-23T19:20:48-04:00weekly0.5/security-management-magazine/articles/2017/02/certification-profile-c.-joshua-villines-cpp-pci-psp/2020-06-23T19:20:49-04:00weekly0.5/security-management-magazine/articles/2017/02/book-review-business-continuity/2020-06-23T19:20:50-04:00weekly0.5/security-management-magazine/articles/2017/02/book-review-litigation/2020-06-23T19:20:50-04:00weekly0.5/security-management-magazine/articles/2017/02/hate-crimes-in-2015/2020-06-23T19:20:51-04:00weekly0.5/security-management-magazine/articles/2017/02/book-review-hacked-again/2020-06-23T19:20:51-04:00weekly0.5/security-management-magazine/articles/2017/01/sm-online-january-2017/2020-06-23T19:20:54-04:00weekly0.5/security-management-magazine/articles/2017/01/legal-report-resources-2017/2020-06-23T19:20:54-04:00weekly0.5/security-management-magazine/articles/2017/01/world-water-woes/2020-06-23T19:20:55-04:00weekly0.5/security-management-magazine/articles/2017/01/access-to-bank-on/2020-06-23T19:20:56-04:00weekly0.5/security-management-magazine/articles/2017/01/an-intelligent-solution/2020-06-23T19:20:57-04:00weekly0.5/security-management-magazine/articles/2017/01/pesky-passwords/2020-06-23T19:20:57-04:00weekly0.5/security-management-magazine/articles/2017/01/editors-note-take-time/2020-06-23T19:20:58-04:00weekly0.5/security-management-magazine/articles/2017/01/langer-leads-by-example/2020-06-23T19:20:58-04:00weekly0.5/security-management-magazine/articles/2017/01/a-museum-of-the-world-and-for-the-world/2020-06-23T19:20:58-04:00weekly0.5/security-management-magazine/articles/2017/01/brexit-employment-and-the-law/2020-06-23T19:20:58-04:00weekly0.5/security-management-magazine/articles/2017/01/january-2017-industry-news/2020-06-23T19:20:59-04:00weekly0.5/security-management-magazine/articles/2017/01/asis-news-january-2017/2020-06-23T19:21:00-04:00weekly0.5/security-management-magazine/articles/2017/01/extreme-internet-control/2020-06-23T19:21:00-04:00weekly0.5/security-management-magazine/articles/2017/01/the-role-of-school-resource-officers/2020-06-23T19:21:01-04:00weekly0.5/security-management-magazine/articles/2017/01/legal-report-january-2017/2020-06-23T19:21:01-04:00weekly0.5/security-management-magazine/articles/2017/01/only-a-lonely-test/2020-06-23T19:21:02-04:00weekly0.5/security-management-magazine/articles/2017/01/wildlife-trafficking/2020-06-23T19:21:03-04:00weekly0.5/security-management-magazine/articles/2017/01/certification-profile-john-c.-villines-cpp-pci-psp/2020-06-23T19:21:03-04:00weekly0.5/security-management-magazine/articles/2017/01/book-review-secrets/2020-06-23T19:21:03-04:00weekly0.5/security-management-magazine/articles/2016/12/sm-online-december-2016/2020-06-23T19:21:06-04:00weekly0.5/security-management-magazine/articles/2016/12/legal-report-resources-december-2016/2020-06-23T19:21:07-04:00weekly0.5/security-management-magazine/articles/2016/12/metrics-and-the-maturity-mindset/2020-06-23T19:21:07-04:00weekly0.5/security-management-magazine/articles/2016/12/yale-opens-doors/2020-06-23T19:21:07-04:00weekly0.5/security-management-magazine/articles/2016/12/the-hunt-for-talent/2020-06-23T19:21:08-04:00weekly0.5/security-management-magazine/articles/2016/12/editors-note-maintain/2020-06-23T19:21:08-04:00weekly0.5/security-management-magazine/articles/2016/12/crime-of-opportunity/2020-06-23T19:21:09-04:00weekly0.5/security-management-magazine/articles/2016/12/global-security-threats-and-solutions/2020-06-23T19:21:09-04:00weekly0.5/security-management-magazine/articles/2016/12/superior-supervision/2020-06-23T19:21:09-04:00weekly0.5/security-management-magazine/articles/2016/12/the-90-character-alert/2020-06-23T19:21:10-04:00weekly0.5/security-management-magazine/articles/2016/12/industry-news-december-2016/2020-06-23T19:21:11-04:00weekly0.5/security-management-magazine/articles/2016/12/asis-news-december-2016/2020-06-23T19:21:12-04:00weekly0.5/security-management-magazine/articles/2016/12/december-2016-industry-white-papers/2020-06-23T19:21:12-04:00weekly0.5/security-management-magazine/articles/2016/12/december-2016-legal-report/2020-06-23T19:21:14-04:00weekly0.5/security-management-magazine/articles/2016/12/cross-border-disorder/2020-06-23T19:21:15-04:00weekly0.5/security-management-magazine/articles/2016/12/playing-clean/2020-06-23T19:21:15-04:00weekly0.5/security-management-magazine/articles/2016/12/book-review-due-diligence/2020-06-23T19:21:16-04:00weekly0.5/security-management-magazine/articles/2016/12/book-review-security-matters/2019-11-04T14:41:18-05:00weekly0.5/security-management-magazine/articles/2016/12/certification-profile-angela-osborne-pci/2020-06-23T19:21:16-04:00weekly0.5/security-management-magazine/articles/2016/12/the-top-ten-challenges-for-ed-security-in-2016-and-beyond/2020-06-23T19:21:17-04:00weekly0.5/security-management-magazine/articles/2016/12/maturity-model-101/2020-06-23T19:21:17-04:00weekly0.5/security-management-magazine/articles/2016/11/guns-and-security-the-risks-of-arming-security-officers/2024-01-02T11:23:11-05:00weekly0.5/security-management-magazine/articles/2016/11/speedy-surveillance/2020-06-23T19:21:19-04:00weekly0.5/security-management-magazine/articles/2016/11/school-of-threats/2020-06-23T19:21:19-04:00weekly0.5/security-management-magazine/articles/2016/11/sm-online-november-2016/2020-06-23T19:21:20-04:00weekly0.5/security-management-magazine/articles/2016/11/legal-report-resources-november-2016/2020-06-23T19:21:21-04:00weekly0.5/security-management-magazine/articles/2016/11/an-integrated-defense/2020-06-23T19:21:21-04:00weekly0.5/security-management-magazine/articles/2016/11/editors-note-threatscape/2020-06-23T19:21:22-04:00weekly0.5/security-management-magazine/articles/2016/11/rocking-in-cleveland/2020-06-23T19:21:22-04:00weekly0.5/security-management-magazine/articles/2016/11/culture-in-crisis/2020-06-23T19:21:22-04:00weekly0.5/security-management-magazine/articles/2016/11/cultural-property-and-terrorism/2019-10-31T16:03:18-04:00weekly0.5/security-management-magazine/articles/2016/11/open-carry-conundrum/2020-06-23T19:21:23-04:00weekly0.5/security-management-magazine/articles/2016/11/november-2016-industry-news/2020-06-23T19:21:24-04:00weekly0.5/security-management-magazine/articles/2016/11/asis-news-november-2016/2020-06-23T19:21:24-04:00weekly0.5/security-management-magazine/articles/2016/11/legal-report-november-2016/2020-06-23T19:21:25-04:00weekly0.5/security-management-magazine/articles/2016/11/what-if-its-real/2020-06-23T19:21:26-04:00weekly0.5/security-management-magazine/articles/2016/11/operation-radiation/2020-06-23T19:21:26-04:00weekly0.5/security-management-magazine/articles/2016/11/book-review-social-media-risk-and-governance/2020-06-23T19:21:27-04:00weekly0.5/security-management-magazine/articles/2016/11/book-review-coso-erm/2020-06-23T19:21:28-04:00weekly0.5/security-management-magazine/articles/2016/11/book-review-explosives/2020-06-23T19:21:28-04:00weekly0.5/security-management-magazine/articles/2016/11/terrorist-attacks-in-the-eu/2020-06-23T19:21:29-04:00weekly0.5/security-management-magazine/articles/2016/11/certification-profile-terence-hoey-cpp-pci-psp/2020-06-23T19:21:29-04:00weekly0.5/security-management-magazine/articles/2016/10/book-review-emergency-management/2020-06-23T19:21:31-04:00weekly0.5/security-management-magazine/articles/2016/10/the-two-way-manager/2020-06-23T19:21:36-04:00weekly0.5/security-management-magazine/articles/2016/10/spoofing-the-ceo/2020-06-23T19:21:37-04:00weekly0.5/security-management-magazine/articles/2016/10/editors-note-lose-control/2020-06-23T19:21:37-04:00weekly0.5/security-management-magazine/articles/2016/10/how-to-build-a-better-security-space/2020-06-23T19:21:38-04:00weekly0.5/security-management-magazine/articles/2016/10/a-hospitals-life-safety-lessons/2020-06-23T19:21:38-04:00weekly0.5/security-management-magazine/articles/2016/10/a-refuge-from-terror/2020-06-23T19:21:38-04:00weekly0.5/security-management-magazine/articles/2016/10/industry-news-october-2016/2020-06-23T19:21:39-04:00weekly0.5/security-management-magazine/articles/2016/10/asis-news-october-2016/2020-06-23T19:21:39-04:00weekly0.5/security-management-magazine/articles/2016/10/legal-report-october-2016/2020-06-23T19:21:40-04:00weekly0.5/security-management-magazine/articles/2016/10/bringing-clarity-to-chaos/2020-06-23T19:21:40-04:00weekly0.5/security-management-magazine/articles/2016/10/the-next-tase-phase/2020-06-23T19:21:41-04:00weekly0.5/security-management-magazine/articles/2016/10/qa-training-protocol/2020-06-23T19:21:42-04:00weekly0.5/security-management-magazine/articles/2016/10/sm-online-october-2016/2020-06-23T19:21:42-04:00weekly0.5/security-management-magazine/articles/2016/10/legal-report-resources-october-2016/2020-06-23T19:21:43-04:00weekly0.5/security-management-magazine/articles/2016/10/book-review-cyber-security/2020-06-23T19:21:44-04:00weekly0.5/security-management-magazine/articles/2016/10/book-review-supply-chain-risk/2020-06-23T19:21:44-04:00weekly0.5/security-management-magazine/articles/2016/09/sm-online-september-2016/2020-06-23T19:21:55-04:00weekly0.5/security-management-magazine/articles/2016/09/legal-report-resources-september-2016/2020-06-23T19:21:55-04:00weekly0.5/security-management-magazine/articles/2016/09/guarding-a-floating-treasure/2020-06-23T19:21:56-04:00weekly0.5/security-management-magazine/articles/2016/09/tech-trends/2020-06-23T19:21:56-04:00weekly0.5/security-management-magazine/articles/2016/09/cyber-trends/2020-06-23T19:21:56-04:00weekly0.5/security-management-magazine/articles/2016/09/editors-note-bellwether/2020-06-23T19:21:57-04:00weekly0.5/security-management-magazine/articles/2016/09/management-trends/2020-06-23T19:21:57-04:00weekly0.5/security-management-magazine/articles/2016/09/school-security-trends/2020-06-23T19:21:57-04:00weekly0.5/security-management-magazine/articles/2016/09/compliance-trends/2020-06-23T19:21:58-04:00weekly0.5/security-management-magazine/articles/2016/09/soft-target-trends/2020-06-23T19:21:58-04:00weekly0.5/security-management-magazine/articles/2016/09/terrorism-trends/2020-06-23T19:21:58-04:00weekly0.5/security-management-magazine/articles/2016/09/industry-news-september-2016/2020-06-23T19:21:59-04:00weekly0.5/security-management-magazine/articles/2016/09/asis-news-september-2016/2020-06-23T19:21:59-04:00weekly0.5/security-management-magazine/articles/2016/09/five-post-incident-concerns/2020-06-23T19:21:59-04:00weekly0.5/security-management-magazine/articles/2016/09/legal-report-september-2016/2020-06-23T19:22:00-04:00weekly0.5/security-management-magazine/articles/2016/09/resilience-trends/2020-06-23T19:22:00-04:00weekly0.5/security-management-magazine/articles/2016/09/infrastructure-protection-trends/2020-06-23T19:22:00-04:00weekly0.5/security-management-magazine/articles/2016/09/book-review-surviving-street-crimes/2020-06-23T19:22:01-04:00weekly0.5/security-management-magazine/articles/2016/09/book-review-cyber-physical-attacks/2020-06-23T19:22:01-04:00weekly0.5/security-management-magazine/articles/2016/09/book-review-counterterrorism/2020-06-23T19:22:01-04:00weekly0.5/security-management-magazine/articles/2016/09/illuminating-going-dark-a-conversation-with-the-fbi/2020-06-23T19:22:03-04:00weekly0.5/security-management-magazine/articles/2016/09/certification-profile-eduardo-e.-de-diego-psp/2020-06-23T19:22:03-04:00weekly0.5/security-management-magazine/articles/2016/08/seminar-sneak-peek-bringing-metrics-to-the-c-suite/2020-06-23T19:22:05-04:00weekly0.5/security-management-magazine/articles/2016/08/seminar-sneak-peek-moving-to-the-cloud-repositions-security/2019-09-13T13:33:50-04:00weekly0.5/security-management-magazine/articles/2016/08/sm-online-august-2016/2020-06-23T19:22:07-04:00weekly0.5/security-management-magazine/articles/2016/08/legal-report-resources-august-2016/2020-06-23T19:22:07-04:00weekly0.5/security-management-magazine/articles/2016/08/app-tracking/2020-06-23T19:22:08-04:00weekly0.5/security-management-magazine/articles/2016/08/insights-on-asia/2020-06-23T19:22:08-04:00weekly0.5/security-management-magazine/articles/2016/08/new-data-rules/2020-06-23T19:22:09-04:00weekly0.5/security-management-magazine/articles/2016/08/editors-note-connections/2020-06-23T19:22:09-04:00weekly0.5/security-management-magazine/articles/2016/08/the-usual-suspects/2020-06-23T19:22:10-04:00weekly0.5/security-management-magazine/articles/2016/08/to-arm-or-not-to-arm/2020-06-23T19:22:11-04:00weekly0.5/security-management-magazine/articles/2016/08/how-to-practice-ethics/2020-06-23T19:22:11-04:00weekly0.5/security-management-magazine/articles/2016/08/sounding-the-alarm-at-lone-star/2020-06-23T19:22:12-04:00weekly0.5/security-management-magazine/articles/2016/08/olympic-sized-threats/2020-06-23T19:22:12-04:00weekly0.5/security-management-magazine/articles/2016/08/industry-news-august-2016/2020-06-23T19:22:13-04:00weekly0.5/security-management-magazine/articles/2016/08/asis-news-august-2016/2020-06-23T19:22:14-04:00weekly0.5/security-management-magazine/articles/2016/08/legal-report-august-2016/2020-06-23T19:22:14-04:00weekly0.5/security-management-magazine/articles/2016/08/a-strategic-response/2020-06-23T19:22:15-04:00weekly0.5/security-management-magazine/articles/2016/08/scholastic-surveillance/2020-06-23T19:22:15-04:00weekly0.5/security-management-magazine/articles/2016/08/national-security-vs-privacy/2020-06-23T19:22:15-04:00weekly0.5/security-management-magazine/articles/2016/08/book-review-emergency-preparedness/2020-06-23T19:22:15-04:00weekly0.5/security-management-magazine/articles/2016/08/book-review-disguises/2020-06-23T19:22:16-04:00weekly0.5/security-management-magazine/articles/2016/07/sm-online-july-2016/2020-06-23T19:22:18-04:00weekly0.5/security-management-magazine/articles/2016/07/legal-report-resources-july-2016/2020-06-23T19:22:18-04:00weekly0.5/security-management-magazine/articles/2016/07/eyes-on-minneapolis/2020-06-23T19:22:19-04:00weekly0.5/security-management-magazine/articles/2016/07/the-cyber-incident-survival-guide/2020-06-23T19:22:19-04:00weekly0.5/security-management-magazine/articles/2016/07/patient-zero/2020-06-23T19:22:19-04:00weekly0.5/security-management-magazine/articles/2016/07/editors-note-hacked/2020-06-23T19:22:20-04:00weekly0.5/security-management-magazine/articles/2016/07/hide.-hide.-hide/2020-06-23T19:22:20-04:00weekly0.5/security-management-magazine/articles/2016/07/giving-them-the-business/2020-06-23T19:22:20-04:00weekly0.5/security-management-magazine/articles/2016/07/it-takes-teamwork/2020-06-23T19:22:21-04:00weekly0.5/security-management-magazine/articles/2016/07/a-new-mandate-for-the-modern-library/2020-06-23T19:22:21-04:00weekly0.5/security-management-magazine/articles/2016/07/neighborhood-nuisance/2020-06-23T19:22:23-04:00weekly0.5/security-management-magazine/articles/2016/07/industry-news-july-2016/2020-06-23T19:22:24-04:00weekly0.5/security-management-magazine/articles/2016/07/asis-news-july-2016/2020-06-23T19:22:25-04:00weekly0.5/security-management-magazine/articles/2016/07/qa-cannabis-cash/2020-06-23T19:22:25-04:00weekly0.5/security-management-magazine/articles/2016/07/legal-report-july-2016/2020-06-23T19:22:27-04:00weekly0.5/security-management-magazine/articles/2016/07/math-vs.-mayhem/2020-06-23T19:22:28-04:00weekly0.5/security-management-magazine/articles/2016/07/a-failure-to-communicate/2020-06-23T19:22:28-04:00weekly0.5/security-management-magazine/articles/2016/07/book-review-crowd-science/2020-06-23T19:22:29-04:00weekly0.5/security-management-magazine/articles/2016/07/book-review-valuing-security/2020-06-23T19:22:29-04:00weekly0.5/security-management-magazine/articles/2016/06/the-wharton-program-how-speaking-the-language-of-business-moves-security-forward/2019-08-29T15:39:59-04:00weekly0.5/security-management-magazine/articles/2016/06/update-joint-base-andrews-all-clear-after-active-shooter-lockdown/2019-09-13T15:01:53-04:00weekly0.5/security-management-magazine/articles/2016/06/the-wharton-program-how-creating-value-gets-security-a-seat-at-the-table/2019-08-29T15:44:20-04:00weekly0.5/security-management-magazine/articles/2016/06/british-mp-killed-in-attack-after-meeting-with-constituents/2021-10-18T10:58:47-04:00weekly0.5/security-management-magazine/articles/2016/06/live-updates-orlando-nightclub-shooting/2019-09-13T15:00:50-04:00weekly0.5/security-management-magazine/articles/2016/06/a-security-triumvirate-in-orlando/2019-09-13T15:00:32-04:00weekly0.5/security-management-magazine/articles/2016/06/police-officer-shoots-man-at-dallas-love-field-airport/2019-09-13T15:00:14-04:00weekly0.5/security-management-magazine/articles/2016/06/a-conversation-with-asis-internationals-women-in-security-council-chair-gail-essen/2019-09-13T14:59:46-04:00weekly0.5/security-management-magazine/articles/2016/06/top-five-design-considerations-for-control-rooms/2019-09-13T14:59:27-04:00weekly0.5/security-management-magazine/articles/2016/06/sm-online-june-2016/2019-11-15T11:44:24-05:00weekly0.5/security-management-magazine/articles/2016/06/legal-report-resources-june-2016/2019-11-15T12:02:34-05:00weekly0.5/security-management-magazine/articles/2016/06/a-casino-makes-a-sure-bet/2019-11-15T11:54:38-05:00weekly0.5/security-management-magazine/articles/2016/06/going-global-think-local/2019-12-20T13:00:04-05:00weekly0.5/security-management-magazine/articles/2016/06/regional-guidance/2019-12-20T12:59:11-05:00weekly0.5/security-management-magazine/articles/2016/06/the-opm-aftermath/2019-11-15T11:56:06-05:00weekly0.5/security-management-magazine/articles/2016/06/editors-note-know-it-all/2019-11-15T11:45:53-05:00weekly0.5/security-management-magazine/articles/2016/06/breaching-the-gender-gap/2019-11-15T11:40:56-05:00weekly0.5/security-management-magazine/articles/2016/06/all-secure-on-set/2019-11-15T11:43:16-05:00weekly0.5/security-management-magazine/articles/2016/06/whos-staying-over/2019-11-15T11:50:25-05:00weekly0.5/security-management-magazine/articles/2016/06/industry-news-june-2016/2019-11-15T12:05:17-05:00weekly0.5/security-management-magazine/articles/2016/06/asis-news-june-2016/2019-11-15T12:07:30-05:00weekly0.5/security-management-magazine/articles/2016/06/legal-report-june-2016/2019-11-15T12:00:35-05:00weekly0.5/security-management-magazine/articles/2016/06/the-calculus-of-catastrophe/2019-11-15T11:47:11-05:00weekly0.5/security-management-magazine/articles/2016/06/global-nuclear-security/2019-11-15T11:37:14-05:00weekly0.5/security-management-magazine/articles/2016/06/book-review-keeping-religious-institutions-secure/2019-11-14T16:12:28-05:00weekly0.5/security-management-magazine/articles/2016/06/book-review-anti-fraud-program-design/2019-09-13T14:53:36-04:00weekly0.5/security-management-magazine/articles/2016/06/six-food-defense-changes/2019-11-15T12:14:10-05:00weekly0.5/security-management-magazine/articles/2016/06/book-review-anti-fraud-program-design2/2019-09-13T14:52:49-04:00weekly0.5/security-management-magazine/articles/2016/06/book-review-beyond-cybersecurity2/2019-11-15T11:58:26-05:00weekly0.5/security-management-magazine/articles/2016/06/book-review---security-supervision-and-management-4th-edition/2019-09-13T14:52:21-04:00weekly0.5/security-management-magazine/articles/2016/06/book-review-fraud-identification-and-prevention/2019-09-13T14:52:07-04:00weekly0.5/security-management-magazine/articles/2016/06/book-review-library-security/2019-09-13T14:51:52-04:00weekly0.5/security-management-magazine/articles/2016/05/linkedin-invalidates-users-passwords-in-response-to-2012-data-breach/2019-09-13T14:51:24-04:00weekly0.5/security-management-magazine/articles/2016/05/six-questions-security-experts-should-ask-in-a-crisis/2019-09-13T14:51:05-04:00weekly0.5/security-management-magazine/articles/2016/05/training-device-triggers-evacuation-of-manchester-united-stadium/2019-09-13T14:50:49-04:00weekly0.5/security-management-magazine/articles/2016/05/wannacry-attack-has-links-to-north-korea-amateur-flaws-experts-say/2019-09-13T14:50:31-04:00weekly0.5/security-management-magazine/articles/2016/05/tsa-offers-hands-on-training-for-new-hires/2019-09-13T14:49:46-04:00weekly0.5/security-management-magazine/articles/2016/05/eight-steps-to-better-align-your-incident-and-crisis-management/2019-11-14T15:21:30-05:00weekly0.5/security-management-magazine/articles/2016/05/sm-online-may-2016/2019-11-14T15:08:24-05:00weekly0.5/security-management-magazine/articles/2016/05/legal-report-resources-may-2016/2019-11-14T16:56:31-05:00weekly0.5/security-management-magazine/articles/2016/05/hidden-from-hacks/2019-11-14T16:33:33-05:00weekly0.5/security-management-magazine/articles/2016/05/seek-beauty/2019-11-14T15:27:11-05:00weekly0.5/security-management-magazine/articles/2016/05/protection-on-display/2019-11-14T14:25:35-05:00weekly0.5/security-management-magazine/articles/2016/05/cyber-pulls-the-plug/2019-11-14T16:41:35-05:00weekly0.5/security-management-magazine/articles/2016/05/a-vote-for-biometrics/2019-11-14T14:41:14-05:00weekly0.5/security-management-magazine/articles/2016/05/managing-age-diversity/2019-11-14T14:49:08-05:00weekly0.5/security-management-magazine/articles/2016/05/in-the-public-interest/2019-11-14T14:53:37-05:00weekly0.5/security-management-magazine/articles/2016/05/a-head-start-on-insider-threats/2019-11-14T15:44:02-05:00weekly0.5/security-management-magazine/articles/2016/05/industry-news-may-2016/2019-11-14T17:03:28-05:00weekly0.5/security-management-magazine/articles/2016/05/asis-news-may-2016/2019-11-14T17:08:50-05:00weekly0.5/security-management-magazine/articles/2016/05/legal-report-may-2016/2019-11-14T16:58:35-05:00weekly0.5/security-management-magazine/articles/2016/05/the-lessons-of-flint/2020-06-23T19:22:30-04:00weekly0.5/security-management-magazine/articles/2016/05/feds-take-on-assault/2019-11-14T15:39:16-05:00weekly0.5/security-management-magazine/articles/2016/05/book-review-breakthroughs-in-decision-science-and-risk-analysis/2019-11-14T16:27:08-05:00weekly0.5/security-management-magazine/articles/2016/05/book-review-cybervetting/2019-11-14T16:47:02-05:00weekly0.5/security-management-magazine/articles/2016/05/the-security-gender-gap/2019-09-13T14:31:23-04:00weekly0.5/security-management-magazine/articles/2016/05/book-review-war-the-rise-of-the-military-internet-complex/2019-09-13T14:30:49-04:00weekly0.5/security-management-magazine/articles/2016/05/book-review-protecting-transportation/2019-09-13T14:30:24-04:00weekly0.5/security-management-magazine/articles/2016/04/smithsonian-to-host-conference-on-cultural-property-protection/2019-09-13T15:10:04-04:00weekly0.5/security-management-magazine/articles/2016/04/asis-northern-new-jersey-chapter-visits-centenarian-member/2019-09-13T15:09:47-04:00weekly0.5/security-management-magazine/articles/2016/04/sm-online-april-2016/2019-11-15T13:27:02-05:00weekly0.5/security-management-magazine/articles/2016/04/legal-report-resources-april-2016/2019-11-18T12:49:36-05:00weekly0.5/security-management-magazine/articles/2016/04/security-beyond-sunday/2019-11-15T14:00:41-05:00weekly0.5/security-management-magazine/articles/2016/04/creating-culture-together/2019-11-15T13:08:39-05:00weekly0.5/security-management-magazine/articles/2016/04/info-sharing-dj-vu/2019-11-15T14:06:21-05:00weekly0.5/security-management-magazine/articles/2016/04/find-your-tribe/2019-11-15T13:33:14-05:00weekly0.5/security-management-magazine/articles/2016/04/when-simulation-means-survival/2019-11-15T13:15:57-05:00weekly0.5/security-management-magazine/articles/2016/04/behind-the-screen/2019-11-15T13:21:45-05:00weekly0.5/security-management-magazine/articles/2016/04/urgent-calls-for-bio-reform/2019-11-15T13:49:27-05:00weekly0.5/security-management-magazine/articles/2016/04/industry-news-april-2016/2019-11-18T12:53:27-05:00weekly0.5/security-management-magazine/articles/2016/04/asis-news-april-2016/2019-11-18T12:58:13-05:00weekly0.5/security-management-magazine/articles/2016/04/qa-soft-targets/2020-06-23T19:22:31-04:00weekly0.5/security-management-magazine/articles/2016/04/legal-report-april-2016/2019-11-18T12:46:15-05:00weekly0.5/security-management-magazine/articles/2016/04/a-dearth-of-gun-data/2019-11-15T13:35:34-05:00weekly0.5/security-management-magazine/articles/2016/04/are-ceos-crisis-ready/2019-11-15T13:41:22-05:00weekly0.5/security-management-magazine/articles/2016/04/book-review-information-assurance/2019-11-18T12:42:11-05:00weekly0.5/security-management-magazine/articles/2016/04/book-review-homeland-defense/2019-11-15T13:54:10-05:00weekly0.5/security-management-magazine/articles/2016/04/book-review-corporate-security-intelligence-and-strategic-decision-making/2019-12-20T13:39:47-05:00weekly0.5/security-management-magazine/articles/2016/03/shots-fired-at-u.s.-capitol/2019-09-16T09:55:30-04:00weekly0.5/security-management-magazine/articles/2016/03/terrorist-attacks-in-brussels-leave-numerous-dead-cause-city-shut-down/2019-09-16T09:55:13-04:00weekly0.5/security-management-magazine/articles/2016/03/2016-isc-west-product-showcase/2019-09-16T09:54:56-04:00weekly0.5/security-management-magazine/articles/2016/03/the-dangers-of-protection-what-makes-a-guard-firm-low--or-high-risk/2020-02-26T10:26:01-05:00weekly0.5/security-management-magazine/articles/2016/03/secure-activism-101-how-to-survive-a-demonstration/2019-09-16T09:54:21-04:00weekly0.5/security-management-magazine/articles/2016/03/book-review-the-process-of-investigation/2019-09-16T09:53:59-04:00weekly0.5/security-management-magazine/articles/2016/03/book-review-executive-protection-smarter.-faster.-better/2021-06-15T13:39:13-04:00weekly0.5/security-management-magazine/articles/2016/03/book-review-business-espionage/2019-09-16T09:50:26-04:00weekly0.5/security-management-magazine/articles/2016/03/book-review-hospital-and-healthcare-security-sixth-edition/2019-09-16T09:50:14-04:00weekly0.5/security-management-magazine/articles/2016/03/book-review-physical-security-and-safety/2019-09-16T09:49:41-04:00weekly0.5/security-management-magazine/articles/2016/03/sm-online-march-2016/2019-11-19T11:13:18-05:00weekly0.5/security-management-magazine/articles/2016/03/legal-report-resources-march-2016/2019-11-19T15:19:54-05:00weekly0.5/security-management-magazine/articles/2016/03/u-penn-puts-out-the-fire/2019-11-19T14:39:57-05:00weekly0.5/security-management-magazine/articles/2016/03/bottleneck-at-the-border/2019-11-19T10:28:36-05:00weekly0.5/security-management-magazine/articles/2016/03/operating-blind/2019-11-19T14:48:55-05:00weekly0.5/security-management-magazine/articles/2016/03/border-wars/2019-11-19T11:20:38-05:00weekly0.5/security-management-magazine/articles/2016/03/planning-after-paris/2019-11-19T10:35:02-05:00weekly0.5/security-management-magazine/articles/2016/03/an-invitation-to-change/2019-11-19T10:41:42-05:00weekly0.5/security-management-magazine/articles/2016/03/upping-the-ante-on-corruption/2019-11-19T10:48:01-05:00weekly0.5/security-management-magazine/articles/2016/03/high-stakes-cyber/2019-11-19T11:08:27-05:00weekly0.5/security-management-magazine/articles/2016/03/a-defensive-stance/2019-11-20T10:22:09-05:00weekly0.5/security-management-magazine/articles/2016/03/industry-news-march-2016/2019-11-19T15:00:45-05:00weekly0.5/security-management-magazine/articles/2016/03/asis-news-march-2016/2019-11-19T15:04:50-05:00weekly0.5/security-management-magazine/articles/2016/03/five-lessons-for-global-investigators/2019-11-19T15:10:29-05:00weekly0.5/security-management-magazine/articles/2016/03/legal-report-march-2016/2019-11-19T14:56:42-05:00weekly0.5/security-management-magazine/articles/2016/03/the-tase-craze/2019-11-19T11:26:52-05:00weekly0.5/security-management-magazine/articles/2016/03/maritime-migration/2019-11-19T11:43:09-05:00weekly0.5/security-management-magazine/articles/2016/03/book-review-emergency-management-and-social-intelligence/2019-12-20T14:00:51-05:00weekly0.5/security-management-magazine/articles/2016/03/book-review-astd-handbook/2019-11-19T11:34:14-05:00weekly0.5/security-management-magazine/articles/2016/03/book-review-corporate-security-management/2021-07-29T10:35:06-04:00weekly0.5/security-management-magazine/articles/2016/03/staying-on-message/2019-12-20T13:51:32-05:00weekly0.5/security-management-magazine/articles/2016/02/a-history-of-grievances/2019-11-20T11:38:40-05:00weekly0.5/security-management-magazine/articles/2016/02/how-to-protect-pii/2019-11-20T11:45:46-05:00weekly0.5/security-management-magazine/articles/2016/02/a-deadline-derailment/2019-11-20T12:04:48-05:00weekly0.5/security-management-magazine/articles/2016/02/industry-news-february-2016/2019-11-21T14:19:33-05:00weekly0.5/security-management-magazine/articles/2016/02/bchs-protects-patient-data/2019-11-20T13:43:39-05:00weekly0.5/security-management-magazine/articles/2016/02/wanted-private-sector-help/2019-11-20T13:33:36-05:00weekly0.5/security-management-magazine/articles/2016/02/shrink-expands/2019-11-20T13:11:11-05:00weekly0.5/security-management-magazine/articles/2016/02/navigating-transitions/2019-11-20T11:56:29-05:00weekly0.5/security-management-magazine/articles/2016/02/privacy-shield-is-herewhat-this-means-for-your-company/2020-07-20T15:15:45-04:00weekly0.5/security-management-magazine/articles/2016/02/defense-corruption/2019-11-20T13:26:19-05:00weekly0.5/security-management-magazine/articles/2016/02/access-to-the-firehouse/2019-11-20T13:51:52-05:00weekly0.5/security-management-magazine/articles/2016/02/sm-online-february-2016/2019-11-20T12:09:39-05:00weekly0.5/security-management-magazine/articles/2016/02/legal-report-resources-february-2016/2019-11-21T14:14:30-05:00weekly0.5/security-management-magazine/articles/2016/02/how-to-see-red/2019-11-20T13:02:34-05:00weekly0.5/security-management-magazine/articles/2016/02/an-unsafe-harbor/2022-10-17T11:03:54-04:00weekly0.5/security-management-magazine/articles/2016/02/asis-news-february-2016/2019-11-21T14:24:05-05:00weekly0.5/security-management-magazine/articles/2016/02/legal-report-february-2016/2019-11-20T16:30:49-05:00weekly0.5/security-management-magazine/articles/2016/02/book-review-big-data/2019-11-20T13:14:46-05:00weekly0.5/security-management-magazine/articles/2016/02/book-review-bomb-threats/2019-11-20T13:37:47-05:00weekly0.5/security-management-magazine/articles/2016/02/book-review-soft-target-hardening/2019-09-16T09:58:11-04:00weekly0.5/security-management-magazine/articles/2016/02/book-review-the-handbook-for-school-safety-and-security/2019-09-16T09:56:51-04:00weekly0.5/security-management-magazine/articles/2016/02/book-review-the-alarm-science-manual/2019-09-16T09:56:34-04:00weekly0.5/security-management-magazine/articles/2016/02/book-review-from-police-to-security-professional-a-guide-to-a-successful-career-transition/2019-09-16T09:56:21-04:00weekly0.5/security-management-magazine/articles/2016/02/police-and-use-of-force/2019-12-20T14:31:47-05:00weekly0.5/security-management-magazine/articles/2016/01/drafting-a-blueprint-for-security/2019-11-21T16:09:53-05:00weekly0.5/security-management-magazine/articles/2016/01/securing-european-train-travel/2019-09-16T10:28:42-04:00weekly0.5/security-management-magazine/articles/2016/01/a-chinese-new-year/2019-11-22T15:20:12-05:00weekly0.5/security-management-magazine/articles/2016/01/smart-and-secure/2019-11-22T14:45:23-05:00weekly0.5/security-management-magazine/articles/2016/01/how-ijet-designed-its-global-headquarters-to-promote-productivity/2019-09-16T10:27:22-04:00weekly0.5/security-management-magazine/articles/2016/01/experts-search-for-innovation/2019-11-21T15:48:30-05:00weekly0.5/security-management-magazine/articles/2016/01/on-the-record/2019-11-21T16:17:56-05:00weekly0.5/security-management-magazine/articles/2016/01/mit-launches-cybersecurity-professional-education-course/2020-02-26T10:50:52-05:00weekly0.5/security-management-magazine/articles/2016/01/resilience-after-katrina/2019-12-20T15:09:16-05:00weekly0.5/security-management-magazine/articles/2016/01/former-cardinals-official-pleads-guilty-to-hacking-into-astros-system/2019-09-16T10:26:13-04:00weekly0.5/security-management-magazine/articles/2016/01/ymcas-app-investment/2019-11-22T15:08:56-05:00weekly0.5/security-management-magazine/articles/2016/01/extreme-resilience/2019-11-22T15:00:28-05:00weekly0.5/security-management-magazine/articles/2016/01/the-fema-five/2019-09-16T10:25:24-04:00weekly0.5/security-management-magazine/articles/2016/01/obama-takes-action-to-reduce-u.s.-gun-violence/2019-09-16T10:25:07-04:00weekly0.5/security-management-magazine/articles/2016/01/the-highly-evolved-leader/2019-11-21T15:43:50-05:00weekly0.5/security-management-magazine/articles/2016/01/a-barometer-of-behavior/2019-11-21T16:00:42-05:00weekly0.5/security-management-magazine/articles/2016/01/security-spotlight-internet-of-things/2019-09-16T10:24:22-04:00weekly0.5/security-management-magazine/articles/2016/01/oneil-named-as-new-asis-ceo/2019-12-20T14:56:24-05:00weekly0.5/security-management-magazine/articles/2016/01/book-review-social-crime/2019-11-22T14:50:36-05:00weekly0.5/security-management-magazine/articles/2016/01/book-review-whistleblowers-leaks-and-the-media/2019-12-20T15:08:18-05:00weekly0.5/security-management-magazine/articles/2016/01/book-review-countdown-to-zero-day/2019-11-22T15:51:50-05:00weekly0.5/security-management-magazine/articles/2016/01/sm-online-january-2016/2019-11-21T16:22:56-05:00weekly0.5/security-management-magazine/articles/2016/01/legal-report-resources-january-2016/2019-12-20T15:08:29-05:00weekly0.5/security-management-magazine/articles/2016/01/pecking-order/2019-11-22T14:38:29-05:00weekly0.5/security-management-magazine/articles/2016/01/industry-news-january-2016/2019-11-22T15:33:12-05:00weekly0.5/security-management-magazine/articles/2016/01/asis-news-january-2016/2019-12-20T14:58:07-05:00weekly0.5/security-management-magazine/articles/2016/01/mall-security/2019-12-20T14:57:17-05:00weekly0.5/security-management-magazine/articles/2016/01/legal-report-january-2016/2019-11-22T15:24:04-05:00weekly0.5/security-management-magazine/articles/2018/12/census-scrutiny/2019-08-24T15:53:13-04:00weekly0.5/security-management-magazine/articles/2018/12/book-review-retail-risk/2019-08-13T10:05:23-04:00weekly0.5/security-management-magazine/articles/2018/12/access-with-a-twist/2019-08-13T10:02:16-04:00weekly0.5/security-management-magazine/articles/2018/12/a-shock-to-the-system/2019-08-13T09:58:08-04:00weekly0.5/security-management-magazine/articles/2018/12/book-review-surgery-center-safety/2019-08-14T11:38:42-04:00weekly0.5/security-management-magazine/articles/2018/12/dancing-with-yourself/2023-04-03T09:32:51-04:00weekly0.5/security-management-magazine/articles/2018/12/editors-note-know-thyself/2019-08-24T15:39:25-04:00weekly0.5/security-management-magazine/articles/2018/12/avoiding-breaches/2020-06-23T19:17:49-04:00weekly0.5/security-management-magazine/articles/2018/12/book-review-it-policies/2020-06-23T19:17:49-04:00weekly0.5/security-management-magazine/articles/2018/12/maritime-maladies2/2019-08-24T16:01:23-04:00weekly0.5/security-management-magazine/articles/2018/12/cyberthreats-innovation-and-the-future-of-ai/2020-06-23T19:17:50-04:00weekly0.5/security-management-magazine/articles/2018/12/transport-to-transhumanism/2019-08-24T16:11:51-04:00weekly0.5/security-management-magazine/articles/2018/12/gaming-security-patrons-players-and-cheats/2019-08-13T09:18:46-04:00weekly0.5/security-management-magazine/articles/2018/12/sm-digital-december-2018/2019-08-24T10:33:54-04:00weekly0.5/security-management-magazine/articles/2018/12/december-2018-asis-news/2019-08-13T09:07:10-04:00weekly0.5/security-management-magazine/articles/2018/12/december-2018-legal-report/2019-08-24T10:03:20-04:00weekly0.5/security-management-magazine/articles/2018/12/december-2018-industry-news/2019-08-24T10:27:28-04:00weekly0.5/security-management-magazine/articles/2018/12/certification--profile-jeffrey-a.-slotnick-cpp-psp/2019-08-12T16:42:57-04:00weekly0.5/security-management-magazine/articles/2018/12/book-review-urban-emergency-management/2019-08-13T10:10:38-04:00weekly0.5/security-management-magazine/articles/2018/12/five-ways-to-protect-open-air-art/2019-08-12T16:36:45-04:00weekly0.5/security-management-magazine/articles/2018/11/shooing-off-copper-crime-waves/2019-08-13T14:17:30-04:00weekly0.5/security-management-magazine/articles/2018/11/sm-online-november-2018/2019-08-13T14:11:52-04:00weekly0.5/security-management-magazine/articles/2018/11/legal-report-resources-november-2018/2019-08-24T10:11:43-04:00weekly0.5/security-management-magazine/articles/2018/11/career-pathways-in-security/2024-01-02T12:15:19-05:00weekly0.5/security-management-magazine/articles/2018/11/safer-shipping/2019-08-13T14:03:04-04:00weekly0.5/security-management-magazine/articles/2018/11/building-a-hostility-free-workplace/2019-08-13T13:58:44-04:00weekly0.5/security-management-magazine/articles/2018/11/something-in-the-water/2020-06-23T19:17:51-04:00weekly0.5/security-management-magazine/articles/2018/11/crossed-wires/2019-08-13T13:49:17-04:00weekly0.5/security-management-magazine/articles/2018/11/november-2018-asis-news/2019-08-14T11:30:59-04:00weekly0.5/security-management-magazine/articles/2018/11/supply-and-demand/2019-08-24T15:45:06-04:00weekly0.5/security-management-magazine/articles/2018/11/november-2018-industry-news/2019-08-24T10:31:51-04:00weekly0.5/security-management-magazine/articles/2018/11/november-2018-legal-report/2019-08-24T10:16:53-04:00weekly0.5/security-management-magazine/articles/2018/11/disastrously-unprepared/2019-08-24T15:55:24-04:00weekly0.5/security-management-magazine/articles/2018/11/federal-misconduct/2019-08-24T15:57:52-04:00weekly0.5/security-management-magazine/articles/2018/11/book-review-whats-your-plan/2019-08-13T13:14:32-04:00weekly0.5/security-management-magazine/articles/2018/11/certification-profile-nick-santillo-cpp-pci-psp/2019-08-13T13:11:20-04:00weekly0.5/security-management-magazine/articles/2018/11/book-review-small-wars-big-data/2019-08-13T13:08:40-04:00weekly0.5/security-management-magazine/articles/2018/11/book-review-are-we-safe-enough/2019-08-14T11:28:55-04:00weekly0.5/security-management-magazine/articles/2018/11/book-review-private-security/2019-08-13T13:05:42-04:00weekly0.5/security-management-magazine/articles/2018/11/release-the-robots/2020-06-23T19:17:52-04:00weekly0.5/security-management-magazine/articles/2018/10/sm-online-october-2018/2019-08-14T11:26:55-04:00weekly0.5/security-management-magazine/articles/2018/10/october-2018-legal-report-resources/2019-08-24T10:17:59-04:00weekly0.5/security-management-magazine/articles/2018/10/smarter-structures-safer-spaces/2023-03-27T09:49:58-04:00weekly0.5/security-management-magazine/articles/2018/10/an-investment-in-employees/2019-08-14T11:37:30-04:00weekly0.5/security-management-magazine/articles/2018/10/how-to-foster-a-safety-culture/2019-08-14T11:41:29-04:00weekly0.5/security-management-magazine/articles/2018/10/october-2018-asis-news/2019-08-14T11:43:58-04:00weekly0.5/security-management-magazine/articles/2018/10/preventing-port-problems/2019-08-14T11:46:42-04:00weekly0.5/security-management-magazine/articles/2018/10/a-stronger-handshake/2019-08-24T09:48:08-04:00weekly0.5/security-management-magazine/articles/2018/10/code-talkers/2019-08-24T15:32:23-04:00weekly0.5/security-management-magazine/articles/2018/10/october-2018-industry-news/2019-08-24T10:32:28-04:00weekly0.5/security-management-magazine/articles/2018/10/qa-cybersecurity-and-infrastructure/2019-08-14T12:01:52-04:00weekly0.5/security-management-magazine/articles/2018/10/october-2018-legal-report/2019-08-24T10:17:26-04:00weekly0.5/security-management-magazine/articles/2018/10/shaping-sanctuary/2019-08-14T12:07:57-04:00weekly0.5/security-management-magazine/articles/2018/10/portrait-of-a-shooter/2022-12-27T15:34:39-05:00weekly0.5/security-management-magazine/articles/2018/10/rising-seas/2019-08-24T16:03:22-04:00weekly0.5/security-management-magazine/articles/2018/10/book-review-first-responders-handbook/2019-08-14T12:16:52-04:00weekly0.5/security-management-magazine/articles/2018/10/book-review-online-danger/2019-08-14T12:19:34-04:00weekly0.5/security-management-magazine/articles/2018/10/book-review-disaster-recovery/2019-08-14T12:21:41-04:00weekly0.5/security-management-magazine/articles/2018/10/book-review-gun-violence/2019-08-14T12:23:36-04:00weekly0.5/security-management-magazine/articles/2018/10/certification-profile-jeff-sieben-cpp/2020-06-23T19:51:33-04:00weekly0.5/security-management-magazine/articles/2018/09/sm-online-september-2018/2019-08-15T14:58:07-04:00weekly0.5/security-management-magazine/articles/2018/09/september-2018-legal-report-resources/2019-08-24T10:20:52-04:00weekly0.5/security-management-magazine/articles/2018/09/artful-manipulation/2019-08-15T16:11:50-04:00weekly0.5/security-management-magazine/articles/2018/09/a-failure-to-plan/2022-04-07T15:04:11-04:00weekly0.5/security-management-magazine/articles/2018/09/stay/2019-08-24T16:07:49-04:00weekly0.5/security-management-magazine/articles/2018/09/lessons-in-violence-prevention/2019-08-15T15:57:53-04:00weekly0.5/security-management-magazine/articles/2018/09/a-world-of-risk/2019-08-15T15:47:46-04:00weekly0.5/security-management-magazine/articles/2018/09/september-2018-asis-news/2019-08-15T15:05:11-04:00weekly0.5/security-management-magazine/articles/2018/09/book-review-150-things-you-should-know-about-security/2019-08-15T15:38:28-04:00weekly0.5/security-management-magazine/articles/2018/09/open-doors-secure-spaces/2019-08-15T15:36:31-04:00weekly0.5/security-management-magazine/articles/2018/09/election-hardening/2019-08-24T10:05:24-04:00weekly0.5/security-management-magazine/articles/2018/09/editors-note-explorers/2019-08-24T15:35:15-04:00weekly0.5/security-management-magazine/articles/2018/09/september-2018-industry-news/2019-08-24T10:33:09-04:00weekly0.5/security-management-magazine/articles/2018/09/september-2018-legal-report/2019-08-24T10:20:07-04:00weekly0.5/security-management-magazine/articles/2018/09/the-dual-use-problem/2019-08-15T15:25:44-04:00weekly0.5/security-management-magazine/articles/2018/09/soft-targets-hard-challenges/2019-08-24T16:06:14-04:00weekly0.5/security-management-magazine/articles/2018/09/harassment-in-the-academies/2019-08-24T15:59:57-04:00weekly0.5/security-management-magazine/articles/2018/09/certification-profile-tim-sutton-cpp/2019-08-15T15:16:39-04:00weekly0.5/security-management-magazine/articles/2018/09/book-review-floods/2019-08-15T15:12:31-04:00weekly0.5/security-management-magazine/articles/2018/09/book-review-adaptive-business-continuity/2019-08-15T15:10:18-04:00weekly0.5/security-management-magazine/articles/2018/09/five-ways-to-mitigate-operational-stress/2022-01-12T10:08:05-05:00weekly0.5/security-management-magazine/articles/2018/09/gsx-2018-product-showcase2/2019-08-19T19:32:29-04:00weekly0.5/security-management-magazine/articles/2018/08/2019-editorial-calendar/2019-08-14T10:30:42-04:00weekly0.5/security-management-magazine/articles/2018/08/five-not-so-easy-pieces/2019-08-19T20:24:59-04:00weekly0.5/security-management-magazine/articles/2018/08/street-smarts/2019-08-19T20:52:58-04:00weekly0.5/security-management-magazine/articles/2018/08/how-to-implement-esrm/2019-08-19T20:34:02-04:00weekly0.5/security-management-magazine/articles/2018/08/organizational-health-individual-wellness/2019-08-19T20:29:15-04:00weekly0.5/security-management-magazine/articles/2018/08/sm-online-august-2018/2019-08-19T21:09:31-04:00weekly0.5/security-management-magazine/articles/2018/08/a-screening-minefield/2019-08-19T20:47:50-04:00weekly0.5/security-management-magazine/articles/2018/08/august-2018-asis-news/2019-08-19T20:56:55-04:00weekly0.5/security-management-magazine/articles/2018/08/checking-in-for-safety/2019-08-19T20:01:41-04:00weekly0.5/security-management-magazine/articles/2018/08/cyber-goals-past-due/2019-08-24T10:02:47-04:00weekly0.5/security-management-magazine/articles/2018/08/editors-note-failing-to-plan/2019-08-24T15:36:06-04:00weekly0.5/security-management-magazine/articles/2018/08/august-2018-industry-news/2019-08-24T10:26:51-04:00weekly0.5/security-management-magazine/articles/2018/08/august-2018-legal-report/2019-08-24T09:54:40-04:00weekly0.5/security-management-magazine/articles/2018/08/getting-the-green-light/2019-08-19T19:55:06-04:00weekly0.5/security-management-magazine/articles/2018/08/the-fraudster-down-the-hall/2020-06-23T19:17:56-04:00weekly0.5/security-management-magazine/articles/2018/08/critical-risk-management/2019-08-24T15:53:53-04:00weekly0.5/security-management-magazine/articles/2018/08/august-2018-legal-report-resources/2019-08-24T09:55:20-04:00weekly0.5/security-management-magazine/articles/2018/08/book-review-business-continuity/2019-08-14T10:16:52-04:00weekly0.5/security-management-magazine/articles/2018/08/book-review--anatomy-of-terror/2020-06-23T19:17:57-04:00weekly0.5/security-management-magazine/articles/2018/08/certification-profile-sanjeev-mishra-cpp/2019-08-19T20:58:42-04:00weekly0.5/security-management-magazine/articles/2018/08/book-review-financial-investigations/2019-08-19T20:21:03-04:00weekly0.5/security-management-magazine/articles/2018/08/video-review-the-coming-storm/2019-08-19T19:58:09-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-sm-online/2019-08-20T15:17:24-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-legal-report-resources/2019-08-24T10:10:06-04:00weekly0.5/security-management-magazine/articles/2018/07/striving-for-higher-standards/2019-08-19T21:49:51-04:00weekly0.5/security-management-magazine/articles/2018/07/performance-conversations-checking-in--coaching-up/2019-08-24T16:01:52-04:00weekly0.5/security-management-magazine/articles/2018/07/preserving-precious-property/2019-08-20T14:57:33-04:00weekly0.5/security-management-magazine/articles/2018/07/bridging-worlds/2019-08-20T14:54:00-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-asis-news/2019-08-20T15:05:59-04:00weekly0.5/security-management-magazine/articles/2018/07/eye-on-the-high-life/2019-08-19T21:37:45-04:00weekly0.5/security-management-magazine/articles/2018/07/blockchain-buzz/2019-08-24T09:56:51-04:00weekly0.5/security-management-magazine/articles/2018/07/editors-note-in-sync/2019-08-24T15:38:56-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-industry-news/2019-08-24T10:29:01-04:00weekly0.5/security-management-magazine/articles/2018/07/qa-the-future-cso/2019-08-20T15:14:21-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-legal-report/2019-08-24T10:09:39-04:00weekly0.5/security-management-magazine/articles/2018/07/the-returned/2019-08-19T21:32:19-04:00weekly0.5/security-management-magazine/articles/2018/07/catastrophe-on-delivery/2020-06-23T19:17:57-04:00weekly0.5/security-management-magazine/articles/2018/07/brac-to-the-future/2019-08-24T15:51:55-04:00weekly0.5/security-management-magazine/articles/2018/07/july-2018-certification-profile-pablo-colombres-cpp/2019-08-20T15:07:10-04:00weekly0.5/security-management-magazine/articles/2018/07/book-review-ethical-forensics/2019-08-19T21:28:34-04:00weekly0.5/security-management-magazine/articles/2018/07/book-review-rebuilding-resilience/2019-08-19T21:34:23-04:00weekly0.5/security-management-magazine/articles/2018/07/book-review-credit-card-fraud/2020-06-23T19:17:57-04:00weekly0.5/security-management-magazine/articles/2018/06/june-2018-asis-news/2019-08-21T10:16:59-04:00weekly0.5/security-management-magazine/articles/2018/06/scanning-the-schoolyard/2019-08-21T09:36:40-04:00weekly0.5/security-management-magazine/articles/2018/06/attacks-on-the-record/2019-08-24T09:54:02-04:00weekly0.5/security-management-magazine/articles/2018/06/editors-note-dangers/2019-08-24T15:34:26-04:00weekly0.5/security-management-magazine/articles/2018/06/june-2018-industry-news/2019-08-24T10:29:32-04:00weekly0.5/security-management-magazine/articles/2018/06/four-ways-to-improve-healthcare-security/2019-08-21T10:32:39-04:00weekly0.5/security-management-magazine/articles/2018/06/june-2018-legal-report/2019-08-24T10:10:35-04:00weekly0.5/security-management-magazine/articles/2018/06/next-gen-911/2020-06-23T19:17:59-04:00weekly0.5/security-management-magazine/articles/2018/06/far-distant-clearings/2019-08-24T15:56:30-04:00weekly0.5/security-management-magazine/articles/2018/06/artificial-adversaries/2020-06-23T19:18:00-04:00weekly0.5/security-management-magazine/articles/2018/06/certification-profile-kaatje-claes-cpp/2019-08-21T10:30:35-04:00weekly0.5/security-management-magazine/articles/2018/06/june-2018-sm-online/2019-08-21T10:24:14-04:00weekly0.5/security-management-magazine/articles/2018/06/june-2018-legal-report-resources/2019-08-24T10:11:07-04:00weekly0.5/security-management-magazine/articles/2018/06/lost-in-transit/2019-08-24T10:12:20-04:00weekly0.5/security-management-magazine/articles/2018/06/raising-the-bar-food-defense/2019-08-21T09:55:49-04:00weekly0.5/security-management-magazine/articles/2018/06/a-safety-strategy-on-campus/2019-08-21T09:48:20-04:00weekly0.5/security-management-magazine/articles/2018/06/book-review-understanding-personal-security-and-risk/2019-08-21T10:26:48-04:00weekly0.5/security-management-magazine/articles/2018/05/an-explosive-act-assessing-the-safety-of-chemical-facilities/2019-08-24T09:52:07-04:00weekly0.5/security-management-magazine/articles/2018/05/how-to-lead-a-diverse-security-workforce/2019-08-22T11:42:31-04:00weekly0.5/security-management-magazine/articles/2018/05/taking-flight/2019-08-22T09:52:39-04:00weekly0.5/security-management-magazine/articles/2018/05/may-2018-asis-news/2019-08-22T11:47:56-04:00weekly0.5/security-management-magazine/articles/2018/05/giving-security-credit/2019-08-21T15:10:18-04:00weekly0.5/security-management-magazine/articles/2018/05/cyber-as-statecraft/2020-06-23T19:18:01-04:00weekly0.5/security-management-magazine/articles/2018/05/editors-note-mission-creep/2019-08-24T15:40:04-04:00weekly0.5/security-management-magazine/articles/2018/05/may-2018-industry-news/2019-08-24T10:31:15-04:00weekly0.5/security-management-magazine/articles/2018/05/may-2018-legal-report/2019-08-24T10:15:56-04:00weekly0.5/security-management-magazine/articles/2018/05/space-jam/2019-08-22T09:23:34-04:00weekly0.5/security-management-magazine/articles/2018/05/banks-balk-on-bud/2019-08-24T15:49:10-04:00weekly0.5/security-management-magazine/articles/2018/05/risk-rising/2019-08-24T16:04:07-04:00weekly0.5/security-management-magazine/articles/2018/05/may-2018-sm-online/2019-08-22T11:59:03-04:00weekly0.5/security-management-magazine/articles/2018/05/certification-profile-douglas-beaver-cpp/2019-08-22T11:49:18-04:00weekly0.5/security-management-magazine/articles/2018/05/book-review-nanoweapons/2019-08-22T09:39:33-04:00weekly0.5/security-management-magazine/articles/2018/05/book-review-emergency-planning-for-nuclear-power-plants/2020-06-23T19:18:01-04:00weekly0.5/security-management-magazine/articles/2018/05/book-review-mastering-bitcoin/2019-08-22T09:18:16-04:00weekly0.5/security-management-magazine/articles/2018/04/april-2018-sm-online/2019-08-22T14:38:00-04:00weekly0.5/security-management-magazine/articles/2018/04/april-2018-legal-report-resources/2019-08-24T09:53:17-04:00weekly0.5/security-management-magazine/articles/2018/04/isc-west-2018-product-showcase/2019-08-22T14:24:19-04:00weekly0.5/security-management-magazine/articles/2018/04/active-assailant-unarmed-officer/2022-11-30T12:06:45-05:00weekly0.5/security-management-magazine/articles/2018/04/take-no-chances/2019-08-22T14:12:32-04:00weekly0.5/security-management-magazine/articles/2018/04/on-a-sea-of-risk/2019-08-22T14:09:19-04:00weekly0.5/security-management-magazine/articles/2018/04/personnel-peril/2019-08-22T14:02:41-04:00weekly0.5/security-management-magazine/articles/2018/04/behind-the-wheel-stopping-distracted-driving/2019-08-22T13:53:11-04:00weekly0.5/security-management-magazine/articles/2018/04/april-2018-asis-news/2019-08-22T14:16:40-04:00weekly0.5/security-management-magazine/articles/2018/04/mobilizing-the-force/2019-08-22T13:40:19-04:00weekly0.5/security-management-magazine/articles/2018/04/the-problem-with-bots/2020-06-23T19:18:03-04:00weekly0.5/security-management-magazine/articles/2018/04/editors-note-awareness/2019-08-24T15:33:43-04:00weekly0.5/security-management-magazine/articles/2018/04/april-2018-industry-news/2019-08-24T10:26:13-04:00weekly0.5/security-management-magazine/articles/2018/04/identify-the-gaps/2019-08-22T14:32:19-04:00weekly0.5/security-management-magazine/articles/2018/04/april-2018-legal-report/2019-08-24T09:52:44-04:00weekly0.5/security-management-magazine/articles/2018/04/seeing-double/2019-08-22T13:29:00-04:00weekly0.5/security-management-magazine/articles/2018/04/the-land-of-plunder/2019-08-24T16:10:33-04:00weekly0.5/security-management-magazine/articles/2018/04/the-price-of-destruction/2019-08-24T16:11:09-04:00weekly0.5/security-management-magazine/articles/2018/04/certification-profile-kevin-stranahan-cpp-pci-psp/2019-08-22T14:18:26-04:00weekly0.5/security-management-magazine/articles/2018/04/book-review-tradecraft-primer/2019-08-22T13:25:57-04:00weekly0.5/security-management-magazine/articles/2018/04/book-review-healthcare-emergency-incident-management/2019-08-22T13:31:14-04:00weekly0.5/security-management-magazine/articles/2018/04/book-review-private-investigation-and-homeland-security/2019-08-13T13:27:34-04:00weekly0.5/security-management-magazine/articles/2018/03/book-review-the-managers-guide-to-enterprise-security-risk-management-essentials-of-risk-based-security/2019-08-22T17:35:24-04:00weekly0.5/security-management-magazine/articles/2018/03/march-2018-sm-online/2019-08-22T17:32:56-04:00weekly0.5/security-management-magazine/articles/2018/03/march-2018-legal-report-resources/2019-08-24T10:13:45-04:00weekly0.5/security-management-magazine/articles/2018/03/march-2018-asis-news/2019-08-22T17:08:28-04:00weekly0.5/security-management-magazine/articles/2018/03/flying-over-fire/2019-08-22T16:41:28-04:00weekly0.5/security-management-magazine/articles/2018/03/missed-deadline/2019-08-24T10:16:26-04:00weekly0.5/security-management-magazine/articles/2018/03/editors-note-timing/2019-08-24T15:42:05-04:00weekly0.5/security-management-magazine/articles/2018/03/march-2018-industry-news/2019-08-24T10:30:07-04:00weekly0.5/security-management-magazine/articles/2018/03/four-challenges-facing-aviation-security/2024-01-02T11:48:23-05:00weekly0.5/security-management-magazine/articles/2018/03/march-2018-legal-report/2019-08-24T10:13:01-04:00weekly0.5/security-management-magazine/articles/2018/03/paving-the-way/2019-08-22T16:15:05-04:00weekly0.5/security-management-magazine/articles/2018/03/the-fraudians-slip-in/2019-08-24T16:08:49-04:00weekly0.5/security-management-magazine/articles/2018/03/tasers-and-the-united-nations/2019-08-24T16:08:20-04:00weekly0.5/security-management-magazine/articles/2018/03/fair-neutral/2019-08-22T16:50:33-04:00weekly0.5/security-management-magazine/articles/2018/03/coachable-employees/2019-08-22T17:04:25-04:00weekly0.5/security-management-magazine/articles/2018/03/weapons-in-the-workplace/2024-01-02T11:04:10-05:00weekly0.5/security-management-magazine/articles/2018/03/certification-profile-leon-beresford-cpp/2019-08-22T17:14:19-04:00weekly0.5/security-management-magazine/articles/2018/03/book-review-surveillance-zone/2019-08-22T16:17:05-04:00weekly0.5/security-management-magazine/articles/2018/03/book-review-supply-chain-security/2019-08-22T16:12:14-04:00weekly0.5/security-management-magazine/articles/2018/02/february-2018-sm-online/2019-08-26T20:07:35-04:00weekly0.5/security-management-magazine/articles/2018/02/february-2018-legal-report-resources/2019-08-26T20:04:50-04:00weekly0.5/security-management-magazine/articles/2018/02/february-2018-asis-news/2019-08-26T19:48:22-04:00weekly0.5/security-management-magazine/articles/2018/02/spot-the-shots/2019-08-26T19:00:41-04:00weekly0.5/security-management-magazine/articles/2018/02/a-cyber-pipeline/2019-08-26T19:05:33-04:00weekly0.5/security-management-magazine/articles/2018/02/editors-note-incentive/2019-08-25T13:13:22-04:00weekly0.5/security-management-magazine/articles/2018/02/february-2018-industry-news/2019-08-26T20:00:08-04:00weekly0.5/security-management-magazine/articles/2018/02/february-2018-legal-report/2019-08-26T20:05:22-04:00weekly0.5/security-management-magazine/articles/2018/02/opening-up/2019-08-25T13:27:15-04:00weekly0.5/security-management-magazine/articles/2018/02/vote-integrity/2019-08-25T13:18:53-04:00weekly0.5/security-management-magazine/articles/2018/02/containment-strategies/2019-08-25T13:22:25-04:00weekly0.5/security-management-magazine/articles/2018/02/how-to-learn-from-las-vegas/2019-08-26T19:13:21-04:00weekly0.5/security-management-magazine/articles/2018/02/paved-with-good-intentions/2019-08-26T19:41:52-04:00weekly0.5/security-management-magazine/articles/2018/02/the-strategic-leader/2019-08-26T19:29:38-04:00weekly0.5/security-management-magazine/articles/2018/02/an-expert-partnership/2019-08-26T19:24:05-04:00weekly0.5/security-management-magazine/articles/2018/02/patients-are-people-first/2019-08-26T19:20:12-04:00weekly0.5/security-management-magazine/articles/2018/02/certification-profile-pamela-cichon-cpp/2019-08-26T19:50:00-04:00weekly0.5/security-management-magazine/articles/2018/02/book-review-online-records/2019-08-13T10:18:47-04:00weekly0.5/security-management-magazine/articles/2018/02/book-review-mental-health/2020-06-23T19:18:08-04:00weekly0.5/security-management-magazine/articles/2018/02/commerce-in-china/2019-08-26T20:08:52-04:00weekly0.5/security-management-magazine/articles/2018/01/rethinking-the-intelligence-cycle-for-the-private-sector/2019-09-17T12:59:30-04:00weekly0.5/security-management-magazine/articles/2018/01/speak-the-language-of-payroll/2019-08-26T21:42:02-04:00weekly0.5/security-management-magazine/articles/2018/01/book-review-sports-travel-security/2019-08-26T21:48:08-04:00weekly0.5/security-management-magazine/articles/2018/01/sm-online-january-2018/2019-08-26T22:12:28-04:00weekly0.5/security-management-magazine/articles/2018/01/january-2018-legal-report-resources/2019-08-26T22:14:01-04:00weekly0.5/security-management-magazine/articles/2018/01/put-training-to-the-test/2019-08-26T21:03:12-04:00weekly0.5/security-management-magazine/articles/2018/01/how-to-hack-a-human/2019-08-26T21:18:53-04:00weekly0.5/security-management-magazine/articles/2018/01/new-technology-with-a-personal-touch/2019-08-26T21:13:41-04:00weekly0.5/security-management-magazine/articles/2018/01/chase-leading-through-change/2019-08-26T21:06:55-04:00weekly0.5/security-management-magazine/articles/2018/01/january-2018-asis-news/2019-08-26T21:54:27-04:00weekly0.5/security-management-magazine/articles/2018/01/find-the-fire/2019-08-26T20:40:09-04:00weekly0.5/security-management-magazine/articles/2018/01/global-cyber-awareness/2020-06-23T19:18:08-04:00weekly0.5/security-management-magazine/articles/2018/01/editors-note-resolutions/2019-08-26T20:19:52-04:00weekly0.5/security-management-magazine/articles/2018/01/january-2018-industry-news/2019-08-26T22:06:37-04:00weekly0.5/security-management-magazine/articles/2018/01/qa-event-security/2020-05-08T14:01:29-04:00weekly0.5/security-management-magazine/articles/2018/01/january-2018-legal-report/2019-08-26T22:02:41-04:00weekly0.5/security-management-magazine/articles/2018/01/evolving-biothreats/2019-08-26T20:33:12-04:00weekly0.5/security-management-magazine/articles/2018/01/disaster-dominoes/2019-08-26T20:23:28-04:00weekly0.5/security-management-magazine/articles/2018/01/whistleblowing-money-v.-motivation/2019-08-26T20:25:50-04:00weekly0.5/security-management-magazine/articles/2018/01/certification-profile-darin-dillon-cpp/2019-08-26T21:57:53-04:00weekly0.5/security-management-magazine/articles/2018/01/book-review-cybersecurity-law/2019-08-26T20:51:39-04:00weekly0.5/security-management-magazine/articles/2018/01/book-review-resolving-conflicts/2019-08-26T20:35:29-04:00weekly0.5/security-management-magazine/articles/2018/01/book-review-humane-policing/2019-09-11T11:32:40-04:00weekly0.5/security-management-magazine/articles/2015/12/a-sweet-solution/2019-12-20T16:03:29-05:00weekly0.5/security-management-magazine/articles/2015/12/plan-para-tener-proteccin-amable/2019-12-20T17:24:44-05:00weekly0.5/security-management-magazine/articles/2015/12/los-retos-que-enfrentan-los-grupos-terroristas/2021-03-12T15:45:19-05:00weekly0.5/security-management-magazine/articles/2015/12/slavery-in-the-supply-chain/2019-12-20T15:59:10-05:00weekly0.5/security-management-magazine/articles/2015/12/on-alert-for-anomalies/2019-12-20T16:04:53-05:00weekly0.5/security-management-magazine/articles/2015/12/how-criminals-made-$18-million-by-holding-our-data-hostage/2019-12-20T16:06:29-05:00weekly0.5/security-management-magazine/articles/2015/12/wyndham-agrees-to-annual-audits-to-settle-ftc-data-security-suit/2019-08-01T17:06:33-04:00weekly0.5/security-management-magazine/articles/2015/12/book-review-risk-management-of-less-lethal-options/2019-12-20T16:54:36-05:00weekly0.5/security-management-magazine/articles/2015/12/the-newest-challenge-for-prison-security--drones/2019-12-20T15:57:50-05:00weekly0.5/security-management-magazine/articles/2015/12/eu-agrees-to-first-set-of-cybersecurity-ruleswhat-this-means-for-your-company/2019-08-01T17:06:33-04:00weekly0.5/security-management-magazine/articles/2015/12/four-indicators-security-professionals-should-look-for-when-identifying-suicide-bombers/2024-01-02T12:39:13-05:00weekly0.5/security-management-magazine/articles/2015/12/protecting-soft-targets/2019-08-01T17:06:34-04:00weekly0.5/security-management-magazine/articles/2015/12/domestic-terrorism-is-on-the-rise/2019-12-20T16:00:47-05:00weekly0.5/security-management-magazine/articles/2015/12/update-san-bernardino-suspects-killed-in-police-shootout/2019-08-01T17:06:34-04:00weekly0.5/security-management-magazine/articles/2015/12/five-red-flags-from-problem-employees/2019-12-20T15:52:11-05:00weekly0.5/security-management-magazine/articles/2015/12/the-surprising-amount-of-information-the-fbi-can-request-from-your-internet-service-provider/2019-08-01T17:06:34-04:00weekly0.5/security-management-magazine/articles/2015/12/sm-online-december-2015/2019-12-20T15:53:44-05:00weekly0.5/security-management-magazine/articles/2015/12/legal-report-resources-december-2015/2019-12-20T16:09:26-05:00weekly0.5/security-management-magazine/articles/2015/12/mission-critical/2019-12-20T15:55:27-05:00weekly0.5/security-management-magazine/articles/2015/12/what-mcdonalds-approach-to-biometrics-says-about-the-future-of-restaurants/2019-12-20T15:38:53-05:00weekly0.5/security-management-magazine/articles/2015/12/how-to-build-a-culture-of-security/2019-12-20T15:40:00-05:00weekly0.5/security-management-magazine/articles/2015/12/lets-talk-security/2019-12-20T15:41:40-05:00weekly0.5/security-management-magazine/articles/2015/12/industry-news-december-2015/2019-12-20T15:46:58-05:00weekly0.5/security-management-magazine/articles/2015/12/asis-news-december-2015/2019-12-20T15:47:49-05:00weekly0.5/security-management-magazine/articles/2015/12/the-one-case-that-shows-how-the-ftc-is-enforcing-data-security-practices/2019-12-20T15:45:50-05:00weekly0.5/security-management-magazine/articles/2015/12/10-years-of-terror/2019-12-20T15:36:06-05:00weekly0.5/security-management-magazine/articles/2015/12/december-2015-product-showcase/2019-12-20T15:43:26-05:00weekly0.5/security-management-magazine/articles/2015/12/book-review-online-risk/2019-12-20T16:07:18-05:00weekly0.5/security-management-magazine/articles/2015/12/book-review-hazards-analysis/2019-12-20T16:01:43-05:00weekly0.5/security-management-magazine/articles/2015/12/book-review-global-security-consulting/2019-12-20T16:08:37-05:00weekly0.5/security-management-magazine/articles/2015/12/book-review-intelligence-based-security/2019-08-01T17:06:35-04:00weekly0.5/security-management-magazine/articles/2015/12/book-review-homeland-security-and-private-sector-business/2019-08-01T17:06:35-04:00weekly0.5/security-management-magazine/articles/2015/12/book-review-safeguarding-intangible-assets/2019-08-01T17:06:35-04:00weekly0.5/security-management-magazine/articles/2015/11/inoculating-against-violence/2019-12-20T17:03:33-05:00weekly0.5/security-management-magazine/articles/2015/11/campus-id-gets-a-makeover/2019-12-20T17:18:01-05:00weekly0.5/security-management-magazine/articles/2015/11/emv-gets-u.s.-debut/2019-12-20T17:06:33-05:00weekly0.5/security-management-magazine/articles/2015/11/to-ensure-a-safe-haven/2019-12-20T17:09:35-05:00weekly0.5/security-management-magazine/articles/2015/11/urban-security-in-paris/2019-08-01T17:06:36-04:00weekly0.5/security-management-magazine/articles/2015/11/a-strategy-for-fusion-centers/2019-12-20T17:10:29-05:00weekly0.5/security-management-magazine/articles/2015/11/detecting-suicide-bombers/2019-08-01T17:06:36-04:00weekly0.5/security-management-magazine/articles/2015/11/terror-groups-face-challenges/2019-12-20T17:14:33-05:00weekly0.5/security-management-magazine/articles/2015/11/la-revolucin-del-internet-de-las-cosas/2021-03-12T15:48:56-05:00weekly0.5/security-management-magazine/articles/2015/11/como-administrar-una-fusin/2021-03-12T15:51:08-05:00weekly0.5/security-management-magazine/articles/2015/11/industry-news-november-2015/2019-12-20T17:20:51-05:00weekly0.5/security-management-magazine/articles/2015/11/how-to-prevent-profiling/2019-12-20T17:05:01-05:00weekly0.5/security-management-magazine/articles/2015/11/ifcpp-symposium-focuses-on-collaboration/2019-08-01T17:06:36-04:00weekly0.5/security-management-magazine/articles/2015/11/a-plan-for-polite-protection/2019-12-20T16:59:42-05:00weekly0.5/security-management-magazine/articles/2015/11/sm-online-november-2015/2019-12-20T17:16:36-05:00weekly0.5/security-management-magazine/articles/2015/11/legal-report-resources-november-2015/2019-12-20T17:18:51-05:00weekly0.5/security-management-magazine/articles/2015/11/seeing-blue/2019-12-20T17:15:42-05:00weekly0.5/security-management-magazine/articles/2015/11/asis-news-november-2015/2019-12-20T17:22:07-05:00weekly0.5/security-management-magazine/articles/2015/11/legal-report-november-2015/2019-12-20T17:20:00-05:00weekly0.5/security-management-magazine/articles/2015/11/constructing-resilience/2019-12-20T17:11:42-05:00weekly0.5/security-management-magazine/articles/2015/11/book-review-criminal-investigations/2019-12-20T17:12:35-05:00weekly0.5/security-management-magazine/articles/2015/11/book-review-encryption/2019-12-09T15:36:56-05:00weekly0.5/security-management-magazine/articles/2015/10/qa-with-lorraine-homer/2019-08-01T17:06:37-04:00weekly0.5/security-management-magazine/articles/2015/10/the-iot-revolution/2020-01-14T13:51:00-05:00weekly0.5/security-management-magazine/articles/2015/10/tales-of-twisters/2020-01-14T13:48:58-05:00weekly0.5/security-management-magazine/articles/2015/10/communication-under-pressure/2020-06-23T19:22:32-04:00weekly0.5/security-management-magazine/articles/2015/10/watch-the-workplace-legally/2020-01-14T13:47:51-05:00weekly0.5/security-management-magazine/articles/2015/10/decoding-digital-evidence/2020-01-14T13:49:58-05:00weekly0.5/security-management-magazine/articles/2015/10/industry-news-october-2015/2020-01-14T13:46:43-05:00weekly0.5/security-management-magazine/articles/2015/10/new-guidance-needed/2020-01-14T13:45:59-05:00weekly0.5/security-management-magazine/articles/2015/10/from-military-heroes-to-security-assets/2020-01-14T13:45:25-05:00weekly0.5/security-management-magazine/articles/2015/10/travel-safety-goes-global/2019-12-09T06:33:28-05:00weekly0.5/security-management-magazine/articles/2015/10/how-to-manage-a-merger/2020-01-14T13:42:22-05:00weekly0.5/security-management-magazine/articles/2015/10/remote-detection/2020-01-14T13:39:56-05:00weekly0.5/security-management-magazine/articles/2015/10/rising-resilience/2020-01-14T13:38:56-05:00weekly0.5/security-management-magazine/articles/2015/10/book-review-the-jersey-shore-thrill-killer/2019-08-01T17:06:38-04:00weekly0.5/security-management-magazine/articles/2015/10/book-review-integrated-security-systems-design-2nd-edition/2019-08-01T17:06:39-04:00weekly0.5/security-management-magazine/articles/2015/10/book-review-investigative-interviewing-psychology-method-and-practice/2019-08-01T17:06:39-04:00weekly0.5/security-management-magazine/articles/2015/10/asis-news-october-2015/2020-01-14T13:35:50-05:00weekly0.5/security-management-magazine/articles/2015/10/qa-the-value-of-metrics/2020-01-14T13:34:52-05:00weekly0.5/security-management-magazine/articles/2015/10/legal-report-october-2015/2020-01-14T13:33:39-05:00weekly0.5/security-management-magazine/articles/2015/10/sm-online-october-2015/2020-01-14T13:32:57-05:00weekly0.5/security-management-magazine/articles/2015/10/legal-report-resources-october-2015/2020-01-14T13:31:38-05:00weekly0.5/security-management-magazine/articles/2015/10/book-review-long-term-community-recovery-from-natural-disasters/2020-01-14T13:17:32-05:00weekly0.5/security-management-magazine/articles/2015/10/book-review-travel-security/2020-01-14T13:15:56-05:00weekly0.5/security-management-magazine/articles/2015/10/book-review-security-basics/2020-01-14T13:14:59-05:00weekly0.5/security-management-magazine/articles/2015/09/ospas-to-recognize-security-all-stars/2019-08-01T17:06:39-04:00weekly0.5/security-management-magazine/articles/2015/09/kellys-new-york-state-of-mind/2019-09-05T09:45:48-04:00weekly0.5/security-management-magazine/articles/2015/09/csos-learn-how-osac-can-help/2019-08-01T17:06:40-04:00weekly0.5/security-management-magazine/articles/2015/09/meet-the-board/2019-08-01T17:06:40-04:00weekly0.5/security-management-magazine/articles/2015/09/stellar-sessions/2019-08-01T17:06:40-04:00weekly0.5/security-management-magazine/articles/2015/09/asis-celebrating-60-years/2020-10-02T16:48:25-04:00weekly0.5/security-management-magazine/articles/2015/09/csos-share-knowledge/2019-08-01T17:07:33-04:00weekly0.5/security-management-magazine/articles/2015/09/exceptional-asis-members-honored-at-luncheon/2019-08-01T17:07:33-04:00weekly0.5/security-management-magazine/articles/2015/09/spectacular-sessions/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/preseminar-programs-leverage-learning/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/meet-the-accolades-winners/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/school-funding-winner/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/walker-award-honors-wick/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/international-buyer-program-is-here/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/dimartino-earns-criscuoli-award/2021-03-08T11:08:17-05:00weekly0.5/security-management-magazine/articles/2015/09/security-management-covering-asis15-in-anaheim/2019-08-01T17:07:34-04:00weekly0.5/security-management-magazine/articles/2015/09/dream-teams/2020-01-14T14:22:59-05:00weekly0.5/security-management-magazine/articles/2015/09/harnessing-the-power-of-emotions/2020-01-16T15:46:57-05:00weekly0.5/security-management-magazine/articles/2015/09/private-school-public-protection/2020-01-14T14:18:58-05:00weekly0.5/security-management-magazine/articles/2015/09/2015-seminar-product-showcase/2019-08-01T17:07:35-04:00weekly0.5/security-management-magazine/articles/2015/09/el-lxi-seminario-y-exposicin-internacional-anual-de-asis/2019-09-05T09:45:04-04:00weekly0.5/security-management-magazine/articles/2015/09/industry-news-september-2015/2020-01-14T14:17:36-05:00weekly0.5/security-management-magazine/articles/2015/09/implementing-biometrics-in-the-workplace/2020-02-25T17:16:14-05:00weekly0.5/security-management-magazine/articles/2015/09/preparing-for-protests/2022-04-07T14:37:17-04:00weekly0.5/security-management-magazine/articles/2015/09/doj-to-focus-on-executives-in-corporate-investigations/2019-08-01T17:07:35-04:00weekly0.5/security-management-magazine/articles/2015/09/teach-a-man-to-phish/2020-01-14T14:14:01-05:00weekly0.5/security-management-magazine/articles/2015/09/the-cyber-cavalry/2019-12-04T13:00:13-05:00weekly0.5/security-management-magazine/articles/2015/09/seminar-headline/2019-08-01T17:07:36-04:00weekly0.5/security-management-magazine/articles/2015/09/textbook-rescue/2020-01-14T14:11:43-05:00weekly0.5/security-management-magazine/articles/2015/09/a-growing-nuclear-threat/2020-06-23T19:22:32-04:00weekly0.5/security-management-magazine/articles/2015/09/sm-online-september-2015/2020-01-14T14:10:11-05:00weekly0.5/security-management-magazine/articles/2015/09/legal-report-resources-september-2015/2020-01-14T14:09:33-05:00weekly0.5/security-management-magazine/articles/2015/09/culture-of-caring/2020-01-14T14:08:46-05:00weekly0.5/security-management-magazine/articles/2015/09/communication-in-crisis/2020-06-23T19:22:33-04:00weekly0.5/security-management-magazine/articles/2015/09/watershed/2020-01-14T14:06:55-05:00weekly0.5/security-management-magazine/articles/2015/09/asis-news-september-2015/2020-01-14T14:05:47-05:00weekly0.5/security-management-magazine/articles/2015/09/five-factors-for-guard-booth-design/2020-01-14T14:05:08-05:00weekly0.5/security-management-magazine/articles/2015/09/legal-report-september-2015/2019-12-04T12:54:25-05:00weekly0.5/security-management-magazine/articles/2015/09/book-review-the-business-of-counterterrorism/2020-01-14T14:03:17-05:00weekly0.5/security-management-magazine/articles/2015/09/book-review-disaster-recovery/2020-01-14T14:02:17-05:00weekly0.5/security-management-magazine/articles/2015/09/book-review-digital-video-surveillance-and-security/2020-01-14T14:01:23-05:00weekly0.5/security-management-magazine/articles/2015/09/book-review-white-collar-crime/2020-01-14T14:00:12-05:00weekly0.5/security-management-magazine/articles/2015/08/el-suicidio-y-los-funcionarios-de-seguridad/2020-01-14T15:43:41-05:00weekly0.5/security-management-magazine/articles/2015/08/la-persuasin-adecuada/2020-01-14T15:43:58-05:00weekly0.5/security-management-magazine/articles/2015/08/book-review-strategic-intelligence-management/2019-08-01T17:07:38-04:00weekly0.5/security-management-magazine/articles/2015/08/book-review-introduction-to-homeland-security-second-edition/2019-08-01T17:07:38-04:00weekly0.5/security-management-magazine/articles/2015/08/suicide-and-security-officers/2024-01-16T14:54:37-05:00weekly0.5/security-management-magazine/articles/2015/08/corruption-crusader/2020-01-14T14:57:52-05:00weekly0.5/security-management-magazine/articles/2015/08/august-2015-industry-news/2020-01-14T14:56:57-05:00weekly0.5/security-management-magazine/articles/2015/08/selling-a-transit-security-project/2020-01-14T14:56:12-05:00weekly0.5/security-management-magazine/articles/2015/08/book-review-unmasking-the-social-engineer/2019-08-01T17:07:38-04:00weekly0.5/security-management-magazine/articles/2015/08/book-review-cyber-security-management/2020-01-14T14:54:08-05:00weekly0.5/security-management-magazine/articles/2015/08/book-review-the-reid-technique-of-interviewing-and-interrogation-for-investigators/2020-01-14T14:53:25-05:00weekly0.5/security-management-magazine/articles/2015/08/barring-imminent-threats/2020-01-14T14:52:15-05:00weekly0.5/security-management-magazine/articles/2015/08/the-end-of-performance-reviews/2020-01-14T14:50:57-05:00weekly0.5/security-management-magazine/articles/2015/08/second-to-none/2020-01-14T14:49:28-05:00weekly0.5/security-management-magazine/articles/2015/08/access-under-control/2020-01-14T14:48:28-05:00weekly0.5/security-management-magazine/articles/2015/08/iconic-security/2020-06-23T19:22:34-04:00weekly0.5/security-management-magazine/articles/2015/08/book-review-emergency-management/2020-01-14T14:45:56-05:00weekly0.5/security-management-magazine/articles/2015/08/60-years-august/2020-01-14T14:42:42-05:00weekly0.5/security-management-magazine/articles/2015/08/most-wanted-computer-bugs/2020-01-14T14:41:53-05:00weekly0.5/security-management-magazine/articles/2015/08/proper-persuasion/2024-01-16T15:28:25-05:00weekly0.5/security-management-magazine/articles/2015/08/sm-online-august-2015/2020-01-14T14:37:49-05:00weekly0.5/security-management-magazine/articles/2015/08/legal-report-resources-august-2015/2020-01-14T14:32:59-05:00weekly0.5/security-management-magazine/articles/2015/08/meeting-of-the-minds/2020-01-14T14:37:16-05:00weekly0.5/security-management-magazine/articles/2015/08/august-2015-asis-news/2020-01-14T14:36:19-05:00weekly0.5/security-management-magazine/articles/2015/08/august-2015-legal-report/2020-01-14T14:35:50-05:00weekly0.5/security-management-magazine/articles/2015/08/book-review-three-sisters-ponds/2020-01-14T14:34:59-05:00weekly0.5/security-management-magazine/articles/2015/08/book-review-port-security-management/2019-08-01T17:07:40-04:00weekly0.5/security-management-magazine/articles/2015/08/book-review-the-handbook-of-security/2019-08-01T17:07:40-04:00weekly0.5/security-management-magazine/articles/2015/08/book-review-security-risk-assessment/2019-08-01T17:07:40-04:00weekly0.5/security-management-magazine/articles/2015/07/un-nuevo-ncleo-cber/2020-01-14T16:24:10-05:00weekly0.5/security-management-magazine/articles/2015/07/regulators-encourage-chemical-facilities-use-of-safer-tech/2019-08-01T17:07:40-04:00weekly0.5/security-management-magazine/articles/2015/07/tsa-managed-inclusion-program-to-be-phased-out/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/industry-news-july-2015/2020-01-14T16:23:38-05:00weekly0.5/security-management-magazine/articles/2015/07/schools-consider-adopting-body-cameras-for-security/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/fiat-chrysler-recalls-vehicles-due-to-cybersecurity-concerns/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/60-years-the-secrets-of-security-management/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/revisiting-response/2020-01-14T16:22:19-05:00weekly0.5/security-management-magazine/articles/2015/07/safety-at-sea/2020-01-14T16:20:43-05:00weekly0.5/security-management-magazine/articles/2015/07/precheck-problems/2020-01-14T16:18:32-05:00weekly0.5/security-management-magazine/articles/2015/07/four-marines-killed-in-chattanooga-shootings/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/congress-discusses-countering-violent-extremism/2019-08-01T17:07:41-04:00weekly0.5/security-management-magazine/articles/2015/07/high-alert/2020-01-14T16:16:20-05:00weekly0.5/security-management-magazine/articles/2015/07/beyond-video-cameras-reducing-false-alarms-with-blended-technologies/2019-08-01T17:07:42-04:00weekly0.5/security-management-magazine/articles/2015/07/be-a-leader-worth-following/2020-01-16T15:29:31-05:00weekly0.5/security-management-magazine/articles/2015/07/conducir-hacia-el-desastre/2020-01-14T16:14:00-05:00weekly0.5/security-management-magazine/articles/2015/07/cfats-packs-a-punch/2020-01-14T16:13:05-05:00weekly0.5/security-management-magazine/articles/2015/07/a-new-cyber-nucleus/2020-01-14T16:11:55-05:00weekly0.5/security-management-magazine/articles/2015/07/artful-engagement/2020-01-14T16:09:06-05:00weekly0.5/security-management-magazine/articles/2015/07/washington-navy-yard-on-lockdown-after-reports-of-shooter/2019-08-01T17:07:42-04:00weekly0.5/security-management-magazine/articles/2015/07/sm-online-july-2015/2020-01-14T16:07:26-05:00weekly0.5/security-management-magazine/articles/2015/07/legal-report-resources-july-2015/2020-01-14T16:06:51-05:00weekly0.5/security-management-magazine/articles/2015/07/a-new-test/2020-01-14T16:05:53-05:00weekly0.5/security-management-magazine/articles/2015/07/asis-news-july-2015/2020-01-14T16:05:07-05:00weekly0.5/security-management-magazine/articles/2015/07/legal-report-july-2015/2020-01-14T16:04:20-05:00weekly0.5/security-management-magazine/articles/2015/07/book-review-tourism-security/2020-01-14T16:03:29-05:00weekly0.5/security-management-magazine/articles/2015/07/60-years-july/2020-01-14T16:01:52-05:00weekly0.5/security-management-magazine/articles/2015/07/privacy-enforcement/2020-01-14T16:01:12-05:00weekly0.5/security-management-magazine/articles/2015/07/an-employers-guide-to-marijuana-in-the-workplace2/2020-01-14T15:56:20-05:00weekly0.5/security-management-magazine/articles/2015/06/five-incidents-that-shaped-crisis-management/2020-05-29T14:07:10-04:00weekly0.5/security-management-magazine/articles/2015/06/airports-scrutinize-employees/2020-05-29T14:06:36-04:00weekly0.5/security-management-magazine/articles/2015/06/supreme-court-rejects-routine-hotel-registries-check/2019-08-01T17:07:43-04:00weekly0.5/security-management-magazine/articles/2015/06/change-tactics/2019-11-20T18:20:33-05:00weekly0.5/security-management-magazine/articles/2015/06/fbi-investigating-st.-louis-cardinals-for-hacking-astros/2019-08-01T17:07:44-04:00weekly0.5/security-management-magazine/articles/2015/06/driving-toward-disaster/2019-11-20T18:26:25-05:00weekly0.5/security-management-magazine/articles/2015/06/surveillance-for-security-and-beyond/2020-05-29T14:04:05-04:00weekly0.5/security-management-magazine/articles/2015/06/employers-can-fire-workers-who-use-medical-marijuana-colo.-court-rules/2019-08-01T17:07:44-04:00weekly0.5/security-management-magazine/articles/2015/06/fuga-de-informacin-mdica/2020-05-29T14:02:55-04:00weekly0.5/security-management-magazine/articles/2015/06/recruiting-the-marriage-of-two-minds/2020-05-29T14:02:10-04:00weekly0.5/security-management-magazine/articles/2015/06/june-2015-sm-online/2019-11-20T18:34:07-05:00weekly0.5/security-management-magazine/articles/2015/06/june-2015-legal-report-resources/2019-11-20T18:24:32-05:00weekly0.5/security-management-magazine/articles/2015/06/a-savvy-storage-solution/2020-05-29T14:00:37-04:00weekly0.5/security-management-magazine/articles/2015/06/constant-change/2019-11-20T16:28:47-05:00weekly0.5/security-management-magazine/articles/2015/06/the-new-kid-in-class/2020-05-29T13:59:09-04:00weekly0.5/security-management-magazine/articles/2015/06/lawyers-get-schooled-on-cyber-threats/2020-05-29T13:58:19-04:00weekly0.5/security-management-magazine/articles/2015/06/global-defense-of-the-food-supply/2020-05-29T13:57:57-04:00weekly0.5/security-management-magazine/articles/2015/06/june-2015-industry-news/2019-11-20T18:32:58-05:00weekly0.5/security-management-magazine/articles/2015/06/june-2015-asis-news/2019-11-21T14:45:39-05:00weekly0.5/security-management-magazine/articles/2015/06/june-2015-legal-report/2019-11-20T18:28:21-05:00weekly0.5/security-management-magazine/articles/2015/06/swiping-medical-data/2020-05-29T13:56:45-04:00weekly0.5/security-management-magazine/articles/2015/06/book-review-blindsided/2020-05-29T13:55:24-04:00weekly0.5/security-management-magazine/articles/2015/06/book-review-investigating-internet-crimes/2020-05-29T13:52:59-04:00weekly0.5/security-management-magazine/articles/2015/06/book-review-personal-security-a-guide-for-international-travelers/2020-05-29T13:51:37-04:00weekly0.5/security-management-magazine/articles/2015/05/los-nuevos-reclutados/2021-03-12T15:55:07-05:00weekly0.5/security-management-magazine/articles/2015/05/10-factors-to-consider-in-designing-vehicle-checkpoints/2024-01-08T10:11:26-05:00weekly0.5/security-management-magazine/articles/2015/05/insider-threats-in-the-private-sector/2022-10-04T09:13:06-04:00weekly0.5/security-management-magazine/articles/2015/05/el-arte-de-la-asimilacin/2020-05-29T14:15:05-04:00weekly0.5/security-management-magazine/articles/2015/05/building-cyber-awareness/2020-05-29T14:10:08-04:00weekly0.5/security-management-magazine/articles/2015/05/the-war-on-human-trafficking/2020-05-29T14:21:11-04:00weekly0.5/security-management-magazine/articles/2015/05/security-market-growth-continues/2020-10-01T16:14:21-04:00weekly0.5/security-management-magazine/articles/2015/05/boston-marathon-bomber-sentenced-to-death/2020-10-01T16:13:22-04:00weekly0.5/security-management-magazine/articles/2015/05/la-proteccin-ejecutiva-en-ascenso/2019-11-18T17:07:30-05:00weekly0.5/security-management-magazine/articles/2015/05/protection-gets-promoted/2020-05-29T14:28:05-04:00weekly0.5/security-management-magazine/articles/2015/05/the-power-of-physical-security/2020-05-08T14:48:19-04:00weekly0.5/security-management-magazine/articles/2015/05/nsas-bulk-collection-of-phone-data-is-illegal-federal-court-rules/2020-10-01T16:11:39-04:00weekly0.5/security-management-magazine/articles/2015/05/live-chemical-agent-training/2019-09-16T09:14:20-04:00weekly0.5/security-management-magazine/articles/2015/05/sm-online-may-2015/2019-11-18T15:50:50-05:00weekly0.5/security-management-magazine/articles/2015/05/may-2015-legal-report-resources/2019-11-18T13:46:01-05:00weekly0.5/security-management-magazine/articles/2015/05/night-watch/2020-05-29T14:29:51-04:00weekly0.5/security-management-magazine/articles/2015/05/the-art-of-assimilation/2020-06-23T19:22:34-04:00weekly0.5/security-management-magazine/articles/2015/05/new-voices/2019-11-18T15:33:28-05:00weekly0.5/security-management-magazine/articles/2015/05/safety-first/2020-05-29T14:30:49-04:00weekly0.5/security-management-magazine/articles/2015/05/industry-news-may-2015/2019-11-18T13:39:30-05:00weekly0.5/security-management-magazine/articles/2015/05/asis-news-may-2015/2019-11-17T17:46:42-05:00weekly0.5/security-management-magazine/articles/2015/05/legal-report-may-2015/2019-11-18T13:44:24-05:00weekly0.5/security-management-magazine/articles/2015/05/book-review-lukaszewski-on-crisis-communication/2020-05-29T14:32:17-04:00weekly0.5/security-management-magazine/articles/2015/05/book-review-computer-incident-response-and-forensics-team-management/2020-05-29T14:32:43-04:00weekly0.5/security-management-magazine/articles/2015/05/book-review-one-is-too-many/2020-10-01T16:09:21-04:00weekly0.5/security-management-magazine/articles/2014/11/states-with-the-most-m.r.a.p.-vehicles/2019-11-26T11:06:03-05:00weekly0.5/security-management-magazine/articles/2014/11/legal-report-resources/2020-10-01T16:34:02-04:00weekly0.5/security-management-magazine/articles/2014/11/mega-crises-understanding-the-prospects-nature-characteristics-and-the-effects-of-cataclysmic-events/2020-10-01T16:33:40-04:00weekly0.5/security-management-magazine/articles/2014/11/everyday-surveillance-vigilance-and-visibility-in-postmodern-life/2020-10-01T16:32:56-04:00weekly0.5/security-management-magazine/articles/2014/11/governance-of-security-systems-a-handbook-for-designing-and-implementing-a-security-program-that-will-protect-your-business/2020-10-01T16:32:28-04:00weekly0.5/security-management-magazine/articles/2014/11/practical-aviation-security-predicting-and-preventing-further-threats-second-edition/2019-11-26T10:56:21-05:00weekly0.5/security-management-magazine/articles/2014/11/cyber-pirates-sail-the-digital-seas/2020-10-01T16:29:21-04:00weekly0.5/security-management-magazine/articles/2014/11/leave-the-leds-on/2020-10-01T16:27:20-04:00weekly0.5/security-management-magazine/articles/2014/11/lax-lab-safety/2020-10-01T16:26:36-04:00weekly0.5/security-management-magazine/articles/2014/11/legal-report/2019-11-25T16:04:24-05:00weekly0.5/security-management-magazine/articles/2014/11/sm-online-november-2014/2019-11-26T11:00:27-05:00weekly0.5/security-management-magazine/articles/2014/11/decoding-encryption-policy/2020-10-01T16:24:23-04:00weekly0.5/security-management-magazine/articles/2014/11/assault-prevention/2020-10-01T16:22:37-04:00weekly0.5/security-management-magazine/articles/2014/11/utility-attacks/2020-10-01T16:21:19-04:00weekly0.5/security-management-magazine/articles/2014/10/upgraded-security-management-app-now-available-for-ipad-users/2019-08-01T17:09:29-04:00weekly0.5/security-management-magazine/articles/2014/10/session-coverage-from-the-60th-annual-asis-international-seminar-and-exhibits/2020-06-23T19:22:35-04:00weekly0.5/security-management-magazine/articles/2014/10/update-two-killed-in-washington-high-school-shooting/2019-08-01T17:09:29-04:00weekly0.5/security-management-magazine/articles/2014/10/washington-high-school-under-lockdown-after-shots-fired-near-cafeteria/2019-08-01T17:09:30-04:00weekly0.5/security-management-magazine/articles/2014/10/strategic-security-photo-test/2019-08-01T17:09:30-04:00weekly0.5/security-management-magazine/articles/2014/10/federal-jury-finds-blackwater-guards-guilty-in-2007-iraq-killings/2019-08-01T17:09:30-04:00weekly0.5/security-management-magazine/articles/2014/10/dhs-announces-new-restrictions-for-travelers-from-ebola-affected-region/2020-10-01T17:01:08-04:00weekly0.5/security-management-magazine/articles/2014/10/the-weather-company-relies-on-partnerships-to-issue-forecasts-worldwide/2020-10-01T16:59:09-04:00weekly0.5/security-management-magazine/articles/2014/10/ebola-and-business-continuity/2020-10-01T16:57:02-04:00weekly0.5/security-management-magazine/articles/2014/10/banning-air-travel-to-and-from-west-africa-will-not-stop-ebola-spread-cdc-official-says/2020-10-01T16:55:28-04:00weekly0.5/security-management-magazine/articles/2014/10/convergence-illicit-networks-and-national-security-in-the-age-of-globalization/2020-10-01T16:53:37-04:00weekly0.5/security-management-magazine/articles/2014/10/asis-news-supply-chain-report-and-recertification-update/2020-10-01T16:52:05-04:00weekly0.5/security-management-magazine/articles/2014/10/a-face-in-the-crowd/2020-10-01T16:51:35-04:00weekly0.5/security-management-magazine/articles/2014/10/retail-theft-inc/2020-10-01T16:50:19-04:00weekly0.5/security-management-magazine/articles/2014/10/service-denied/2020-10-01T16:48:14-04:00weekly0.5/security-management-magazine/articles/2014/10/control-your-cobras/2019-11-26T12:50:32-05:00weekly0.5/security-management-magazine/articles/2014/10/in-search-of-security-metrics/2020-02-25T16:41:08-05:00weekly0.5/security-management-magazine/articles/2014/10/industry-news-october-2014/2019-11-26T11:30:48-05:00weekly0.5/security-management-magazine/articles/2014/10/practical-handbook-for-professional-investigators-3rd-edition/2020-10-01T16:44:14-04:00weekly0.5/security-management-magazine/articles/2014/10/ferrying-the-masses/2020-10-01T16:43:51-04:00weekly0.5/security-management-magazine/articles/2014/10/an-emotional-response-plan/2020-10-01T16:43:23-04:00weekly0.5/security-management-magazine/articles/2014/10/qa-what-are-todays-biggest-malware-challenges/2020-10-01T16:42:46-04:00weekly0.5/security-management-magazine/articles/2014/10/october-2014-legal-report/2020-10-01T16:42:13-04:00weekly0.5/security-management-magazine/articles/2014/10/news--trends/2019-11-26T13:43:54-05:00weekly0.5/security-management-magazine/articles/2014/10/sm-online-october-2014/2019-12-02T12:05:27-05:00weekly0.5/security-management-magazine/articles/2014/10/legal-report-resources-october-2014/2020-10-01T16:39:10-04:00weekly0.5/security-management-magazine/articles/2014/10/supply-chain-security-a-comprehensive-approach/2020-10-01T16:38:48-04:00weekly0.5/security-management-magazine/articles/2014/10/fraud-analytics-strategies-and-methods-for-detection-and-prevention/2020-10-01T16:38:15-04:00weekly0.5/security-management-magazine/articles/2014/10/the-terrorist-criminal-nexus/2020-10-01T16:37:36-04:00weekly0.5/security-management-magazine/articles/2014/10/terrorist-threat-evolves/2020-10-01T16:37:16-04:00weekly0.5/security-management-magazine/articles/2014/10/rethinking-recovery/2020-10-01T16:36:11-04:00weekly0.5/security-management-magazine/articles/2014/10/911-commission-issues-update/2020-10-01T16:35:42-04:00weekly0.5/security-management-magazine/articles/2014/10/hackers-in-high-demand/2020-10-01T16:35:15-04:00weekly0.5/security-management-magazine/articles/2014/09/seminar-test-1/2019-08-01T17:09:32-04:00weekly0.5/security-management-magazine/articles/2014/09/security-management-covering-asis-international-seminar-and-exhibits-in-atlanta/2019-08-01T17:09:32-04:00weekly0.5/security-management-magazine/articles/2014/09/a-policy-for-guns-in-the-workplace/2020-02-25T15:28:57-05:00weekly0.5/security-management-magazine/articles/2014/09/financial-fraud-in-lithuania/2019-08-01T17:09:32-04:00weekly0.5/security-management-magazine/articles/2014/09/obama-calls-for-global-effort-to-fight-violent-extremism/2019-08-01T17:09:32-04:00weekly0.5/security-management-magazine/articles/2014/09/dhs-seeks-to-streamline-cfats-program/2019-08-01T17:09:33-04:00weekly0.5/security-management-magazine/articles/2014/09/panel-isis-poses-no-direct-threat-to-the-united-states/2019-08-01T17:09:33-04:00weekly0.5/security-management-magazine/articles/2014/09/expert-warns-cso-roundtable-about-growing-instability-in-libya/2019-08-01T17:09:33-04:00weekly0.5/security-management-magazine/articles/2014/09/let-intelligence-light-the-way/2019-12-03T12:16:18-05:00weekly0.5/security-management-magazine/articles/2014/09/heating-up-the-perimeter/2019-12-03T11:37:19-05:00weekly0.5/security-management-magazine/articles/2014/09/the-intelligence-triangle/2019-12-03T14:21:53-05:00weekly0.5/security-management-magazine/articles/2014/09/see-clearly/2019-12-03T12:39:15-05:00weekly0.5/security-management-magazine/articles/2014/09/wagering-on-preparation/2019-12-03T14:29:59-05:00weekly0.5/security-management-magazine/articles/2014/09/in-plain-sight/2019-12-03T12:01:00-05:00weekly0.5/security-management-magazine/articles/2014/09/industry-news-september-2014/2019-12-03T14:43:34-05:00weekly0.5/security-management-magazine/articles/2014/09/a-safer-frontier/2019-12-03T11:10:30-05:00weekly0.5/security-management-magazine/articles/2014/09/september-2014-legal-report/2019-12-03T12:03:41-05:00weekly0.5/security-management-magazine/articles/2014/09/atlanta-partners-in-protection/2019-12-03T11:16:13-05:00weekly0.5/security-management-magazine/articles/2014/09/college-campus-meets-urban-landscape/2019-12-03T11:21:59-05:00weekly0.5/security-management-magazine/articles/2014/09/regulatory-sea-change/2019-12-03T12:31:28-05:00weekly0.5/security-management-magazine/articles/2014/09/the-top-five-solutions-to-prevent-violence-in-schools/2019-12-03T11:01:23-05:00weekly0.5/security-management-magazine/articles/2014/09/disaster-recovery/2019-12-03T11:32:37-05:00weekly0.5/security-management-magazine/articles/2014/09/supply-chain-risk-management-standard-released/2019-12-03T14:12:16-05:00weekly0.5/security-management-magazine/articles/2014/09/sm-online-september-2014/2019-12-03T14:08:28-05:00weekly0.5/security-management-magazine/articles/2014/09/september-2014-legal-report-resources/2019-12-03T12:08:49-05:00weekly0.5/security-management-magazine/articles/2014/09/crime-blocking/2019-12-03T11:26:51-05:00weekly0.5/security-management-magazine/articles/2014/09/mobilizing-patient-care/2019-12-03T12:25:44-05:00weekly0.5/security-management-magazine/articles/2014/08/breaking-fort-lee-on-lockdown-after-active-shooter-reported/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/update-officials-issue-all-clear-at-fort-lee-lift-lockdown/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/nist-requests-feedback-on-first-version-of-cybersecurity-framework/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/u.s.-ebola-patients-discharged-present-no-public-health-threat/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/dhs-seeks-input-on-cfats-program/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/fincen-releases-culture-of-compliance-guidance-for-financial-institution-leaders/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/national-protection-framework-released/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/reviewing-lessons-on-school-safety/2019-08-01T17:09:35-04:00weekly0.5/security-management-magazine/articles/2014/08/security-becoming-less-of-a-luxury/2019-08-29T16:07:08-04:00weekly0.5/security-management-magazine/articles/2014/08/industry-insights-in-atlanta/2019-12-04T13:54:15-05:00weekly0.5/security-management-magazine/articles/2014/08/bold-visions/2019-08-01T17:09:36-04:00weekly0.5/security-management-magazine/articles/2014/08/legal-report-resources/2019-08-01T17:09:36-04:00weekly0.5/security-management-magazine/articles/2014/08/industry-news-august-2014/2019-12-03T14:55:55-05:00weekly0.5/security-management-magazine/articles/2014/08/asis-news-wharton-course-begins-and-asis-launches-mentoring-program/2019-12-03T15:00:15-05:00weekly0.5/security-management-magazine/articles/2014/08/assessing-the-academy/2019-12-03T15:06:25-05:00weekly0.5/security-management-magazine/articles/2014/08/european-security-in-natos-shadow-party-ideologies-and-institution-building/2019-12-04T11:26:01-05:00weekly0.5/security-management-magazine/articles/2014/08/verizons-2014-data-breach-investigations-report/2019-12-04T11:12:28-05:00weekly0.5/security-management-magazine/articles/2014/08/data-breach-victims/2019-12-04T11:22:13-05:00weekly0.5/security-management-magazine/articles/2014/08/bold-visions2/2019-12-03T15:22:03-05:00weekly0.5/security-management-magazine/articles/2014/08/data-break-jigsaw/2019-12-04T11:18:50-05:00weekly0.5/security-management-magazine/articles/2014/08/security-becoming-less-of-a-luxury2/2019-12-04T12:32:19-05:00weekly0.5/security-management-magazine/articles/2014/08/reviewing-lessons-on-school-security/2019-12-04T12:25:57-05:00weekly0.5/security-management-magazine/articles/2014/08/industry-insights-in-atlanta2/2019-12-04T11:47:07-05:00weekly0.5/security-management-magazine/articles/2014/08/legal-report-resources2/2019-12-04T12:13:17-05:00weekly0.5/security-management-magazine/articles/2014/08/beyond-competitive-intelligence-the-practice-of-counterintelligence-and-trade-secrets-protection/2019-08-01T17:09:37-04:00weekly0.5/security-management-magazine/articles/2014/08/dangerous-waters/2019-12-04T11:09:14-05:00weekly0.5/security-management-magazine/articles/2014/08/global-leadership-storage/2019-12-04T11:33:48-05:00weekly0.5/security-management-magazine/articles/2014/08/in-the-clear/2019-12-04T11:52:06-05:00weekly0.5/security-management-magazine/articles/2014/08/criminals-cast-a-wider-net/2019-12-04T11:03:58-05:00weekly0.5/security-management-magazine/articles/2014/08/legal-report-august-2014/2019-12-04T12:10:02-05:00weekly0.5/security-management-magazine/articles/2014/07/cia-admits-to-breaching-senate-intelligence-committee-computers/2019-08-01T17:09:37-04:00weekly0.5/security-management-magazine/articles/2014/07/nsas-actions-threaten-u.s.-economy-and-internet-security-new-report-suggests/2019-08-01T17:09:37-04:00weekly0.5/security-management-magazine/articles/2014/07/reflections-on-9-11-commission-report-address-evolving-threats/2019-08-01T17:09:37-04:00weekly0.5/security-management-magazine/articles/2014/07/hackers-breach-european-central-bank-database/2019-08-01T17:09:37-04:00weekly0.5/security-management-magazine/articles/2014/07/u.s.-says-missile-that-brought-down-malaysian-flight-was-launched-from-separatist-controlled-territory/2019-08-01T17:09:38-04:00weekly0.5/security-management-magazine/articles/2014/07/malaysia-airlines-flight-crashes-in-ukraine-near-russian-border/2019-08-01T17:09:38-04:00weekly0.5/security-management-magazine/articles/2014/07/eeoc-updates-enforcement-guidance-on-pregnancy-discrimination/2019-08-01T17:09:38-04:00weekly0.5/security-management-magazine/articles/2014/07/oversight-board-finds-section-702-program-constitutional/2019-08-01T17:09:38-04:00weekly0.5/security-management-magazine/articles/2014/07/take-down-inside-the-hunt-for-al-qaeda/2019-12-06T13:26:18-05:00weekly0.5/security-management-magazine/articles/2014/07/cyber-crime-security-and-digital-intelligence/2019-12-05T14:09:07-05:00weekly0.5/security-management-magazine/articles/2014/07/handbook-of-scadacontrol-systems-security/2020-11-25T16:45:05-05:00weekly0.5/security-management-magazine/articles/2014/07/crime-prevention-through-environmental-design-third-edition/2019-12-05T14:05:39-05:00weekly0.5/security-management-magazine/articles/2014/07/industrial-espionage-developing-a-counterespionage-program/2019-12-06T12:55:06-05:00weekly0.5/security-management-magazine/articles/2014/07/crime-lab-manual/2019-12-05T13:58:33-05:00weekly0.5/security-management-magazine/articles/2014/07/a-new-point-of-view/2019-12-05T13:07:20-05:00weekly0.5/security-management-magazine/articles/2014/07/a-healthy-solution/2019-08-01T17:09:38-04:00weekly0.5/security-management-magazine/articles/2014/07/windows-xp-goes-dark/2019-08-01T17:09:39-04:00weekly0.5/security-management-magazine/articles/2014/07/embrace-uncertainty/2019-08-01T17:09:39-04:00weekly0.5/security-management-magazine/articles/2014/07/asis-news-dhs-agreement-and-standards-translated/2019-12-05T13:44:46-05:00weekly0.5/security-management-magazine/articles/2014/07/industry-news-july-2014/2019-12-06T13:51:31-05:00weekly0.5/security-management-magazine/articles/2014/07/legal-report-resources/2019-12-06T13:05:13-05:00weekly0.5/security-management-magazine/articles/2014/07/liability-for-data-breaches/2019-12-06T13:09:13-05:00weekly0.5/security-management-magazine/articles/2014/07/cybersecurity-2014-security-threat-report/2019-12-05T14:52:34-05:00weekly0.5/security-management-magazine/articles/2014/07/a-plan-to-stem-extremism/2019-12-05T13:32:54-05:00weekly0.5/security-management-magazine/articles/2014/07/blended-training-for-six-sigma/2019-08-01T17:09:39-04:00weekly0.5/security-management-magazine/articles/2014/07/uncovering-smart-solutions/2019-12-06T13:43:30-05:00weekly0.5/security-management-magazine/articles/2014/07/access-controls-future-is-now/2019-12-05T12:46:47-05:00weekly0.5/security-management-magazine/articles/2014/07/healthcare-privacy/2019-08-01T17:09:40-04:00weekly0.5/security-management-magazine/articles/2014/07/the-trends-on-top3/2020-10-05T13:42:35-04:00weekly0.5/security-management-magazine/articles/2014/07/access-controls-future-is-now2/2019-08-01T17:09:40-04:00weekly0.5/security-management-magazine/articles/2014/07/uncovering-smart-solutions2/2019-08-01T17:09:40-04:00weekly0.5/security-management-magazine/articles/2014/07/blended-training-for-six-sigma2/2019-12-05T13:54:42-05:00weekly0.5/security-management-magazine/articles/2014/07/embrace-uncertainty2/2019-12-05T15:02:00-05:00weekly0.5/security-management-magazine/articles/2014/07/windows-xp-goes-dark2/2019-12-06T13:48:22-05:00weekly0.5/security-management-magazine/articles/2014/07/a-healthy-solution2/2019-12-05T12:51:27-05:00weekly0.5/security-management-magazine/articles/2014/07/a-new-point-of-view2/2019-12-05T13:39:49-05:00weekly0.5/security-management-magazine/articles/2014/07/privacy-regulation-in-australia/2019-12-06T13:16:29-05:00weekly0.5/security-management-magazine/articles/2014/07/aviation-lessons-learned/2019-12-05T13:49:18-05:00weekly0.5/security-management-magazine/articles/2014/07/protecting-food-imports/2019-12-06T13:21:28-05:00weekly0.5/security-management-magazine/articles/2014/07/taking-on-extremism/2019-12-06T13:33:12-05:00weekly0.5/security-management-magazine/articles/2014/07/a-mass-transit-transformation/2019-12-05T13:01:24-05:00weekly0.5/security-management-magazine/articles/2014/07/legal-report-july-2014/2019-12-06T13:00:17-05:00weekly0.5/security-management-magazine/articles/2014/06/u.s.-supreme-court-rejects-birth-control-mandates-for-closely-held-corporations/2019-08-01T17:10:54-04:00weekly0.5/security-management-magazine/articles/2014/06/congress-questions-dhs-on-minors-illegally-crossing-mexican-border-into-u.s/2019-08-01T17:10:54-04:00weekly0.5/security-management-magazine/articles/2014/06/u.s.-supreme-court-shields-cell-phones-from-warrantless-searches/2019-08-01T17:10:54-04:00weekly0.5/security-management-magazine/articles/2014/06/dhs-secretary-faces-scrutiny-on-surge-of-children-crossing-the-border-alone/2019-08-01T17:10:54-04:00weekly0.5/security-management-magazine/articles/2014/06/first-responders-share-lessons-learned-from-terrorist-attacks/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/court-rules-tracking-americans-cell-phone-locations-without-warrants-violates-privacy-rights/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/updated-student-confirmed-dead-in-oregon-school-shooting/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/federal-working-group-releases-chemical-safety-update/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/gunman-killed-by-law-enforcement-in-attempted-georgia-courthouse-takeover/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/security-management-now-on-youtube/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/student-building-monitor-stops-campus-shooter/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/cbp-releases-revised-use-of-force-policy-handbook/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/doj-announces-disruption-of-sophisticated-botnet/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/cbp-releases-revised-use-of-force-policy-handbook2/2019-08-01T17:10:55-04:00weekly0.5/security-management-magazine/articles/2014/06/improving-nuclear-security/2019-12-08T18:43:58-05:00weekly0.5/security-management-magazine/articles/2014/06/the-new-digital-age-reshaping-the-future-of-people-nations-and-business/2019-12-08T18:24:56-05:00weekly0.5/security-management-magazine/articles/2014/06/foundations-of-psychological-profiling-terrorism-espionage-and-deception/2019-12-08T17:43:39-05:00weekly0.5/security-management-magazine/articles/2014/06/eavesdropping-surveillance--espionage-threats-techniques--counter-measures/2019-12-08T17:23:27-05:00weekly0.5/security-management-magazine/articles/2014/06/countering-fraud/2019-12-06T17:22:04-05:00weekly0.5/security-management-magazine/articles/2014/06/bridging-a-security-gap/2019-12-06T16:57:54-05:00weekly0.5/security-management-magazine/articles/2014/06/cyber-experts-talk-trends/2019-12-06T17:32:22-05:00weekly0.5/security-management-magazine/articles/2014/06/stake-your-claim/2019-12-08T18:53:06-05:00weekly0.5/security-management-magazine/articles/2014/06/asis-news-studies-on-metrics-and-the-size-of-the-security-industry/2019-12-06T16:35:54-05:00weekly0.5/security-management-magazine/articles/2014/06/industry-news-june-2014/2019-12-08T17:55:11-05:00weekly0.5/security-management-magazine/articles/2014/06/legal-report-resources/2019-12-08T18:04:24-05:00weekly0.5/security-management-magazine/articles/2014/06/cpted-books/2019-12-06T17:25:01-05:00weekly0.5/security-management-magazine/articles/2014/06/parody-merchandise/2019-12-08T18:47:45-05:00weekly0.5/security-management-magazine/articles/2014/06/gun-rights/2019-12-08T17:51:10-05:00weekly0.5/security-management-magazine/articles/2014/06/court-case-immigration-status-does-not-affect-workers-comp/2019-12-08T17:26:46-05:00weekly0.5/security-management-magazine/articles/2014/06/the-business-of-travel-safety/2019-12-06T17:17:43-05:00weekly0.5/security-management-magazine/articles/2014/06/make-your-case/2020-02-26T10:45:20-05:00weekly0.5/security-management-magazine/articles/2014/06/business-case/2019-12-06T17:11:06-05:00weekly0.5/security-management-magazine/articles/2014/06/drone-use/2019-12-08T17:18:54-05:00weekly0.5/security-management-magazine/articles/2014/06/license-to-steal/2019-12-08T18:12:13-05:00weekly0.5/security-management-magazine/articles/2014/06/trade-secret-theft/2019-12-08T19:03:05-05:00weekly0.5/security-management-magazine/articles/2014/06/nation-state-hacking-and-the-power-of-espionage/2019-12-08T17:29:28-05:00weekly0.5/security-management-magazine/articles/2014/06/global-cyber-risk/2019-12-08T17:48:16-05:00weekly0.5/security-management-magazine/articles/2014/06/nsa-surveillance/2019-12-08T18:41:02-05:00weekly0.5/security-management-magazine/articles/2014/06/eu-corruption-and-its-costs/2019-12-08T17:33:04-05:00weekly0.5/security-management-magazine/articles/2014/06/behind-the-numbers-data-protection-in-healthcare/2019-12-06T16:48:15-05:00weekly0.5/security-management-magazine/articles/2014/06/european-style-corruption/2019-12-08T17:39:00-05:00weekly0.5/security-management-magazine/articles/2014/06/whistleblowing-debate/2020-05-08T14:50:02-04:00weekly0.5/security-management-magazine/articles/2014/06/averting-meltdown/2019-12-06T16:42:15-05:00weekly0.5/security-management-magazine/articles/2014/06/supply-chain-resources/2020-09-17T12:45:42-04:00weekly0.5/security-management-magazine/articles/2014/06/legal-report-june-2014/2019-12-08T18:01:27-05:00weekly0.5/security-management-magazine/articles/2014/05/asis-foundation-and-military-liaison-council-to-award-full-certification-scholarships/2020-12-11T15:27:19-05:00weekly0.5/security-management-magazine/articles/2014/05/united-states-charges-china-in-first-criminal-cyber-espionage-case/2020-12-11T15:42:54-05:00weekly0.5/security-management-magazine/articles/2014/05/emergency-planning-guide-for-utilities/2019-12-10T13:28:56-05:00weekly0.5/security-management-magazine/articles/2014/05/seeking-faster-footage/2019-12-11T10:11:18-05:00weekly0.5/security-management-magazine/articles/2014/05/one-campus-many-devices/2019-12-11T09:45:04-05:00weekly0.5/security-management-magazine/articles/2014/05/bright-ideas/2019-12-10T11:33:00-05:00weekly0.5/security-management-magazine/articles/2014/05/asis-news-middle-east-conference-and-ie-business-school/2019-12-10T11:29:48-05:00weekly0.5/security-management-magazine/articles/2014/05/industry-news-may-2014/2019-12-11T09:28:01-05:00weekly0.5/security-management-magazine/articles/2014/05/21st-century-security-and-cpted-designing-for-critical-infrastructure-protection-and-crime-prevention-second-edition/2020-11-25T16:16:47-05:00weekly0.5/security-management-magazine/articles/2014/05/wildfire-prevention-plans/2019-12-11T10:24:44-05:00weekly0.5/security-management-magazine/articles/2014/05/wildlife-fire-prevention-and-mitigation/2019-12-11T09:22:36-05:00weekly0.5/security-management-magazine/articles/2014/05/911-calls-scrutinized/2019-08-01T17:10:59-04:00weekly0.5/security-management-magazine/articles/2014/05/enabling-comprehensive-situational-awareness/2019-12-10T13:35:37-05:00weekly0.5/security-management-magazine/articles/2014/05/court-case-concealed-carry/2019-12-10T11:38:05-05:00weekly0.5/security-management-magazine/articles/2014/05/court-case-ada-violation/2019-12-10T13:25:03-05:00weekly0.5/security-management-magazine/articles/2014/05/court-case-state-gun-control-laws/2019-12-11T09:25:13-05:00weekly0.5/security-management-magazine/articles/2014/05/court-case-data-brokers/2019-12-10T13:22:35-05:00weekly0.5/security-management-magazine/articles/2014/05/security-and-loss-prevention-an-introduction-sixth-edition/2019-12-11T09:57:55-05:00weekly0.5/security-management-magazine/articles/2014/05/rogue-online-pharmacies/2019-12-11T09:49:56-05:00weekly0.5/security-management-magazine/articles/2014/05/dhs-issues-updated-infrastructure-protection-plan/2019-12-11T09:30:46-05:00weekly0.5/security-management-magazine/articles/2014/05/organizational-resilience-managing-the-risks-of-disruptive-events-a-practitioners-guide/2019-12-11T09:54:15-05:00weekly0.5/security-management-magazine/articles/2014/05/seeing-opportunity-through-risk/2019-12-11T10:03:30-05:00weekly0.5/security-management-magazine/articles/2014/05/succession-management-a-structured-approach/2019-12-11T10:18:51-05:00weekly0.5/security-management-magazine/articles/2014/05/debating-domestic-drones/2019-12-10T11:16:03-05:00weekly0.5/security-management-magazine/articles/2014/05/cybercrime-hindering-world-economy/2020-06-23T19:22:36-04:00weekly0.5/security-management-magazine/articles/2014/05/nipp-and-tuck/2019-12-11T09:40:55-05:00weekly0.5/security-management-magazine/articles/2014/05/smart-card-solutions/2019-12-11T10:15:35-05:00weekly0.5/security-management-magazine/articles/2014/05/legal-report-may-2014/2019-12-11T09:36:17-05:00weekly0.5/security-management-magazine/articles/2014/04/social-media-explodes-as-twitter-users-issue-bomb-threats/2020-12-11T15:45:50-05:00weekly0.5/security-management-magazine/articles/2014/04/a-campus-response-to-crisis/2020-12-11T15:50:14-05:00weekly0.5/security-management-magazine/articles/2014/04/scoring-one-for-security/2019-12-11T16:24:04-05:00weekly0.5/security-management-magazine/articles/2014/04/target-breach-offers-protection-lessons/2019-12-11T16:49:12-05:00weekly0.5/security-management-magazine/articles/2014/04/speaking-security/2019-12-11T16:37:25-05:00weekly0.5/security-management-magazine/articles/2014/04/isc-west-product-showcase-2014/2019-12-11T15:42:10-05:00weekly0.5/security-management-magazine/articles/2014/04/making-the-most-of-mentoring/2019-12-11T16:13:10-05:00weekly0.5/security-management-magazine/articles/2014/04/educational-opportunity-security-force-management/2019-08-01T17:11:01-04:00weekly0.5/security-management-magazine/articles/2014/04/emergency-evacuation-planning-for-your-workplace/2019-12-11T15:30:38-05:00weekly0.5/security-management-magazine/articles/2014/04/israeli-security-concepts/2019-12-11T15:50:46-05:00weekly0.5/security-management-magazine/articles/2014/04/security-by-design-in-abu-dhabi/2020-11-12T17:55:06-05:00weekly0.5/security-management-magazine/articles/2014/04/court-case-pregnancy-discrimination/2019-12-11T16:17:26-05:00weekly0.5/security-management-magazine/articles/2014/04/data-protection-isaca-examines-online-behavior/2019-12-11T15:20:17-05:00weekly0.5/security-management-magazine/articles/2014/04/cruise-line-security/2019-12-11T15:14:43-05:00weekly0.5/security-management-magazine/articles/2014/04/america-the-vulnerable-inside-the-new-threat-matrix-of-digital-espionage-crime-and-warfare/2019-08-01T17:11:02-04:00weekly0.5/security-management-magazine/articles/2014/04/states-push-back-against-real-id/2019-12-11T16:44:46-05:00weekly0.5/security-management-magazine/articles/2014/04/checking-airport-screening/2019-12-11T14:59:34-05:00weekly0.5/security-management-magazine/articles/2014/04/best-practices-for-electronic-data-destruction/2019-12-11T14:54:06-05:00weekly0.5/security-management-magazine/articles/2014/04/a-campus-response-to-crisis2/2019-12-11T14:45:35-05:00weekly0.5/security-management-magazine/articles/2014/04/legal-report-april-2014/2019-12-11T16:06:15-05:00weekly0.5/security-management-magazine/articles/2014/04/industry-news-april-2014/2019-12-11T15:37:22-05:00weekly0.5/security-management-magazine/articles/2014/03/the-perks-of-ip-video/2019-12-12T14:10:03-05:00weekly0.5/security-management-magazine/articles/2014/03/nist-releases-cybersecurity-framework/2019-12-12T14:01:09-05:00weekly0.5/security-management-magazine/articles/2014/03/prepare-for-liftoff/2019-12-12T14:57:28-05:00weekly0.5/security-management-magazine/articles/2014/03/the-top-five-executive-protection-challenges/2019-12-12T15:16:16-05:00weekly0.5/security-management-magazine/articles/2014/03/hackers-turn-to-cargo-crime/2019-12-12T11:49:52-05:00weekly0.5/security-management-magazine/articles/2014/03/shedding-light-on-sandy-hook/2019-12-12T15:09:25-05:00weekly0.5/security-management-magazine/articles/2014/03/antiterrorism-and-threat-response-planning-and-implementation/2019-12-12T11:06:34-05:00weekly0.5/security-management-magazine/articles/2014/03/the-complete-guide-to-physical-security/2020-02-26T10:34:07-05:00weekly0.5/security-management-magazine/articles/2014/03/effective-physical-security-fourth-edition/2019-12-12T11:42:50-05:00weekly0.5/security-management-magazine/articles/2014/03/updated-national-infrastructure-protection-plan-released/2020-11-25T16:53:27-05:00weekly0.5/security-management-magazine/articles/2014/03/chemical-facilities-tackle-an-explosive-problem/2019-12-12T11:14:06-05:00weekly0.5/security-management-magazine/articles/2014/03/chemical-plant-security/2019-12-12T11:17:19-05:00weekly0.5/security-management-magazine/articles/2014/03/when-are-security-clearances-necessary/2019-12-12T15:04:12-05:00weekly0.5/security-management-magazine/articles/2014/03/donations-and-grants-for-safer-schools/2019-12-12T15:00:18-05:00weekly0.5/security-management-magazine/articles/2014/03/active-shooter-response-training-manual/2019-12-12T10:59:16-05:00weekly0.5/security-management-magazine/articles/2014/03/dynamically-securing-cultural-heritage/2020-11-12T16:59:49-05:00weekly0.5/security-management-magazine/articles/2014/03/who-really-needs-a-security-clearance/2019-12-12T15:23:15-05:00weekly0.5/security-management-magazine/articles/2014/03/practical-protection-plans/2019-12-12T14:50:53-05:00weekly0.5/security-management-magazine/articles/2014/03/line-up-a-screening-strategy/2019-12-12T12:18:20-05:00weekly0.5/security-management-magazine/articles/2014/03/legal-report-march-2014/2019-12-12T12:08:16-05:00weekly0.5/security-management-magazine/articles/2014/03/industry-news-march-2014/2019-12-12T11:55:27-05:00weekly0.5/security-management-magazine/articles/2014/02/dhs-secretary-makes-first-appearance-before-house-homeland-security-committee/2019-09-27T15:08:16-04:00weekly0.5/security-management-magazine/articles/2014/02/who-really-needs-a-security-clearance/2019-09-27T15:07:57-04:00weekly0.5/security-management-magazine/articles/2014/02/rsa-executive-chairman-addresses-nsa-allegations-at-cyber-conference/2019-09-27T15:07:37-04:00weekly0.5/security-management-magazine/articles/2014/02/privacy-and-civil-liberties-board-chair-discusses-reform/2019-09-27T15:07:17-04:00weekly0.5/security-management-magazine/articles/2014/02/dhs-secretary-outlines-priorities-for-2014/2019-09-27T15:06:57-04:00weekly0.5/security-management-magazine/articles/2014/02/house-judiciary-committee-probes-legality-of-nsa-program/2019-09-27T15:06:34-04:00weekly0.5/security-management-magazine/articles/2014/02/terrorism-and-homeland-security-eighth-edition/2019-12-13T15:04:23-05:00weekly0.5/security-management-magazine/articles/2014/02/case-study-exempla-healthcare-deploys-panic-buttons/2019-12-13T13:57:34-05:00weekly0.5/security-management-magazine/articles/2014/02/network-intrusion-solutions/2019-12-13T14:29:04-05:00weekly0.5/security-management-magazine/articles/2014/02/a-last-look-and-a-leap-forward/2019-12-13T10:27:08-05:00weekly0.5/security-management-magazine/articles/2014/02/officers-at-federal-facilities-lack-training/2019-12-13T14:39:10-05:00weekly0.5/security-management-magazine/articles/2014/02/explosives-detection-standards/2019-12-13T14:04:10-05:00weekly0.5/security-management-magazine/articles/2014/02/building-an-ethical-culture/2019-12-13T13:45:51-05:00weekly0.5/security-management-magazine/articles/2014/02/are-evacuation-practices-flawed/2019-12-13T10:55:51-05:00weekly0.5/security-management-magazine/articles/2014/02/professional-security-officer-series/2019-12-13T14:51:23-05:00weekly0.5/security-management-magazine/articles/2014/02/white-collar-crime-accounts-of-offending-behaviour/2019-12-13T15:17:44-05:00weekly0.5/security-management-magazine/articles/2014/02/pharmaceutical-anti-counterfeiting-combating-the-real-danger-from-fake-drugs/2020-10-09T11:24:08-04:00weekly0.5/security-management-magazine/articles/2014/02/a-manual-of-private-investigation-techniques/2019-09-27T14:34:21-04:00weekly0.5/security-management-magazine/articles/2014/02/asset-tracking-trends/2019-12-13T11:02:10-05:00weekly0.5/security-management-magazine/articles/2014/02/introduction-to-surveillance-studies/2019-12-13T14:17:11-05:00weekly0.5/security-management-magazine/articles/2014/02/report-federal-responses-to-data-breaches/2019-12-13T14:00:36-05:00weekly0.5/security-management-magazine/articles/2014/02/canine-evidence/2019-12-13T13:48:23-05:00weekly0.5/security-management-magazine/articles/2014/02/security-science-the-theory-and-practice-of-security/2020-02-25T16:04:28-05:00weekly0.5/security-management-magazine/articles/2014/02/an-app-approach-to-emergency-communications/2019-12-13T10:45:15-05:00weekly0.5/security-management-magazine/articles/2014/02/reliably-detecting-explosives/2019-09-27T14:31:11-04:00weekly0.5/security-management-magazine/articles/2014/02/officers-at-federal-facilities-lack-training2/2019-09-27T14:30:57-04:00weekly0.5/security-management-magazine/articles/2014/02/duress-buttons-keep-panic-at-bay/2019-09-27T14:30:38-04:00weekly0.5/security-management-magazine/articles/2014/02/banking-on-a-security-upgrade/2019-12-13T11:09:29-05:00weekly0.5/security-management-magazine/articles/2014/02/times-up-the-visa-overstay-dilemma/2019-12-13T15:14:02-05:00weekly0.5/security-management-magazine/articles/2014/02/legal-report-february-2014/2019-12-13T14:21:55-05:00weekly0.5/security-management-magazine/articles/2014/02/industry-news-february-2014/2019-12-13T14:09:32-05:00weekly0.5/security-management-magazine/articles/2014/02/building-an-ethical-culture2/2019-09-27T14:29:32-04:00weekly0.5/security-management-magazine/articles/2014/01/border-security/2019-09-27T14:23:41-04:00weekly0.5/security-management-magazine/articles/2014/01/white-powder-found-near-metlife-stadium-tests-positive-as-cornstarch/2019-09-27T14:23:28-04:00weekly0.5/security-management-magazine/articles/2014/01/intelligence-leaders-identify-top-threats-facing-u.s.-in-annual-assessment/2020-06-23T19:22:36-04:00weekly0.5/security-management-magazine/articles/2014/01/obama-announces-plan-to-change-nsa-metadata-program/2019-09-27T14:23:00-04:00weekly0.5/security-management-magazine/articles/2014/01/federal-prosecutors-open-investigation-into-west-virginia-chemical-spill/2019-09-27T14:22:35-04:00weekly0.5/security-management-magazine/articles/2014/01/dhs-inspector-general-nominee-testifies-before-senate-committee/2019-09-27T14:22:21-04:00weekly0.5/security-management-magazine/articles/2014/01/cybersecurity-money-laundering-are-top-threats-facing-the-financial-industry-in-2014/2019-09-27T14:22:08-04:00weekly0.5/security-management-magazine/articles/2014/01/micromanaging-terror/2019-12-15T21:49:05-05:00weekly0.5/security-management-magazine/articles/2014/01/behind-the-numbers-analyzing-malware/2019-09-27T14:21:43-04:00weekly0.5/security-management-magazine/articles/2014/01/reputation-protection/2019-12-15T22:05:33-05:00weekly0.5/security-management-magazine/articles/2014/01/new-players-new-uniforms-same-success/2019-12-15T21:52:56-05:00weekly0.5/security-management-magazine/articles/2014/01/threat-trends-and-possible-strategies/2019-12-15T22:25:48-05:00weekly0.5/security-management-magazine/articles/2014/01/introduction-to-transportation-security/2019-12-15T21:25:16-05:00weekly0.5/security-management-magazine/articles/2014/01/crime-prevention-approaches-practices-and-evaluations-eighth-edition/2019-12-15T20:56:38-05:00weekly0.5/security-management-magazine/articles/2014/01/medical-identity-theft/2019-12-15T21:41:43-05:00weekly0.5/security-management-magazine/articles/2014/01/introduction-to-intelligence-studies/2019-12-15T21:19:27-05:00weekly0.5/security-management-magazine/articles/2014/01/sarbanes-oxley-act-and-whistleblowers/2019-09-27T14:19:07-04:00weekly0.5/security-management-magazine/articles/2014/01/catastrophic-impact-and-loss-the-capstone-of-impact-assessment/2019-09-27T14:16:43-04:00weekly0.5/security-management-magazine/articles/2014/01/the-comprehensive-handbook-of-school-safety/2019-12-15T20:45:39-05:00weekly0.5/security-management-magazine/articles/2014/01/ready-to-respond/2019-12-15T22:00:10-05:00weekly0.5/security-management-magazine/articles/2014/01/introduction-to-computer-networks-and-cybersecurity/2019-12-15T21:14:33-05:00weekly0.5/security-management-magazine/articles/2014/01/history-in-blue-160-years-of-women-police-sheriffs-detectives-and-state-troopers/2019-12-15T20:59:41-05:00weekly0.5/security-management-magazine/articles/2014/01/the-successful-security-leader-strategies-for-success/2019-12-15T22:14:31-05:00weekly0.5/security-management-magazine/articles/2014/01/corporate-security-in-the-asia-pacific-region-crisis-crime-fraud-and-misconduct/2019-12-15T20:51:04-05:00weekly0.5/security-management-magazine/articles/2014/01/homeland-security-an-introduction-to-principles-and-practice-second-edition/2020-06-23T19:22:37-04:00weekly0.5/security-management-magazine/articles/2014/01/virtual-money-real-crime/2019-12-15T22:38:10-05:00weekly0.5/security-management-magazine/articles/2014/01/security-on-the-edge/2019-12-15T22:10:14-05:00weekly0.5/security-management-magazine/articles/2014/01/triage-and-tribulations/2019-12-15T22:32:17-05:00weekly0.5/security-management-magazine/articles/2014/01/the-prodigal-president/2019-12-15T22:19:11-05:00weekly0.5/security-management-magazine/articles/2014/01/legal-report-january-2014/2019-12-15T21:38:20-05:00weekly0.5/security-management-magazine/articles/2014/01/industry-news-january-2014/2019-12-15T21:08:44-05:00weekly0.5/security-management-magazine/articles/2014/01/it-takes-a-team/2019-12-15T21:34:04-05:00weekly0.5/security-management-magazine/articles/2013/12/dhs-releases-2013-national-infrastructure-protection-plan/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/seeking-photos-for-security-management/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/fighting-counterfeiters-during-the-holiday-season/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/federal-prison-system-cybersecurity-pose-top-challenges-for-justice-department/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/federal-prison-system-cybersecurity-pose-top-challenges-for-justice-department2/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/johnson-confirmed-to-head-the-department-of-homeland-security/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/federal-prison-system-top-challenge-for-department-of-justice/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/johnson-confirmed-to-head-the-department-of-homeland-security2/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/dot-proposes-mandatory-black-boxes-for-passenger-vehicles/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/using-economics-to-fight-terrorists/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/planning-for-evacuations/2019-08-01T17:15:55-04:00weekly0.5/security-management-magazine/articles/2013/12/among-enemies-counter-espionage-for-the-business-traveler/2019-12-15T16:42:41-05:00weekly0.5/security-management-magazine/articles/2013/12/threat-reporting-made-easy/2019-12-17T20:02:31-05:00weekly0.5/security-management-magazine/articles/2013/12/the-hive-mind-and-universal-consciousness/2019-12-17T17:23:10-05:00weekly0.5/security-management-magazine/articles/2013/12/one-labs-mission-resilience-research/2019-12-17T19:23:59-05:00weekly0.5/security-management-magazine/articles/2013/12/terrorisms-new-paradigm-in-west-africa/2019-12-17T19:49:44-05:00weekly0.5/security-management-magazine/articles/2013/12/information-security-governance-simplified-from-the-boardroom-to-the-keyboard/2019-12-19T16:54:28-05:00weekly0.5/security-management-magazine/articles/2013/12/cargo-crime-security-theft-and-prevention/2019-12-19T16:41:48-05:00weekly0.5/security-management-magazine/articles/2013/12/ending-campus-violence-new-approaches-to-prevention/2019-12-19T16:43:40-05:00weekly0.5/security-management-magazine/articles/2013/12/nuclear-facility-security/2019-12-19T17:11:00-05:00weekly0.5/security-management-magazine/articles/2013/12/nsa-surveillance/2019-12-19T17:01:39-05:00weekly0.5/security-management-magazine/articles/2013/12/american-police-a-history-1945-2012/2019-12-19T16:32:21-05:00weekly0.5/security-management-magazine/articles/2013/12/border-patrol-agent-may-not-answer-a-suspects-phone/2019-12-19T16:38:41-05:00weekly0.5/security-management-magazine/articles/2013/12/everyone-needs-an-exit-strategy/2019-12-19T16:45:46-05:00weekly0.5/security-management-magazine/articles/2013/12/court-case-employees-ada-claim-unreasonable/2019-12-19T16:25:24-05:00weekly0.5/security-management-magazine/articles/2013/12/behind-the-numbers-top-it-security-governance-measures/2019-12-15T16:54:51-05:00weekly0.5/security-management-magazine/articles/2013/12/court-case-ada-accommodation/2019-12-19T16:21:54-05:00weekly0.5/security-management-magazine/articles/2013/12/sarbanes-oxley-and-whistleblowing/2019-12-19T17:27:40-05:00weekly0.5/security-management-magazine/articles/2013/12/report-on-repression-and-criminalization-of-protest-activities/2019-12-19T16:42:41-05:00weekly0.5/security-management-magazine/articles/2013/12/nuclear-facility-protection/2019-12-19T17:16:49-05:00weekly0.5/security-management-magazine/articles/2013/12/mapping-the-arms-trade/2019-12-17T17:54:49-05:00weekly0.5/security-management-magazine/articles/2013/12/fighting-crime-with-mobile-forensics/2019-12-19T16:47:34-05:00weekly0.5/security-management-magazine/articles/2013/12/whos-winning-the-wage-wars/2019-12-19T17:30:50-05:00weekly0.5/security-management-magazine/articles/2013/12/legal-report-december-2013/2019-12-19T16:57:20-05:00weekly0.5/security-management-magazine/articles/2013/12/industry-news-december-2013/2019-12-19T16:50:02-05:00weekly0.5/security-management-magazine/articles/2013/12/pr-and-litigation-in-a-crisis/2019-12-19T17:23:58-05:00weekly0.5/security-management-magazine/articles/2013/11/fbi-announces-a-drop-in-hate-crimes/2019-08-01T17:15:57-04:00weekly0.5/security-management-magazine/articles/2013/11/dhs-has-limited-role-in-healthcare.gov-arena-agency-officials-testify/2019-08-01T17:15:58-04:00weekly0.5/security-management-magazine/articles/2013/11/from-tiny-bubbles-to-big-data-analytics/2019-12-20T10:47:58-05:00weekly0.5/security-management-magazine/articles/2013/11/preventing-radicalization/2019-12-19T18:21:10-05:00weekly0.5/security-management-magazine/articles/2013/11/cyberattack-trends-in-latin-america/2019-12-18T23:16:52-05:00weekly0.5/security-management-magazine/articles/2013/11/border-searches-must-be-reasonable-rules-court/2019-12-18T22:58:09-05:00weekly0.5/security-management-magazine/articles/2013/11/transportation-safety/2019-12-20T10:49:07-05:00weekly0.5/security-management-magazine/articles/2013/11/cybercrime-the-rise-of-the-advanced-persistent-threat/2019-12-19T18:05:01-05:00weekly0.5/security-management-magazine/articles/2013/11/aviation--maritime-security-intelligence/2019-12-19T17:46:03-05:00weekly0.5/security-management-magazine/articles/2013/11/safeguarding-critical-e-documents-implementing-a-program-for-securing-confidential-information-assets/2019-12-20T10:38:22-05:00weekly0.5/security-management-magazine/articles/2013/11/cultural-property-security-protecting-museums-historic-sites-archives-and-libraries/2020-11-17T10:17:43-05:00weekly0.5/security-management-magazine/articles/2013/11/the-state-of-government-bioterrorism-programs/2019-12-18T00:30:06-05:00weekly0.5/security-management-magazine/articles/2013/11/u.s.-government-counterterrorism-a-guide-to-who-does-what/2019-12-20T10:50:08-05:00weekly0.5/security-management-magazine/articles/2013/11/counterterrorism/2019-12-19T17:55:46-05:00weekly0.5/security-management-magazine/articles/2013/11/the-state-of-bioterrorism-surveillance/2019-12-19T17:48:07-05:00weekly0.5/security-management-magazine/articles/2013/11/virtually-at-work/2021-01-21T08:38:16-05:00weekly0.5/security-management-magazine/articles/2013/11/cell-phone-privacy/2019-12-20T10:31:59-05:00weekly0.5/security-management-magazine/articles/2013/11/antifragile-things-that-gain-from-disorder/2019-08-01T17:15:59-04:00weekly0.5/security-management-magazine/articles/2013/11/antifragile-things-that-gain-from-disorder2/2019-12-19T17:40:50-05:00weekly0.5/security-management-magazine/articles/2013/11/court-case-employees-who-lied-need-not-be-reinstated/2019-12-19T18:07:52-05:00weekly0.5/security-management-magazine/articles/2013/11/security-clearances-and-access-issues/2019-12-20T10:40:35-05:00weekly0.5/security-management-magazine/articles/2013/11/guilty-or-not/2019-12-19T18:12:16-05:00weekly0.5/security-management-magazine/articles/2013/11/malware-management/2019-12-19T00:19:54-05:00weekly0.5/security-management-magazine/articles/2013/11/countering-the-persistent-threat/2019-12-19T17:51:13-05:00weekly0.5/security-management-magazine/articles/2013/11/shutting-down-retail-theft/2024-01-16T15:24:48-05:00weekly0.5/security-management-magazine/articles/2013/11/legal-report-november-2013/2019-12-19T18:16:20-05:00weekly0.5/security-management-magazine/articles/2013/11/industry-news-november-2013/2019-12-19T18:14:05-05:00weekly0.5/security-management-magazine/articles/2013/11/educational-opportunities/2019-12-19T18:06:52-05:00weekly0.5/security-management-magazine/articles/2013/10/nist-releases-preliminary-cybersecurity-framework/2019-08-01T17:16:00-04:00weekly0.5/security-management-magazine/articles/2013/10/george-mason-university-deploys-mobile-application-that-helps-it-get-information-out-via-smartphones/2019-08-01T17:16:00-04:00weekly0.5/security-management-magazine/articles/2013/10/visa-discusses-efforts-to-prevent-fraudulent-transactions/2019-08-01T17:16:00-04:00weekly0.5/security-management-magazine/articles/2013/10/lessons-from-the-fukushima-response/2019-12-19T17:06:10-05:00weekly0.5/security-management-magazine/articles/2013/10/preparedness-results-and-concerns/2020-01-09T12:24:56-05:00weekly0.5/security-management-magazine/articles/2013/10/security-perspectives-surveyed/2020-01-09T12:35:27-05:00weekly0.5/security-management-magazine/articles/2013/10/criminal-records-restrictions/2019-12-19T18:02:51-05:00weekly0.5/security-management-magazine/articles/2013/10/court-case-excessive-employee-monitoring/2019-12-19T17:38:14-05:00weekly0.5/security-management-magazine/articles/2013/10/pre-employment-background-investigations-for-public-safety-professionals/2020-01-09T12:23:58-05:00weekly0.5/security-management-magazine/articles/2013/10/the-safe-hiring-manual-the-complete-guide-to-employment-screening-background-checks-for-employers-recruiters-and-job-seekers/2020-01-09T12:30:43-05:00weekly0.5/security-management-magazine/articles/2013/10/inside-internal-affairs-an-in-depth-look-at-the-people-process--politics/2020-01-09T11:55:19-05:00weekly0.5/security-management-magazine/articles/2013/10/confronting-the-insider-threat/2020-01-09T12:04:06-05:00weekly0.5/security-management-magazine/articles/2013/10/miranda-rights-at-school/2020-01-09T12:32:38-05:00weekly0.5/security-management-magazine/articles/2013/10/court-case-negligent-security/2020-01-09T12:18:44-05:00weekly0.5/security-management-magazine/articles/2013/10/amtel-mobile-device-management/2020-01-09T11:57:43-05:00weekly0.5/security-management-magazine/articles/2013/10/court-case-burden-of-proof-in-harassment-cases/2020-01-09T12:09:19-05:00weekly0.5/security-management-magazine/articles/2013/10/cloud-technology/2020-01-09T12:00:07-05:00weekly0.5/security-management-magazine/articles/2013/10/behind-the-numbers-cybercrime-in-context/2019-12-19T14:57:16-05:00weekly0.5/security-management-magazine/articles/2013/10/public-safety-communications/2020-01-09T12:29:26-05:00weekly0.5/security-management-magazine/articles/2013/10/sandy-response-evaluated/2020-01-09T12:31:30-05:00weekly0.5/security-management-magazine/articles/2013/10/exposing-prints/2020-01-09T12:08:27-05:00weekly0.5/security-management-magazine/articles/2013/10/providing-safe-crossings/2019-12-19T17:41:50-05:00weekly0.5/security-management-magazine/articles/2013/10/computing-in-the-cloud/2019-12-19T15:05:30-05:00weekly0.5/security-management-magazine/articles/2013/10/new-ways-to-manage-risk/2020-11-25T16:44:01-05:00weekly0.5/security-management-magazine/articles/2013/10/heres-the-drill/2020-01-09T12:14:10-05:00weekly0.5/security-management-magazine/articles/2013/10/legal-report-october-2013/2020-01-09T12:16:58-05:00weekly0.5/security-management-magazine/articles/2013/10/industry-news-october-2013/2020-01-09T12:15:40-05:00weekly0.5/security-management-magazine/articles/2013/10/criminal-records-restrictions2/2020-01-09T12:06:42-05:00weekly0.5/security-management-magazine/articles/2013/09/bombers-hijackers-body-scanners-and-jihadists/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/americans-with-disabilities-act/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/pullen-recognized-for-heroics/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/isc-shares-vision-and-ideas-at-annual-town-hall-meeting/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/seminar-sessions-in-chicago/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/walker-award-presented-to-donovan/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/wozniak-praises-the-power-of-innovation/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/experts-call-for-greater-awareness-of-cyber-extortion-schemes/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/nist-issues-updated-standard-for-federal-identification-card-to-strengthen-authentication-capabilities/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/preemployment-screening-and-social-media/2019-08-01T17:16:03-04:00weekly0.5/security-management-magazine/articles/2013/09/school-seeks-uniformity/2020-01-09T14:40:19-05:00weekly0.5/security-management-magazine/articles/2013/09/fbi-opens-portal-for-cyberattack-reporting/2021-01-29T13:00:38-05:00weekly0.5/security-management-magazine/articles/2013/09/tier-pressure-to-curb-human-trafficking/2020-01-09T14:42:56-05:00weekly0.5/security-management-magazine/articles/2013/09/chicagos-big-security-shoulders/2020-01-09T12:52:18-05:00weekly0.5/security-management-magazine/articles/2013/09/tsa-and-canines/2020-01-09T12:49:36-05:00weekly0.5/security-management-magazine/articles/2013/09/progress-report-on-canine-training/2020-01-09T14:36:25-05:00weekly0.5/security-management-magazine/articles/2013/09/global-corruption-barometer/2019-12-20T00:48:14-05:00weekly0.5/security-management-magazine/articles/2013/09/close-protection-a-closer-observation-of-the-protection-equation/2020-01-09T12:54:48-05:00weekly0.5/security-management-magazine/articles/2013/09/managing-the-insider-threat-no-dark-corners/2020-01-09T14:31:50-05:00weekly0.5/security-management-magazine/articles/2013/09/critical-infrastructure-security-assessment-prevention-detection-response-assessment-prevention-detection-response/2020-11-25T16:29:44-05:00weekly0.5/security-management-magazine/articles/2013/09/court-case-hospital-did-not-violate-ada/2020-01-09T14:37:26-05:00weekly0.5/security-management-magazine/articles/2013/09/assessing-the-state-of-the-security-industry/2020-01-09T12:45:13-05:00weekly0.5/security-management-magazine/articles/2013/09/cybersecurity-ddos-attacks-in-2013/2020-01-09T14:11:02-05:00weekly0.5/security-management-magazine/articles/2013/09/defending-against-ddos-attacks/2020-01-09T14:12:54-05:00weekly0.5/security-management-magazine/articles/2013/09/against-security-how-we-go-wrong-at-airports-subways-and-other-sites-of-ambiguous-danger/2020-01-09T12:40:02-05:00weekly0.5/security-management-magazine/articles/2013/09/behind-the-numbers-dos-attacks/2020-01-09T12:48:12-05:00weekly0.5/security-management-magazine/articles/2013/09/clandestine-photography-basic-to-advanced-daytime-and-nighttime-manual-surveillance-photography-techniques/2020-01-09T12:53:25-05:00weekly0.5/security-management-magazine/articles/2013/09/blast-resistant-trains/2019-08-01T17:16:05-04:00weekly0.5/security-management-magazine/articles/2013/09/gang-injunctions/2019-12-20T16:25:27-05:00weekly0.5/security-management-magazine/articles/2013/09/a-winning-team/2020-01-09T12:47:29-05:00weekly0.5/security-management-magazine/articles/2013/09/getting-the-goods/2019-08-01T17:16:05-04:00weekly0.5/security-management-magazine/articles/2013/09/legal-report-september-2013/2020-01-09T14:28:43-05:00weekly0.5/security-management-magazine/articles/2013/09/industry-news-september-2013/2020-01-09T14:27:20-05:00weekly0.5/security-management-magazine/articles/2013/09/plan-not-to-strike-out/2021-01-28T13:49:50-05:00weekly0.5/security-management-magazine/articles/2013/08/post-sandy-analysis-reveals-challenges-successes-for-fema/2019-08-01T17:16:06-04:00weekly0.5/security-management-magazine/articles/2013/08/a-healthy-access-upgrade/2019-08-01T17:16:06-04:00weekly0.5/security-management-magazine/articles/2013/08/cisco-introduces-push-to-talk-application/2019-08-01T17:16:06-04:00weekly0.5/security-management-magazine/articles/2013/08/terrorists-using-liquid-explosives/2019-08-01T17:16:06-04:00weekly0.5/security-management-magazine/articles/2013/08/intelligence-collection-who-needs-to-know/2020-01-13T13:49:24-05:00weekly0.5/security-management-magazine/articles/2013/08/defusing-radical-islam/2020-01-04T15:55:24-05:00weekly0.5/security-management-magazine/articles/2013/08/no-employment-protection-for-colorado-marijuana-users/2020-01-13T13:52:39-05:00weekly0.5/security-management-magazine/articles/2013/08/ftc-warns-data-brokers/2020-01-13T12:09:46-05:00weekly0.5/security-management-magazine/articles/2013/08/global-retail-crime-and-loss-prevention-trends/2020-01-13T13:51:39-05:00weekly0.5/security-management-magazine/articles/2013/08/innovation-dual-use-and-security/2020-01-13T13:48:18-05:00weekly0.5/security-management-magazine/articles/2013/08/privacy-and-cybersecurity/2020-01-13T13:54:19-05:00weekly0.5/security-management-magazine/articles/2013/08/the-best-defense/2020-01-13T12:03:02-05:00weekly0.5/security-management-magazine/articles/2013/08/court-case-background-checks/2020-01-13T11:58:36-05:00weekly0.5/security-management-magazine/articles/2013/08/balancing-liberty-and-security-human-rights-human-wrongs/2020-01-13T12:01:11-05:00weekly0.5/security-management-magazine/articles/2013/08/critical-incident-management-a-complete-response-guide-2nd-edition/2020-01-13T12:06:05-05:00weekly0.5/security-management-magazine/articles/2013/08/cybersecurity-framework/2020-01-13T12:08:40-05:00weekly0.5/security-management-magazine/articles/2013/08/behind-the-numbers-top-cyberattack-targets/2020-01-08T23:25:33-05:00weekly0.5/security-management-magazine/articles/2013/08/what-2012-terrorism-statistics-reveal/2020-01-13T13:56:15-05:00weekly0.5/security-management-magazine/articles/2013/08/tips-on-crisis-communications/2020-01-13T13:55:15-05:00weekly0.5/security-management-magazine/articles/2013/08/detecting-a-fake/2020-01-13T12:12:26-05:00weekly0.5/security-management-magazine/articles/2013/08/a-healthy-access-upgrade2/2020-01-13T11:55:03-05:00weekly0.5/security-management-magazine/articles/2013/08/awareness-on-the-waterfront/2020-01-13T11:57:38-05:00weekly0.5/security-management-magazine/articles/2013/08/legal-report-august-2013/2020-01-13T13:50:30-05:00weekly0.5/security-management-magazine/articles/2013/08/industry-news-august-2013/2020-01-13T13:45:46-05:00weekly0.5/security-management-magazine/articles/2013/08/immigration-law-and-employers/2020-01-13T13:43:41-05:00weekly0.5/security-management-magazine/articles/2013/07/ssh-communications-security-makes-its-assessment-tool-available-for-free/2019-08-01T17:16:08-04:00weekly0.5/security-management-magazine/articles/2013/07/fbi-launches-pilot-program-for-real-time-cyberattack-reporting/2019-08-01T17:16:08-04:00weekly0.5/security-management-magazine/articles/2013/07/how-snowdens-revelations-impact-intelligence-collection-efforts/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/07/executive-protection-lessons-in-light-of-popes-close-call-in-brazil/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/07/tackling-cybersecurity-risk-at-financial-institutions/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/07/secretary-of-the-department-of-homeland-security-janet-napolitano-resigns/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/07/finding-the-fencers-of-stolen-retail-goods/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/07/military-coup-unlikely-in-egypt-say-experts-at-asis-cso-roundtable-discussion/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/06/us-supreme-court-favors-employers-discrimination-rulings/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/06/audits-revewal-security-flaws-in-cdc-biolabs/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/06/identity-verification-and-privacy-issues-debated-by-legal-experts/2019-08-01T17:19:03-04:00weekly0.5/security-management-magazine/articles/2013/06/united-states-can-do-more-to-prepare-for-cbrne-events/2019-08-01T17:19:04-04:00weekly0.5/security-management-magazine/articles/2013/06/supreme-court-upholds-dna-collection/2019-08-01T17:19:04-04:00weekly0.5/security-management-magazine/articles/2013/06/assessing-u.s.-efforts-in-central-america/2020-01-17T11:27:44-05:00weekly0.5/security-management-magazine/articles/2013/06/situational-awareness/2020-01-17T12:16:30-05:00weekly0.5/security-management-magazine/articles/2013/06/court-case-companys-random-drug-screening-program-is-legal/2020-01-17T11:57:38-05:00weekly0.5/security-management-magazine/articles/2013/06/trends-in-violence-and-drug-trafficking-in-central-america/2020-01-17T11:47:39-05:00weekly0.5/security-management-magazine/articles/2013/06/an-app-approach-to-crime/2020-01-17T11:25:26-05:00weekly0.5/security-management-magazine/articles/2013/06/money-laundering-a-guide-for-criminal-investigators-third-edition/2020-01-17T12:10:31-05:00weekly0.5/security-management-magazine/articles/2013/06/decision-making-software/2020-01-17T12:04:39-05:00weekly0.5/security-management-magazine/articles/2013/06/cargo-theft-loss-prevention-and-supply-chain-security/2020-01-17T11:45:33-05:00weekly0.5/security-management-magazine/articles/2013/06/dont-get-burned-by-digital-wildfires/2020-01-16T15:48:47-05:00weekly0.5/security-management-magazine/articles/2013/06/the-risky-business-of-travel/2020-01-17T12:14:33-05:00weekly0.5/security-management-magazine/articles/2013/06/the-use-of-biometrics-in-developing-countries/2020-01-17T11:33:22-05:00weekly0.5/security-management-magazine/articles/2013/06/bribery-and-corruption-navigating-the-global-risks/2020-09-24T14:36:04-04:00weekly0.5/security-management-magazine/articles/2013/06/cyber-attacks-protecting-national-infrastructure-student-edition/2020-02-26T10:32:41-05:00weekly0.5/security-management-magazine/articles/2013/06/cybersecurity-for-critical-infrastructure/2020-11-25T16:13:27-05:00weekly0.5/security-management-magazine/articles/2013/06/better-answers-to-what-if-scenarios/2020-01-11T22:01:27-05:00weekly0.5/security-management-magazine/articles/2013/06/resumption-of-bird-flu-research/2020-01-17T12:11:46-05:00weekly0.5/security-management-magazine/articles/2013/06/dont-overdo-data-retention/2020-01-17T11:56:38-05:00weekly0.5/security-management-magazine/articles/2013/06/biometrics-in-developing-regions/2020-01-17T11:40:07-05:00weekly0.5/security-management-magazine/articles/2013/06/is-whistleblowing-working/2020-01-17T12:02:35-05:00weekly0.5/security-management-magazine/articles/2013/06/legal-report-june-2013/2020-01-17T12:06:09-05:00weekly0.5/security-management-magazine/articles/2013/06/industry-news-june-2013/2020-01-17T11:59:12-05:00weekly0.5/security-management-magazine/articles/2013/05/risk-of-nuclear-materials-being-smuggled-through-ports-should-be-taken-seriously-say-experts/2019-08-01T17:19:06-04:00weekly0.5/security-management-magazine/articles/2013/05/twitter-implements-a-two-factor-authentication-critics-see-flaws/2019-08-01T17:19:06-04:00weekly0.5/security-management-magazine/articles/2013/05/cisco-executive-discusses-evolving-perspectives-on-cybersecurity/2019-08-01T17:19:06-04:00weekly0.5/security-management-magazine/articles/2013/05/enterprise-mobile-duress-a-mobile-panic-button-for-healthcare-providers/2019-08-01T17:19:06-04:00weekly0.5/security-management-magazine/articles/2013/05/fema-releases-three-national-planning-frameworks-to-meet-national-preparedness-goal/2019-08-01T17:19:07-04:00weekly0.5/security-management-magazine/articles/2013/05/three-more-arrests-in-connection-with-boston-bombings/2019-08-01T17:19:07-04:00weekly0.5/security-management-magazine/articles/2013/05/kastle-systems-international-acquires-checkvideo/2019-08-01T17:19:07-04:00weekly0.5/security-management-magazine/articles/2013/05/high-stakes-on-the-high-seas/2020-01-22T11:29:06-05:00weekly0.5/security-management-magazine/articles/2013/05/whats-wrong-with-border-security/2020-01-22T11:46:49-05:00weekly0.5/security-management-magazine/articles/2013/05/reliability-of-drug-dogs/2020-01-22T11:24:29-05:00weekly0.5/security-management-magazine/articles/2013/05/top-10-performing-security-industry-stocks-for-february/2019-08-01T17:19:07-04:00weekly0.5/security-management-magazine/articles/2013/05/white-collar-crime/2020-01-22T11:50:51-05:00weekly0.5/security-management-magazine/articles/2013/05/investigations-in-the-workplace-second-edition/2020-01-22T11:37:57-05:00weekly0.5/security-management-magazine/articles/2013/05/court-case-religious-discrimination/2020-01-22T11:44:05-05:00weekly0.5/security-management-magazine/articles/2013/05/court-case-investigations-and-employee-compliance/2020-01-22T11:34:35-05:00weekly0.5/security-management-magazine/articles/2013/05/the-honest-truth-about-dishonesty-why-we-lie-to-everyone-especially-ourselves/2020-01-22T11:31:36-05:00weekly0.5/security-management-magazine/articles/2013/05/cybersecurity-framework-draft-efforts-underway/2020-01-19T01:30:31-05:00weekly0.5/security-management-magazine/articles/2013/05/cybersecurity-public-sector-threats-and-responses/2020-01-22T11:18:08-05:00weekly0.5/security-management-magazine/articles/2013/05/developing-a-prevention-policy/2020-01-22T11:22:03-05:00weekly0.5/security-management-magazine/articles/2013/05/court-case-ada-discrimination/2019-08-01T17:19:08-04:00weekly0.5/security-management-magazine/articles/2013/05/behind-the-numbers-consumer-complaints-to-the-ftc-2012/2020-01-21T13:58:07-05:00weekly0.5/security-management-magazine/articles/2013/05/behind-the-numbers/2020-01-21T13:55:33-05:00weekly0.5/security-management-magazine/articles/2013/05/court-case-ada-discrimination2/2020-01-21T13:48:19-05:00weekly0.5/security-management-magazine/articles/2013/05/vigilance-fatigue/2020-01-19T16:09:03-05:00weekly0.5/security-management-magazine/articles/2013/05/fbi-tries-tuning-in-and-reaching-out/2020-01-22T11:25:23-05:00weekly0.5/security-management-magazine/articles/2013/05/a-key-fix-that-flies/2020-01-21T13:49:30-05:00weekly0.5/security-management-magazine/articles/2013/05/monitoring-social-media-use/2020-01-22T11:41:56-05:00weekly0.5/security-management-magazine/articles/2013/05/cfats-progress-report/2020-01-21T14:09:23-05:00weekly0.5/security-management-magazine/articles/2013/05/big-picture-risk-management/2020-01-21T14:03:35-05:00weekly0.5/security-management-magazine/articles/2013/05/legal-report-may-2013/2020-01-22T11:39:28-05:00weekly0.5/security-management-magazine/articles/2013/05/industry-news-may-2013/2020-11-25T17:22:48-05:00weekly0.5/security-management-magazine/articles/2013/05/working-with-the-ada/2020-01-22T11:54:51-05:00weekly0.5/security-management-magazine/articles/2013/04/director-of-national-intelligence-to-review-intelligence-gathering-prior-to-boston-attacks/2019-08-01T17:19:09-04:00weekly0.5/security-management-magazine/articles/2013/04/senate-holds-hearing-on-drones/2019-08-01T17:19:09-04:00weekly0.5/security-management-magazine/articles/2013/04/hack-of-ap-twitter-account-falsely-said-that-the-white-house-had-been-attacked-briefly-affected-stock-market/2019-08-01T17:19:09-04:00weekly0.5/security-management-magazine/articles/2013/04/boston-bombing-suspect-charged-could-face-death-penalty/2019-08-01T17:19:09-04:00weekly0.5/security-management-magazine/articles/2013/04/second-boston-marathon-bomber-apprehended-alive/2019-08-01T17:19:09-04:00weekly0.5/security-management-magazine/articles/2013/04/white-house-press-secretary-jay-carney-confirms-suspicious-letter-intended-for-president-stopped-at-offsite-facility/2019-08-01T17:19:10-04:00weekly0.5/security-management-magazine/articles/2013/04/treasury-department-using-advanced-analytics-to-help-detect-prevent-money-laundering/2019-08-01T17:19:10-04:00weekly0.5/security-management-magazine/articles/2013/04/the-u.k.-bribery-act-year-one/2020-01-24T11:14:39-05:00weekly0.5/security-management-magazine/articles/2013/04/top-10-performing-security-industry-stocks-for-january/2019-08-01T17:19:10-04:00weekly0.5/security-management-magazine/articles/2013/04/federal-contractors-and-background-screening/2020-01-24T10:27:54-05:00weekly0.5/security-management-magazine/articles/2013/04/the-tangled-web-a-guide-to-securing-modern-web-applications/2020-01-24T11:12:36-05:00weekly0.5/security-management-magazine/articles/2013/04/active-shooter-rapid-response-dvd/2020-01-24T10:30:14-05:00weekly0.5/security-management-magazine/articles/2013/04/resiliency/2020-01-24T11:07:26-05:00weekly0.5/security-management-magazine/articles/2013/04/keeping-the-lights-on/2019-08-01T17:19:10-04:00weekly0.5/security-management-magazine/articles/2013/04/communications/2020-06-23T19:22:37-04:00weekly0.5/security-management-magazine/articles/2013/04/america-the-vulnerable-inside-the-new-threat-matrix-of-digital-espionage-crime-and-warfare/2020-01-24T10:32:07-05:00weekly0.5/security-management-magazine/articles/2013/04/assessing-u.s.-response-to-cyberthreat/2020-01-22T19:30:16-05:00weekly0.5/security-management-magazine/articles/2013/04/court-case-disclosing-medical-information/2020-01-24T10:35:22-05:00weekly0.5/security-management-magazine/articles/2013/04/cyberattacks-grow-more-complex/2020-01-24T10:39:27-05:00weekly0.5/security-management-magazine/articles/2013/04/report-it-security-suffers-from-a-leadership-shortage/2020-01-24T10:56:23-05:00weekly0.5/security-management-magazine/articles/2013/04/arctic-security-in-an-age-of-climate-change/2020-01-24T10:33:40-05:00weekly0.5/security-management-magazine/articles/2013/04/behind-the-numbers/2020-01-22T20:01:42-05:00weekly0.5/security-management-magazine/articles/2013/04/court-case-employee-can-not-sue-for-fraud-termination/2020-01-24T10:57:33-05:00weekly0.5/security-management-magazine/articles/2013/04/how-emotions-motivate-followers/2020-01-22T21:04:04-05:00weekly0.5/security-management-magazine/articles/2013/04/police-protection/2020-01-24T11:04:36-05:00weekly0.5/security-management-magazine/articles/2013/04/ensuring-a-secure-retirement/2020-01-22T20:59:19-05:00weekly0.5/security-management-magazine/articles/2013/04/shining-a-light-on-surveillance/2020-01-24T11:11:01-05:00weekly0.5/security-management-magazine/articles/2013/04/security-succeeds-with-collaboration/2020-01-24T11:09:46-05:00weekly0.5/security-management-magazine/articles/2013/04/legal-report-april-2013/2020-01-24T11:03:13-05:00weekly0.5/security-management-magazine/articles/2013/04/industry-news-april-2013/2020-01-24T11:01:31-05:00weekly0.5/security-management-magazine/articles/2013/04/protecting-company-coffers/2020-01-24T11:06:12-05:00weekly0.5/security-management-magazine/articles/2013/03/new-trends-in-cyber-threats/2019-08-01T17:19:12-04:00weekly0.5/security-management-magazine/articles/2013/03/texas-law-allows-firearms-on-company-property/2020-01-24T12:49:02-05:00weekly0.5/security-management-magazine/articles/2013/03/the-end-of-terror/2020-01-23T21:10:34-05:00weekly0.5/security-management-magazine/articles/2013/03/online-pharmacies/2020-01-23T22:04:20-05:00weekly0.5/security-management-magazine/articles/2013/03/court-case-drug-testing-and-disability-discrimination/2020-01-24T12:43:47-05:00weekly0.5/security-management-magazine/articles/2013/03/what-ails-online-pharmacies/2019-08-01T17:19:12-04:00weekly0.5/security-management-magazine/articles/2013/03/top-10-performing-security-industry-stocks-for-december/2019-08-01T17:19:12-04:00weekly0.5/security-management-magazine/articles/2013/03/the-privacy-advocates-resisting-the-spread-of-surveillance/2020-01-24T13:02:03-05:00weekly0.5/security-management-magazine/articles/2013/03/governance-risk-management-and-compliance-it-cant-happen-to-usavoiding-corporate-disaster-while-driving-success/2020-01-24T12:52:33-05:00weekly0.5/security-management-magazine/articles/2013/03/surveillance-or-security-the-risks-posed-by-new-wiretapping-technologies/2020-01-28T11:30:19-05:00weekly0.5/security-management-magazine/articles/2013/03/first-responder-training-to-change/2020-01-24T12:50:46-05:00weekly0.5/security-management-magazine/articles/2013/03/excuse-my-language-but-what-the-f$/2020-01-23T21:19:54-05:00weekly0.5/security-management-magazine/articles/2013/03/court-case-company-liable-for-pretexting/2020-01-24T12:45:47-05:00weekly0.5/security-management-magazine/articles/2013/03/court-case-background-screening-and-consumer-reporting-agencies/2020-01-24T12:34:25-05:00weekly0.5/security-management-magazine/articles/2013/03/a-guide-to-business-organization-management-and-basic-investigative-skills-for-the-private-investigator/2020-01-24T12:32:24-05:00weekly0.5/security-management-magazine/articles/2013/03/use-of-canines-in-airport-security/2020-01-24T12:33:13-05:00weekly0.5/security-management-magazine/articles/2013/03/behind-the-numbers/2020-01-24T12:42:31-05:00weekly0.5/security-management-magazine/articles/2013/03/behind-the-numbers-protecting-sensitive-information/2020-01-23T20:41:15-05:00weekly0.5/security-management-magazine/articles/2013/03/court-case-company-may-not-fire-employee-for-writing-offensive-remarks/2020-01-23T21:00:44-05:00weekly0.5/security-management-magazine/articles/2013/03/21st-century-emergency/2020-01-23T18:55:14-05:00weekly0.5/security-management-magazine/articles/2013/03/diseasespread/2020-01-24T12:44:59-05:00weekly0.5/security-management-magazine/articles/2013/03/surveillance-lessons-learned/2020-01-28T11:28:33-05:00weekly0.5/security-management-magazine/articles/2013/03/eu-privacy-proposal-criticized/2020-01-23T21:14:37-05:00weekly0.5/security-management-magazine/articles/2013/03/what-ails-online-pharmacies2/2020-01-28T11:34:24-05:00weekly0.5/security-management-magazine/articles/2013/03/a-conventional-victory/2020-01-23T19:05:19-05:00weekly0.5/security-management-magazine/articles/2013/03/banking-on-security/2020-01-24T12:38:18-05:00weekly0.5/security-management-magazine/articles/2013/03/legal-report-march-2013/2020-01-24T12:56:23-05:00weekly0.5/security-management-magazine/articles/2013/03/industry-news-march-2013/2020-01-24T12:54:04-05:00weekly0.5/security-management-magazine/articles/2013/03/marketing-securitys-mission/2020-01-24T12:59:58-05:00weekly0.5/security-management-magazine/articles/2013/02/senate-committee-holds-hearing-on-assault-weapons-ban/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/02/rsa-conference-speaker-lauds-it-security-advancements/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/02/white-house-issues-executive-order-cybersecurity/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/02/canines-could-be-used-more-effectively-at-airports-says-gao/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/02/nra-releases-video-on-its-school-security-effort/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/02/poaching-sites-sought/2020-02-06T12:32:22-05:00weekly0.5/security-management-magazine/articles/2013/02/digital-edition-cover-story-uncovering-arts-dark-past/2020-02-06T12:30:35-05:00weekly0.5/security-management-magazine/articles/2013/02/staying-safe-at-school-second-edition/2020-02-06T12:38:37-05:00weekly0.5/security-management-magazine/articles/2013/01/court-rules-homeowners-association-can-enforce-rules-using-private-security/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/01/ftc-to-study-how-data-brokers-gather-and-use-personal-information/2019-08-01T17:19:15-04:00weekly0.5/security-management-magazine/articles/2013/01/google-releases-transparency-report/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/nypd-testing-its-first-gun-detecting-body-scanner/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/the-man-from-down-under/2020-02-06T13:52:12-05:00weekly0.5/security-management-magazine/articles/2013/01/hackers-find-a-new-way-to-make-maximum-cash-withdrawals/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/house-passes-bill-to-continue-countermeasures-funding/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/hackers-target-mexican-national-security-networks/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/video-violence-of-mexican-drug-cartels/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/prison-guard-faces-20-years-for-beating-inmate-to-death-and-trying-to-cover-it-up/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/administrations-plan-reduce-gun-violence/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/lawmakers-introduce-10-firearms-bills-in-10-days/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/asis-signs-mou-with-ncmec/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/canadian-sentenced-to-four-years-for-illegal-pharmacy-web-site/2019-08-01T17:19:16-04:00weekly0.5/security-management-magazine/articles/2013/01/private-security-fatalities-comparable-to-police-fatalities/2024-01-08T10:38:09-05:00weekly0.5/security-management-magazine/articles/2013/01/fda-proposes-new-food-safety-rules-aimed-at-preventing-foodborne-illness/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/cpj-issues-statement-on-newspaper-that-hired-armed-guards/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/president-approves-new-laws-on-trade-secrets-and-surveillance/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/most-cbps-problem-agents-come-from-posts-on-the-southwest-border/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/idaho-non-profit-agrees-to-pay-$50000-for-hipaa-violation/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/lawmakers-request-briefing-on-panga-boat-smuggling/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/operating-in-high-risk-markets/2020-02-06T13:34:43-05:00weekly0.5/security-management-magazine/articles/2013/01/top-10-performing-security-industry-stocks-for-october/2019-08-01T17:19:17-04:00weekly0.5/security-management-magazine/articles/2013/01/digging-for-disclosure-tactics-for-protecting-your-firms-assets-from-swindlers-scammers-and-imposters/2020-02-06T13:21:59-05:00weekly0.5/security-management-magazine/articles/2013/01/innovations-to-ring-in-the-new-year/2020-02-06T13:29:30-05:00weekly0.5/security-management-magazine/articles/2013/01/fusion-centers/2020-02-05T19:16:13-05:00weekly0.5/security-management-magazine/articles/2013/01/supreme-court-of-canada-workplace-computers-and-employees-privacy-expectations/2020-02-06T13:55:37-05:00weekly0.5/security-management-magazine/articles/2013/01/childrens-online-privacy-protection-act-amendments-under-consideration/2020-02-05T20:31:07-05:00weekly0.5/security-management-magazine/articles/2013/01/protecting-childrens-privacy-online/2020-02-05T20:45:54-05:00weekly0.5/security-management-magazine/articles/2013/01/risk-analysis-and-the-security-survey-fourth-edition/2020-02-06T13:45:45-05:00weekly0.5/security-management-magazine/articles/2013/01/presidio-combats-fraud-with-ironkey/2020-02-06T13:37:20-05:00weekly0.5/security-management-magazine/articles/2013/01/terrorist-financing-money-laundering-and-tax-evasion/2020-02-06T13:49:40-05:00weekly0.5/security-management-magazine/articles/2013/01/eco-warriors-nihilistic-terrorists-and-the-environment/2020-06-23T19:22:37-04:00weekly0.5/security-management-magazine/articles/2013/01/investigations-and-federal-labor-laws/2020-02-06T13:30:37-05:00weekly0.5/security-management-magazine/articles/2013/01/court-case-employee-did-not-violate-cfaa/2020-02-06T13:15:08-05:00weekly0.5/security-management-magazine/articles/2013/01/cyber-warfare-techniques-tactics-and-tools-for-security-practitioners/2020-02-06T13:18:33-05:00weekly0.5/security-management-magazine/articles/2013/01/report-oversight-of-food-imports/2020-02-06T13:26:19-05:00weekly0.5/security-management-magazine/articles/2013/01/chart-behind-the-numbers/2020-02-06T13:12:43-05:00weekly0.5/security-management-magazine/articles/2013/01/playing-defense-against-corruption/2020-02-05T20:12:01-05:00weekly0.5/security-management-magazine/articles/2013/01/a-closer-look-at-hospital-shooting-incidents/2020-02-01T20:38:30-05:00weekly0.5/security-management-magazine/articles/2013/01/a-department-under-fire/2020-02-06T13:11:51-05:00weekly0.5/security-management-magazine/articles/2013/01/educated-upgrade/2020-02-06T13:25:08-05:00weekly0.5/security-management-magazine/articles/2013/01/protecting-against-cyberthreats/2020-11-25T16:38:24-05:00weekly0.5/security-management-magazine/articles/2013/01/the-man-from-down-under2/2019-08-01T17:19:19-04:00weekly0.5/security-management-magazine/articles/2013/01/staying-out-of-court/2020-02-06T13:47:16-05:00weekly0.5/security-management-magazine/articles/2013/01/legal-report-january-2013/2020-02-06T13:32:35-05:00weekly0.5/security-management-magazine/articles/2013/01/industry-news-january-2013/2020-02-06T13:28:47-05:00weekly0.5/security-management-magazine/articles/2013/01/what-resilience-means/2020-02-06T13:54:52-05:00weekly0.5/security-management-magazine/articles/2012/12/experts-weigh-in-on-2013-cyberthreats/2019-08-01T17:19:19-04:00weekly0.5/security-management-magazine/articles/2012/12/video-the-only-thing-that-stops-a-bad-guy-with-a-gun-is-a-good-guy-with-a-gun/2019-08-01T17:19:19-04:00weekly0.5/security-management-magazine/articles/2012/12/a-department-under-fire/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/first-anthrax-anti-toxin-approved-for-emergency-use/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/changes-coming-to-hate-crime-reporting/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/new-federal-laws-address-whistleblowers-and-border-security/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/video-disconnect-shows-how-browser-sessions-get-hijacked-and-how-to-protect-them/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/agency-of-last-resort/2020-01-20T20:33:43-05:00weekly0.5/security-management-magazine/articles/2012/12/swiss-warning-intelligence-partners-about-massive-data-breach/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/arecont-threatens-ipvm-with-legal-action-over-critical-blog-post/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/operation-backfire-eleven-down-two-to-go/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/asis-2012-seminar-showcase/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/armoring-trends-in-latin-america/2020-01-20T20:35:28-05:00weekly0.5/security-management-magazine/articles/2012/12/top-10-performing-security-industry-stocks-for-september/2020-01-20T20:58:43-05:00weekly0.5/security-management-magazine/articles/2012/12/agency-of-last-resort2/2019-08-01T17:19:20-04:00weekly0.5/security-management-magazine/articles/2012/12/liars--outliers-enabling-the-trust-that-society-needs-to-thrive/2020-01-20T20:47:03-05:00weekly0.5/security-management-magazine/articles/2012/12/how-to-do-financial-asset-investigations/2020-01-20T20:41:38-05:00weekly0.5/security-management-magazine/articles/2012/12/surveillance-system-technology-trends/2020-01-20T20:54:41-05:00weekly0.5/security-management-magazine/articles/2012/12/domestic-violence-and-employment-discrimination-laws/2020-01-20T20:38:01-05:00weekly0.5/security-management-magazine/articles/2012/12/smart-grid-security-an-end-to-end-view-of-security-in-the-new-electrical-grid/2020-01-20T20:51:41-05:00weekly0.5/security-management-magazine/articles/2012/12/black-swans-and-the-challenge-of-mitigating-the-unknown/2020-01-20T20:36:14-05:00weekly0.5/security-management-magazine/articles/2012/12/the-evolution-of-school-security/2023-12-19T11:43:25-05:00weekly0.5/security-management-magazine/articles/2012/12/court-case-exam-discriminates-against-women-and-minorities/2019-08-01T17:19:21-04:00weekly0.5/security-management-magazine/articles/2012/12/left-of-the-boom/2020-01-20T20:45:08-05:00weekly0.5/security-management-magazine/articles/2012/12/chart-behind-the-numbers/2020-01-20T20:31:44-05:00weekly0.5/security-management-magazine/articles/2012/12/planning-ahead-for-pandemic/2020-01-20T20:47:57-05:00weekly0.5/security-management-magazine/articles/2012/12/tagged-and-tracked/2020-01-20T20:59:35-05:00weekly0.5/security-management-magazine/articles/2012/12/safely-out-to-the-ball-game/2020-01-20T20:49:19-05:00weekly0.5/security-management-magazine/articles/2012/12/creating-a-digital-evidence-policy/2020-01-20T20:37:09-05:00weekly0.5/security-management-magazine/articles/2012/12/the-fight-against-food-fraud/2020-01-20T20:58:10-05:00weekly0.5/security-management-magazine/articles/2012/12/legal-report-december-2012/2020-01-20T20:46:07-05:00weekly0.5/security-management-magazine/articles/2012/12/industry-news-december-2012/2020-01-20T20:43:59-05:00weekly0.5/security-management-magazine/articles/2012/12/all-together-now/2020-01-20T20:34:33-05:00weekly0.5/security-management-magazine/articles/2012/11/medical-billing-company-says-employee-leaked-data-to-identity-theft-ring/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/fbi-teaching-industry-to-protect-trade-secrets/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/drug-counterfeiters-increasingly-use-real-drug-ingredients/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/new-technology-makes-foodborne-illnesses-harder-to-source/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/new-yorkers-use-shredded-confidential-information-as-confetti-again/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/photos-of-prince-william-reveal-sensitive-information-and-login-credentials/2019-08-01T17:19:22-04:00weekly0.5/security-management-magazine/articles/2012/11/has-a-hacker-figured-out-how-to-hide-malicious-sites-inside-search-results/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/fbi-releases-data-on-slain-officers/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/michigan-man-charged-with-selling-fake-microsoft-software/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/sounding-the-alarm-on-the-sovereign-citizen-movement/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/fbi-adds-terrorist-rapper-to-most-wanted-list/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/researcher-empowering-civil-society-is-right-approach-to-disaster-recovery/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/cloud-security-implications-in-file-sharing-site-case/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/hacking-tools-fuel-russian-black-market/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/morale-problems-persist-at-dhs/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/hospitals-urged-to-maintain-cybersecurity-after-sandy/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/11/official-dirty-bomb-detectors-were-deployed-during-the-olympics/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/10/sandy-prompts-early-launch-of-google-emergency-alert-feature/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/10/emp-weapon-marks-new-era-in-modern-warfare/2019-08-01T17:19:23-04:00weekly0.5/security-management-magazine/articles/2012/10/survey-suggests-data-encryption-makes-leaks-harder-to-detect/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/online-dating-scam-trending-at-internet-crime-complaint-center/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/fbi-says-its-not-storing-information-on-new-site-geared-toward-middle-school-students/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/report-recommends-stronger-hiring-development-practices-for-dhs-cyber-professionals/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/los-angeles-releases-fact-sheet-on-id-card-proposal/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/report-urges-government-involvement-in-privacy-protection/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/los-angeles-to-consider-id-cards-for-undocumented-immigrants/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/countries-shy-away-from-foreign-businesses-over-national-security-fears/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/student-records-hacked-from-florida-college/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/navy-bases-to-scan-100-percent-of-ids-at-the-gate/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/problems-at-fusion-centers-tied-to-poor-training/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/verified-uk-looks-at-social-media-to-establish-identity/2019-08-01T17:19:24-04:00weekly0.5/security-management-magazine/articles/2012/10/physicians-urged-to-use-see-something-say-something-approach-to-disease-surveillance/2019-08-01T17:19:25-04:00weekly0.5/security-management-magazine/articles/2012/10/un-official-suggests-formation-of-a-bioagent-watchdog/2019-08-01T17:19:25-04:00weekly0.5/security-management-magazine/articles/2012/10/government-takes-steps-to-address-discrimination-against-pregnant-employees/2019-08-01T17:19:25-04:00weekly0.5/security-management-magazine/articles/2012/10/sic-semper-technology/2020-01-20T20:00:24-05:00weekly0.5/security-management-magazine/articles/2012/10/behind-the-numbers-enterprise-risk-management/2020-01-20T19:38:16-05:00weekly0.5/security-management-magazine/articles/2012/10/curling-up-with-the-digital-edition/2020-01-15T14:43:11-05:00weekly0.5/security-management-magazine/articles/2012/10/healthcare-security/2020-01-20T19:49:43-05:00weekly0.5/security-management-magazine/articles/2012/10/dodd-frank-whistleblower-act-does-not-apply-internationally/2020-01-20T20:02:03-05:00weekly0.5/security-management-magazine/articles/2012/10/case-study-resorting-to-monitoring/2020-01-20T19:40:04-05:00weekly0.5/security-management-magazine/articles/2012/10/the-basics-of-information-security/2020-01-20T19:35:12-05:00weekly0.5/security-management-magazine/articles/2012/10/better-breach-tracking-needed/2020-01-20T19:39:09-05:00weekly0.5/security-management-magazine/articles/2012/10/video-sandias-cybersecurity-research-lab/2020-01-20T19:43:58-05:00weekly0.5/security-management-magazine/articles/2012/10/data-preservation/2020-01-20T19:45:12-05:00weekly0.5/security-management-magazine/articles/2012/10/court-case-employee-misconduct/2020-01-20T19:45:58-05:00weekly0.5/security-management-magazine/articles/2012/10/eyewitness-accuracy/2020-01-20T19:46:29-05:00weekly0.5/security-management-magazine/articles/2012/10/hostile-work-environment/2020-01-20T19:52:51-05:00weekly0.5/security-management-magazine/articles/2012/10/flight-schools-still-training-people-who-pose-security-threats/2020-01-20T20:01:15-05:00weekly0.5/security-management-magazine/articles/2012/10/communicating-in-a-crisis/2020-01-20T19:41:35-05:00weekly0.5/security-management-magazine/articles/2012/10/flight-school-threat-continues/2020-01-20T19:47:58-05:00weekly0.5/security-management-magazine/articles/2012/10/changing-faces/2020-01-20T19:40:49-05:00weekly0.5/security-management-magazine/articles/2012/10/resorting-to-monitoring/2019-08-01T17:40:05-04:00weekly0.5/security-management-magazine/articles/2012/10/machine-politics/2020-01-20T19:55:49-05:00weekly0.5/security-management-magazine/articles/2012/10/protecting-against-persistent-threats/2020-01-20T19:58:48-05:00weekly0.5/security-management-magazine/articles/2012/10/museum-quality-protection/2020-11-12T16:48:15-05:00weekly0.5/security-management-magazine/articles/2012/10/online-piracy-and-protection-efforts/2020-01-20T19:57:45-05:00weekly0.5/security-management-magazine/articles/2012/10/legal-report-october-2012/2020-01-20T19:54:51-05:00weekly0.5/security-management-magazine/articles/2012/10/industry-news-october-2012/2020-11-25T17:17:21-05:00weekly0.5/security-management-magazine/articles/2012/10/rules-for-the-unruly/2020-01-20T19:59:43-05:00weekly0.5/security-management-magazine/articles/2012/10/book-review-wanted-dead-or-alive-manhunts-from-geronimo-to-bin-laden/2020-12-14T14:28:16-05:00weekly0.5/security-management-magazine/articles/2012/09/aclu-finds-explosion--doj-electronic-surveillance/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/forrester-study-highlights-insider-risks/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/lawmakers-hold-hearing-on-domestic-terrorism/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/using-twitter-to-track-disease-outbreaks/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/whistleblower-bills-would-protect-private-sector-employees/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/two-romanians-plead-quilty-to-hacking-subway-and-other-stores/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/most-u.s.-schools-missing-adequate-pandemic-response-plans/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/social-media-and-criminal-organizations/2019-08-01T17:40:06-04:00weekly0.5/security-management-magazine/articles/2012/09/transportation-security-perspective-interview-with-former-tsa-administrator-kip-hawley/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/gao-agencies-should-address-drone-security-and-privacy-concerns/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/transportation-security-perspective-interview-with-former-tsa-administrator-kip-hawley2/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/miami-police-deploy-alerting-software-at-select-schools/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/eu-launches-permanent-computer-emergency-response-team/2020-06-23T19:22:38-04:00weekly0.5/security-management-magazine/articles/2012/09/fema-releases-disaster-preparedness-video-series/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/second-sony-hacker-arrested/2019-08-01T17:40:07-04:00weekly0.5/security-management-magazine/articles/2012/09/hipaa-violations/2020-01-16T15:09:36-05:00weekly0.5/security-management-magazine/articles/2012/09/due-diligence-across-borders/2020-01-16T15:04:45-05:00weekly0.5/security-management-magazine/articles/2012/09/top-10-performing-security-industry-stocks-for-june/2020-01-13T23:13:18-05:00weekly0.5/security-management-magazine/articles/2012/09/employment-discrimination/2020-01-16T15:05:57-05:00weekly0.5/security-management-magazine/articles/2012/09/protective-operations-a-handbook-for-security-and-law-enforcement/2020-01-16T15:37:30-05:00weekly0.5/security-management-magazine/articles/2012/09/philadelphia-crime-bulletin-examples/2020-01-16T15:01:34-05:00weekly0.5/security-management-magazine/articles/2012/09/the-thorny-challenge-of-finding-inspiration/2020-01-16T15:42:45-05:00weekly0.5/security-management-magazine/articles/2012/09/industrial-network-security-securing-critical-infrastructure-networks-for-smart-grid-scada-and-other-industrial-control-syste/2020-11-25T16:55:22-05:00weekly0.5/security-management-magazine/articles/2012/09/bill-seeks-harsher-penalties-for-drug-counterfeiting/2020-01-16T14:58:49-05:00weekly0.5/security-management-magazine/articles/2012/09/court-case-pregnancy-discrimination/2020-01-16T15:03:42-05:00weekly0.5/security-management-magazine/articles/2012/09/court-case-protected-speech/2020-01-16T15:35:13-05:00weekly0.5/security-management-magazine/articles/2012/09/cfaa-and-data-theft/2020-01-16T15:02:52-05:00weekly0.5/security-management-magazine/articles/2012/09/catastrophic-disaster-planning-and-response/2020-01-16T14:56:36-05:00weekly0.5/security-management-magazine/articles/2012/09/chart-mobile-device-security/2020-01-16T14:57:02-05:00weekly0.5/security-management-magazine/articles/2012/09/comcasts-9-11-lessons/2020-01-16T14:24:50-05:00weekly0.5/security-management-magazine/articles/2012/09/fighting-crime-in-philadelphia/2020-01-16T15:07:10-05:00weekly0.5/security-management-magazine/articles/2012/09/creating-public-support-for-sars/2020-01-16T14:59:51-05:00weekly0.5/security-management-magazine/articles/2012/09/next-generation-security-awareness/2020-01-16T15:33:16-05:00weekly0.5/security-management-magazine/articles/2012/09/continuity-program-buy-in/2020-01-16T14:58:25-05:00weekly0.5/security-management-magazine/articles/2012/09/how-one-university-enhanced-cybersecurity/2020-01-16T15:22:28-05:00weekly0.5/security-management-magazine/articles/2012/09/bully-for-you/2020-01-16T14:56:44-05:00weekly0.5/security-management-magazine/articles/2012/09/fusing-intelligence-resources/2020-01-16T15:08:33-05:00weekly0.5/security-management-magazine/articles/2012/09/legal-report-september-2012/2020-01-16T15:30:21-05:00weekly0.5/security-management-magazine/articles/2012/09/industry-news-september-2012/2020-01-16T15:27:51-05:00weekly0.5/security-management-magazine/articles/2012/09/proving-securitys-value/2020-10-01T13:17:58-04:00weekly0.5/security-management-magazine/articles/2012/08/dhs-inspector-general-vipr-program-bifurcated/2019-08-01T17:40:10-04:00weekly0.5/security-management-magazine/articles/2012/08/facility-administrator-speaks-on-bioterrorism-wards-peacetime-role/2019-08-01T17:40:10-04:00weekly0.5/security-management-magazine/articles/2012/08/device-could-allow-cell-phones-to-detect-bioagents/2019-08-01T17:40:10-04:00weekly0.5/security-management-magazine/articles/2012/08/hospital-bioterrorism-unit-serves-as-a-tuberculosis-ward/2019-08-01T17:40:10-04:00weekly0.5/security-management-magazine/articles/2012/08/eu-reports-an-increase-in-counterfeiting/2019-08-01T17:40:11-04:00weekly0.5/security-management-magazine/articles/2012/08/tsa-officers-ordered-to-undergo-training-after-racial-profiling-accusations/2019-08-01T17:40:11-04:00weekly0.5/security-management-magazine/articles/2012/08/police-chiefs-adopt-guidelines-for-unmanned-aerial-vehicles/2019-08-01T17:42:17-04:00weekly0.5/security-management-magazine/articles/2012/08/managers-think-it-still-takes-too-long-to-get-security-clearances/2019-08-01T17:42:17-04:00weekly0.5/security-management-magazine/articles/2012/08/google-algorithm-tweak-to-punish-pirates/2019-08-01T17:42:17-04:00weekly0.5/security-management-magazine/articles/2012/08/researchers-say-fukushima-workers-have-ptsd-symptoms/2019-08-01T17:42:17-04:00weekly0.5/security-management-magazine/articles/2012/08/fbi-white-extremists-dont-have-the-organization-to-launch-suicide-attacks/2020-10-02T16:25:52-04:00weekly0.5/security-management-magazine/articles/2012/08/researchers-offer-new-solution-to-active-shooter-mitigation/2019-08-01T17:42:17-04:00weekly0.5/security-management-magazine/articles/2012/08/ransomware-holds-computers-hostage-demands-payment/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/phishing-e-mails-spoof-payroll-services/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/pennsylvania-provides-free-potassium-iodide-for-residents-near-nuclear-power-plants/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/trends-in-terrorism-targets/2020-01-14T20:18:10-05:00weekly0.5/security-management-magazine/articles/2012/08/operation-medicine-delivery-after-action-report/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/dod-random-lie-detector-tests-increase-personnel-security/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/new-bill-would-limit-criminal-background-checks/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/city-of-houstons-active-shooter-psa-goes-viral/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/network-monitoring-could-help-detect-state-sponsored-cyberattacks/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/two-california-men-sentenced-to-atm-fraud/2019-08-01T17:42:18-04:00weekly0.5/security-management-magazine/articles/2012/08/court-case-encrypted-data-and-governmental-access/2020-01-16T16:56:13-05:00weekly0.5/security-management-magazine/articles/2012/08/top-10-performing-security-industry-stocks-for-may/2020-01-14T20:13:06-05:00weekly0.5/security-management-magazine/articles/2012/08/whistleblower-protection-bill-moves-forward/2020-01-17T11:06:03-05:00weekly0.5/security-management-magazine/articles/2012/08/port-security-management/2020-01-17T10:46:18-05:00weekly0.5/security-management-magazine/articles/2012/08/pick-up-your-own-brass-leadership-the-fbi-way/2020-01-17T10:44:30-05:00weekly0.5/security-management-magazine/articles/2012/08/keeping-staff-problems-in-perspective/2020-01-16T17:10:51-05:00weekly0.5/security-management-magazine/articles/2012/08/social-media-privacy/2020-01-17T10:56:25-05:00weekly0.5/security-management-magazine/articles/2012/08/case-study-loss-prevention-at-stew-leonards-farm-fresh-foods/2019-08-01T17:42:19-04:00weekly0.5/security-management-magazine/articles/2012/08/hard-lessons/2020-01-16T16:58:22-05:00weekly0.5/security-management-magazine/articles/2012/08/study-on-password-use/2020-01-16T16:53:25-05:00weekly0.5/security-management-magazine/articles/2012/08/court-case-the-ada-and-workplace-safety/2020-01-16T16:49:05-05:00weekly0.5/security-management-magazine/articles/2012/08/the-quiet-threat-fighting-industrial-espionage-in-america/2020-01-17T10:47:51-05:00weekly0.5/security-management-magazine/articles/2012/08/medical-marijuana-discrimination-not-covered-by-ada/2020-01-17T10:40:07-05:00weekly0.5/security-management-magazine/articles/2012/08/terrorism/2020-01-17T11:00:29-05:00weekly0.5/security-management-magazine/articles/2012/08/chart-differences-in-it-threat-perceptions---united-states-vs.-germany/2020-01-16T16:51:31-05:00weekly0.5/security-management-magazine/articles/2012/08/the-trouble-with-crime-statistics/2020-02-25T17:03:17-05:00weekly0.5/security-management-magazine/articles/2012/08/hold-on-to-your-code/2020-01-16T16:59:17-05:00weekly0.5/security-management-magazine/articles/2012/08/one-stop-shop-for-counterterrorists/2020-01-14T19:17:24-05:00weekly0.5/security-management-magazine/articles/2012/08/a-wrinkle-in-time/2020-01-16T16:50:25-05:00weekly0.5/security-management-magazine/articles/2012/08/trends-in-terrorism-targets2/2019-08-01T17:42:20-04:00weekly0.5/security-management-magazine/articles/2012/08/screen-scraping-security/2020-01-14T19:47:55-05:00weekly0.5/security-management-magazine/articles/2012/08/study-highlights-infrastructure-risks/2020-01-17T10:58:16-05:00weekly0.5/security-management-magazine/articles/2012/08/just-compensation/2020-02-25T17:33:59-05:00weekly0.5/security-management-magazine/articles/2012/08/random-acts-of-protection/2020-01-17T10:51:29-05:00weekly0.5/security-management-magazine/articles/2012/08/legal-report-august-2012/2020-01-16T17:21:33-05:00weekly0.5/security-management-magazine/articles/2012/08/industry-news-august-2012/2020-01-16T17:01:31-05:00weekly0.5/security-management-magazine/articles/2012/08/romancing-the-workplace/2020-08-11T10:46:27-04:00weekly0.5/security-management-magazine/articles/2012/07/every-man-for-himself-research-says-women-and-children-less-likely-to-survive-a-shipwreck/2019-08-01T17:42:21-04:00weekly0.5/security-management-magazine/articles/2012/07/gao-urges-better-food-recall-efforts/2019-08-01T17:42:21-04:00weekly0.5/security-management-magazine/articles/2012/07/airline-security/2019-08-01T17:42:21-04:00weekly0.5/security-management-magazine/articles/2012/07/man-who-snooped-on-wifes-e-mails-cleared-of-cybercrime-charges/2019-08-01T17:42:21-04:00weekly0.5/security-management-magazine/articles/2012/07/report-sex-offenders-hide-identities-to-circumvent-parole-rules/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/black-tea-could-defend-against-ricin/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/russian-arrested-for-botnet-attack-on-amazon/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/lawmaker-says-maryland-schools-should-be-able-to-afford-epinephrine/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/cybersecurity-legislation-revised-in-light-of-opposition/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/legislation-falls-short-maryland-department-of-education-to-mandate-schools-buy-their-own-epinephrine/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/yahoo-fixes-security-vulnerability/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/agencies-release-guidance-mass-casualty-events/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/drug-shortages-push-first-responders-to-use-expired-meds/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/ice-seizes-70-counterfeit-web-sites/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/usda-makes-it-easier-for-farmers-to-get-emergency-funds-after-disasters/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/report-cybersecurity-market-to-almost-double-in-five-years/2019-08-01T17:42:22-04:00weekly0.5/security-management-magazine/articles/2012/07/danish-anthrax-death-may-be-linked-to-tainted-heroin/2019-08-01T17:42:23-04:00weekly0.5/security-management-magazine/articles/2012/07/australia-releases-draft-of-new-biosecurity-legislation/2019-08-01T17:42:23-04:00weekly0.5/security-management-magazine/articles/2012/07/dhs-doesnt-know-why-cikr-stakeholders-dont-participate-in-voluntary-security-assessments/2019-08-01T17:42:23-04:00weekly0.5/security-management-magazine/articles/2012/07/court-rules-bank-may-be-negligent-for-fraudulent-transactions/2019-08-01T17:42:23-04:00weekly0.5/security-management-magazine/articles/2012/07/auvsi-releases-uav-code-of-conduct/2019-08-01T17:42:23-04:00weekly0.5/security-management-magazine/articles/2012/07/top-10-performing-security-industry-stocks-for-may/2020-01-22T15:09:02-05:00weekly0.5/security-management-magazine/articles/2012/07/solving-the-interoperability-riddle/2020-01-22T14:59:32-05:00weekly0.5/security-management-magazine/articles/2012/07/california-dna-law-upheld/2020-01-24T13:29:47-05:00weekly0.5/security-management-magazine/articles/2012/07/court-case-company-can-be-held-liable-for-blog-posts/2020-01-24T13:34:30-05:00weekly0.5/security-management-magazine/articles/2012/07/cybersecurity-femas-2012-preparedness-report/2020-01-24T13:12:28-05:00weekly0.5/security-management-magazine/articles/2012/07/court-case-employee-did-not-violate-cfaa/2020-01-24T13:12:57-05:00weekly0.5/security-management-magazine/articles/2012/07/dhs-reorganization/2020-01-24T13:24:25-05:00weekly0.5/security-management-magazine/articles/2012/07/florida-law-requires-drug-testing-of-state-employees/2020-01-22T13:24:36-05:00weekly0.5/security-management-magazine/articles/2012/07/chart-cyber-risk-control-practices-of-top-management/2020-01-24T13:10:21-05:00weekly0.5/security-management-magazine/articles/2012/07/privately-held-company-not-covered-by-sarbanes-oxley/2020-01-24T13:43:49-05:00weekly0.5/security-management-magazine/articles/2012/07/complacency-over-cyberthreat-decried/2020-01-24T13:11:29-05:00weekly0.5/security-management-magazine/articles/2012/07/dealing-with-emerging-threats/2020-01-24T13:20:45-05:00weekly0.5/security-management-magazine/articles/2012/07/the-state-of-piracy/2020-01-24T13:42:04-05:00weekly0.5/security-management-magazine/articles/2012/07/flagging-fraud/2020-01-24T13:32:57-05:00weekly0.5/security-management-magazine/articles/2012/07/encryption-critical-in-healthcare/2020-01-22T14:28:57-05:00weekly0.5/security-management-magazine/articles/2012/07/eu-data-security-rules/2020-01-22T14:32:49-05:00weekly0.5/security-management-magazine/articles/2012/07/securing-high-risk-hotels2/2020-10-23T15:20:13-04:00weekly0.5/security-management-magazine/articles/2012/07/a-monumental-task/2020-01-24T13:09:41-05:00weekly0.5/security-management-magazine/articles/2012/07/defending-against-the-nuclear-threat/2020-01-24T13:22:51-05:00weekly0.5/security-management-magazine/articles/2012/07/intruders-taught-lesson/2020-01-22T14:47:15-05:00weekly0.5/security-management-magazine/articles/2012/07/legal-report-july-2012/2020-01-24T13:38:13-05:00weekly0.5/security-management-magazine/articles/2012/07/industry-news-july-2012/2020-01-24T13:36:12-05:00weekly0.5/security-management-magazine/articles/2012/06/veterinarian-warns-of-summer-anthrax/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/ftc-files-suit-against-wyndham-for-breaches/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/cdc-salmonella-outbreak-could-continue-for-months/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/lawmakers-call-for-caribbean-counternarcotics-strategy/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/man-charged-with-hacking-doe-network/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/safecast-uses-kickstarter-to-fund-citizens-geiger-counter/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/dutch-man-accused-of-marketing-stolen-credit-card-data/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/employee-need-not-be-aware-of-hipaa-to-be-guilty/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/tsa-coast-guard-to-ease-burden-of-twic-holders/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/linkedin-had-strengthened-protection-of-leaked-passwords/2019-08-01T17:42:25-04:00weekly0.5/security-management-magazine/articles/2012/06/hacker-working-to-warn-airlines-about-network-security-vulnerabilities/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/us-securitys-expanded-presence-at-airports-abroad/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/app-locating-friends-after-a-disaster-goes-live-on-facebook/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/us-supreme-court-refuses-to-hear-guantanamo-bay-cases/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/googles-new-hacking-alert-raises-questions-from-users/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/new-report-examines-resiliency-of-u.s.-transportation-systems/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/this-is-how-easy-it-is-to-get-your-password-stolen-online/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/eharmony-user-passwords-exposed/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/securing-a-sanctuary/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/nlrb-provides-advice-on-social-media-policies/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/industry-lawmaker-question-tsa-surface-transportation-security-programs/2019-08-01T17:42:26-04:00weekly0.5/security-management-magazine/articles/2012/06/mission-based-policing/2020-02-04T11:28:52-05:00weekly0.5/security-management-magazine/articles/2012/06/security-management-for-sports-and-special-events/2020-02-04T11:35:17-05:00weekly0.5/security-management-magazine/articles/2012/06/supply-chain-security/2020-02-04T11:36:32-05:00weekly0.5/security-management-magazine/articles/2012/06/court-case-vicarious-liability/2020-02-04T11:38:35-05:00weekly0.5/security-management-magazine/articles/2012/06/s.-201-would-establish-9-11-related-healthcare-grants/2020-02-04T10:59:01-05:00weekly0.5/security-management-magazine/articles/2012/06/criminal-interrogation-and-confessions/2020-02-04T11:20:40-05:00weekly0.5/security-management-magazine/articles/2012/06/court-case-ada-and-sick-leave/2020-02-04T11:02:16-05:00weekly0.5/security-management-magazine/articles/2012/06/court-case-ada-and-attendance-policies/2020-01-28T12:42:40-05:00weekly0.5/security-management-magazine/articles/2012/06/court-case-making-a-case-for-travel-watch-list-exclusion/2020-02-04T11:40:18-05:00weekly0.5/security-management-magazine/articles/2012/06/behind-the-numbers/2020-02-04T11:07:57-05:00weekly0.5/security-management-magazine/articles/2012/06/federal-trespassing-laws/2020-02-04T11:37:51-05:00weekly0.5/security-management-magazine/articles/2012/06/whistleblower-amendments/2020-02-04T11:41:25-05:00weekly0.5/security-management-magazine/articles/2012/06/chart-types-of-data-breaches/2020-02-04T11:12:10-05:00weekly0.5/security-management-magazine/articles/2012/06/catching-counterfeiters/2020-01-28T13:13:48-05:00weekly0.5/security-management-magazine/articles/2012/06/terrorists-and-social-media/2020-02-04T11:37:20-05:00weekly0.5/security-management-magazine/articles/2012/06/securing-a-sanctuary2/2020-02-12T17:05:58-05:00weekly0.5/security-management-magazine/articles/2012/06/nigerias-security-challenges/2020-01-28T15:06:10-05:00weekly0.5/security-management-magazine/articles/2012/06/networking-sites-assist-investigations/2020-01-28T15:00:10-05:00weekly0.5/security-management-magazine/articles/2012/06/consolidating-authorization/2020-01-28T13:24:24-05:00weekly0.5/security-management-magazine/articles/2012/06/full-body-scanning-report/2020-02-04T11:23:19-05:00weekly0.5/security-management-magazine/articles/2012/06/avoid-harassment-headaches/2020-02-04T11:05:18-05:00weekly0.5/security-management-magazine/articles/2012/06/developing-a-cybersecurity-staff/2020-02-04T11:21:21-05:00weekly0.5/security-management-magazine/articles/2012/06/legal-report-june-2012/2020-02-04T11:27:51-05:00weekly0.5/security-management-magazine/articles/2012/06/industry-news-june-2012/2020-02-04T11:26:40-05:00weekly0.5/security-management-magazine/articles/2012/06/security-audit-secrets/2020-10-05T16:54:50-04:00weekly0.5/security-management-magazine/articles/2012/05/newly-discovered-malware-considered-especially-sophisticated/2019-08-01T17:42:28-04:00weekly0.5/security-management-magazine/articles/2012/05/denver-fbi-warns-of-jihadist-threat/2019-08-01T17:42:28-04:00weekly0.5/security-management-magazine/articles/2012/05/maryland-requires-schools-to-stock-epinephrine-for-emergency-use/2019-08-01T17:42:28-04:00weekly0.5/security-management-magazine/articles/2012/05/report-biometric-data-being-collected-with-little-to-no-standards-oversight-or-transparency/2019-08-01T17:42:28-04:00weekly0.5/security-management-magazine/articles/2012/05/clandestine-art-courier-helped-bin-laden-stay-hidden/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/leading-figure-in-major-international-phishing-operation-sentenced/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/most-men-arrested-test-positive-for-drugs/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/auvsi-talks-faa-progress-toward-uas-integration/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/forrester-report-touts-next-generation-firewalls-greater-network-visibility/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/when-did-you-last-clean-out-your-mental-closet/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/acta-referred-to-eu-high-court/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/a-clear-view-of-liability/2019-08-01T17:42:29-04:00weekly0.5/security-management-magazine/articles/2012/05/bomb-sniffing-dogs/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/house-passes-appropriations-bill-blocks-certain-programs/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/fbi-publishes-tips-to-recognize-the-company-mole/2020-02-25T17:37:50-05:00weekly0.5/security-management-magazine/articles/2012/05/myspace-settles-with-ftc-over-shady-pre-acquisition-advertising-practices/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/transitioning-technologies-for-use-by-first-responders/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/operation-medicine-delivery-shows-postal-option-is-a-viable-way-to-get-medicine-to-the-public/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/social-media-restrictions-on-the-rise-facebook-use-at-work-on-the-decline/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/weekend-exercise-will-measure-usps-anthrax-response-time/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/2011-internet-crime-report-released/2019-08-01T17:42:30-04:00weekly0.5/security-management-magazine/articles/2012/05/dhs-announces-rick-rescorla-national-award-for-resilience/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/house-passes-controversial-cyber-threat-info-sharing-bill/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/asis-international-introduces-worlds-first-standard-support-code-and-conduct-for-private-security-serivices/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/maritime-security-provider-calls-for-inquiry-into-viral-video/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/tsa-announces-new-id-scanners-expert-questions-past-practices/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/truman-project-releases-national-security-manual/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/aussies-consider-date-of-birth-on-guard-ids-excessive-personal-information/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/report-evidence-doesnt-support-uc-davis-claims-of-outside-actors-in-protests/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/panel-discusses-steps-to-improving-public-private-collaboration-to-secure-air-cargo/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/force-science-institute-examines-traffic-stop-safety/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/nonprofit-tax-returns-provide-a-gold-mine-of-exposed-ssns/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/a-model-of-intelligence-sharing/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/asis-international-releases-organizational-resilience-maturity-model-ansi-standard/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/most-multiple-victim-campus-shootings-perpetrated-by-current-or-former-grad-students/2019-08-01T17:42:31-04:00weekly0.5/security-management-magazine/articles/2012/04/id-verification-remains-a-vulnerability-for-airports/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/afternoon-security-brief-license-plate-scanners-uk-electronic-monitoring-legislation-new-mac-virus-seen-in-the-wild-and-more/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/judge-overturns-fine-against-virginia-tech-for-mass-notification-delay-in-2007-shooting/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/bill-would-make-unemployment-discrimination-illegal/2020-02-04T09:45:56-05:00weekly0.5/security-management-magazine/articles/2012/04/industry--asis-news/2020-02-04T10:02:39-05:00weekly0.5/security-management-magazine/articles/2012/04/isc-west-product-showcase/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/silent-safety-best-practices-for-protecting-the-affluent/2020-02-04T10:31:14-05:00weekly0.5/security-management-magazine/articles/2012/04/social-networking-security/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/court-case-invasion-of-privacy/2020-02-04T10:16:21-05:00weekly0.5/security-management-magazine/articles/2012/04/court-case-gps-tracking-to-verify-time-sheets/2020-02-04T09:51:32-05:00weekly0.5/security-management-magazine/articles/2012/04/computer-security-handbook-volumes-1--2-5th-edition/2020-02-03T11:49:26-05:00weekly0.5/security-management-magazine/articles/2012/04/a-model-of-intelligence-sharing2/2020-02-03T10:11:27-05:00weekly0.5/security-management-magazine/articles/2012/04/border-security-program-extended/2020-02-03T10:16:06-05:00weekly0.5/security-management-magazine/articles/2012/04/building-a-tenuous-trust/2019-08-01T17:42:32-04:00weekly0.5/security-management-magazine/articles/2012/04/the-day-wall-street-exploded-a-story-of-america-in-its-first-age-of-terror/2020-02-03T11:57:27-05:00weekly0.5/security-management-magazine/articles/2012/04/a-model-of-intelligence-sharing3/2019-08-01T17:42:33-04:00weekly0.5/security-management-magazine/articles/2012/04/capturing-jonathan-pollard-how-one-of-the-most-notorious-spies-in-american-history-was-brought-to-justice/2020-02-03T10:25:48-05:00weekly0.5/security-management-magazine/articles/2012/04/court-case-no-false-imprisonment-claim-for-prank-victim/2020-02-04T09:48:46-05:00weekly0.5/security-management-magazine/articles/2012/04/chart-how-companies-respond-to-data-breaches/2020-02-03T11:44:43-05:00weekly0.5/security-management-magazine/articles/2012/04/studying-abroad-securely/2020-02-04T10:35:56-05:00weekly0.5/security-management-magazine/articles/2012/04/measuring-effectiveness-in-counterinsurgency/2020-02-04T10:13:24-05:00weekly0.5/security-management-magazine/articles/2012/04/building-a-tenuous-trust2/2020-02-03T10:20:12-05:00weekly0.5/security-management-magazine/articles/2012/04/training-thats-on-target/2020-02-04T10:47:11-05:00weekly0.5/security-management-magazine/articles/2012/04/social-networking-security2/2020-02-04T10:30:22-05:00weekly0.5/security-management-magazine/articles/2012/04/teaming-up-on-loss-prevention/2020-02-04T10:42:05-05:00weekly0.5/security-management-magazine/articles/2012/04/create-an-anti-fraud-corps/2020-02-03T11:53:07-05:00weekly0.5/security-management-magazine/articles/2012/04/legal-report-april-2012/2020-02-04T10:07:48-05:00weekly0.5/security-management-magazine/articles/2012/04/visitor-management/2020-02-04T10:51:37-05:00weekly0.5/security-management-magazine/articles/2012/04/holding-individuals-accountable/2020-02-03T10:02:57-05:00weekly0.5/security-management-magazine/articles/2012/03/organizations-should-emphasize-basic-security-measures-according-to-verizon-report/2019-08-01T17:42:34-04:00weekly0.5/security-management-magazine/articles/2012/03/can-employers-legally-request-facebook-passwords/2019-08-01T17:42:34-04:00weekly0.5/security-management-magazine/articles/2012/03/house-committee-members-request-audit-of-full-body-scanners/2020-10-05T16:56:28-04:00weekly0.5/security-management-magazine/articles/2012/03/report-billions-of-dollars-worth-of-smartphones-lost-annually/2019-08-01T17:42:34-04:00weekly0.5/security-management-magazine/articles/2012/03/test-run-of-postal-service-anthrax-response-teams-scheduled-for-may/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/military-strike-on-iran-would-have-little-impact-on-its-nuclear-weapon-capability/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/blurring-military-and-police-roles/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/may-be-coincidence-military-spokesman-says-of-airfield-breach-in-afghanistan/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/cdc-smartphones-could-increase-disease-surveillance-in-developing-countries/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/former-secretary-of-defense-robert-m.-gates-to-keynote-asis-2012/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/interview-with-start-director-gary-lefree/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/dont-touch-that-dial-considerations-when-using-satphones-in-conflict-zones/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/states-continue-cleanup-after-tornado-outbreak/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/researchers-hope-lessons-learned-in-second-intifada-will-open-dialogue-about-u.s.-transit-security/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/researchers-hope-lessons-learned-in-second-intifada-will-open-dialogue-about-u.s2.-transit-security/2019-08-01T17:42:35-04:00weekly0.5/security-management-magazine/articles/2012/03/new-law-addresses-port-security-inconsistencies/2020-01-31T13:51:51-05:00weekly0.5/security-management-magazine/articles/2012/03/cruise-ship-security/2020-01-30T14:49:16-05:00weekly0.5/security-management-magazine/articles/2012/03/harsher-penalties-for-trespassing-on-select-federal-properties/2020-01-31T14:00:34-05:00weekly0.5/security-management-magazine/articles/2012/03/due-diligence-for-the-financial-professional/2020-01-31T12:45:13-05:00weekly0.5/security-management-magazine/articles/2012/03/federal-suitability-and-security-clearances-issue-mitigation-handbook/2020-01-31T12:57:18-05:00weekly0.5/security-management-magazine/articles/2012/03/fighting-butterfly-effects-with-starfish-resilience/2020-01-31T13:02:59-05:00weekly0.5/security-management-magazine/articles/2012/03/court-case-company-not-guilty-of-age-discrimination/2020-01-31T12:49:37-05:00weekly0.5/security-management-magazine/articles/2012/03/behind-the-numbers-ramifications-of-cyberattacks/2020-01-30T14:35:27-05:00weekly0.5/security-management-magazine/articles/2012/03/court-case-parents-may-pursue-excessive-force-lawsuit/2020-01-31T12:52:29-05:00weekly0.5/security-management-magazine/articles/2012/03/dna-data-has-new-standards/2020-01-31T12:40:29-05:00weekly0.5/security-management-magazine/articles/2012/03/gps-tracking-limits/2020-01-31T13:12:27-05:00weekly0.5/security-management-magazine/articles/2012/03/pbs-pushes-next-gen-emergency-alerts/2020-01-31T13:39:47-05:00weekly0.5/security-management-magazine/articles/2012/03/security-goes-underground/2020-01-31T13:57:34-05:00weekly0.5/security-management-magazine/articles/2012/03/fighting-corruption/2020-01-31T13:07:58-05:00weekly0.5/security-management-magazine/articles/2012/03/dial-o-for-an-open-door/2020-01-30T14:52:59-05:00weekly0.5/security-management-magazine/articles/2012/03/planning-for-disaster/2020-01-31T13:48:59-05:00weekly0.5/security-management-magazine/articles/2012/03/cruise-control-at-sea/2020-01-30T14:44:54-05:00weekly0.5/security-management-magazine/articles/2012/03/a-clear-view-of-liability/2020-02-26T10:46:35-05:00weekly0.5/security-management-magazine/articles/2012/03/legal-report-march-2012/2020-01-31T13:34:38-05:00weekly0.5/security-management-magazine/articles/2012/03/industry-news-march-2012/2020-01-31T13:15:52-05:00weekly0.5/security-management-magazine/articles/2012/03/warning-of-workplace-violence/2020-01-31T14:06:02-05:00weekly0.5/security-management-magazine/articles/2012/02/social-media-and-the-workplace/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/identity-theft-the-number-one-consumer-complaint-in-2011/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/fbi-releases-financial-crimes-report/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/pew-data-shows-increased-concern-for-privacy-online/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/confession-details-how-boko-haram-uses-stolen-cars-to-support-terrorism-operations/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/black-box-data-could-vindicate-or-condemn-italian-security-maritime-shooting/2019-08-01T17:42:37-04:00weekly0.5/security-management-magazine/articles/2012/02/adt-develops-mini-emp-fight-bank-card-skimming/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/psychologist-mental-first-aid-should-be-incorporated-into-resilience-plans/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/expert-u.s.-must-modernize-cyber-defense-strategy/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/urban-area-perspective-tuscaloosa/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/lawmakers-battle-over-expanding-privatized-screening-at-airports/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/former-dhs-official-recommends-reorganizing-the-department/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/u.s.-no-fly-list-doubles-in-one-year/2019-08-01T17:42:38-04:00weekly0.5/security-management-magazine/articles/2012/02/port-authority-immune-from-liability-for-1993-wtc-bombing/2020-01-30T13:34:56-05:00weekly0.5/security-management-magazine/articles/2012/02/court-case-invasion-of-privacy/2020-01-30T13:37:54-05:00weekly0.5/security-management-magazine/articles/2012/02/bill-would-authorize-grants-for-anonymous-tip-programs/2020-01-29T10:56:25-05:00weekly0.5/security-management-magazine/articles/2012/02/broker-trader-lawyer-spy-the-secret-world-of-corporate-espionage/2020-01-29T10:39:07-05:00weekly0.5/security-management-magazine/articles/2012/02/cybersecurity-maryland-law-creates-task-force/2020-01-29T11:00:29-05:00weekly0.5/security-management-magazine/articles/2012/02/can-isps-help-beat-botnets/2020-01-29T10:44:58-05:00weekly0.5/security-management-magazine/articles/2012/02/chart-how-companies-protect-sensitive-information/2020-01-29T10:50:42-05:00weekly0.5/security-management-magazine/articles/2012/02/court-case-subcontractor-responsible-for-accidental-death/2020-01-29T11:06:12-05:00weekly0.5/security-management-magazine/articles/2012/02/new-law-may-provide-tax-credits-for-hiring-veterans/2020-01-29T11:13:00-05:00weekly0.5/security-management-magazine/articles/2012/02/travel-documentation-laws/2020-01-29T11:03:45-05:00weekly0.5/security-management-magazine/articles/2012/02/hospitals-and-guns/2020-01-29T11:17:12-05:00weekly0.5/security-management-magazine/articles/2012/02/gangs-in-the-military/2020-01-29T11:10:07-05:00weekly0.5/security-management-magazine/articles/2012/02/sun-cycle-threatens-electric-grid/2020-01-30T13:58:47-05:00weekly0.5/security-management-magazine/articles/2012/02/keying-into-better-control/2020-01-29T11:30:40-05:00weekly0.5/security-management-magazine/articles/2012/02/return-of-the-troubles/2020-01-30T13:42:46-05:00weekly0.5/security-management-magazine/articles/2012/02/interrupting-the-wash-cycle/2020-01-29T11:26:46-05:00weekly0.5/security-management-magazine/articles/2012/02/the-new-highwaymen/2020-01-30T14:06:24-05:00weekly0.5/security-management-magazine/articles/2012/02/social-media-and-the-workplace2/2020-01-30T13:53:49-05:00weekly0.5/security-management-magazine/articles/2012/02/legal-report-february-2012/2020-01-29T10:33:17-05:00weekly0.5/security-management-magazine/articles/2012/02/industry-news-february-2012/2020-01-29T11:21:14-05:00weekly0.5/security-management-magazine/articles/2012/02/risk-management-the-right-way/2020-01-30T13:46:34-05:00weekly0.5/security-management-magazine/articles/2012/01/hhs-lists-top-disaster-apps-for-first-responders-and-the-public/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/the-pineapple-express-hak5-builds-a-bigger-better-wifi-honey-pot/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/dhs-announces-national-strategy-for-global-supply-chain-security/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/researcher-reports-a-surge-in-social-media-use-by-subversive-groups/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/nypd-developing-body-scanners-to-detect-weapons-but-application-may-still-be-years-away/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/occupiers-capitol-police-make-security-a-priority-during-occupy-congress/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/congresswoman-calls-for-upgrades-to-womens-facilities-in-fire-stations/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/charlotte-proposes-ordinances-to-enhance-security-during-dnc/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/cravaacks-office-says-new-airport-security-rules-for-military-shouldnt-mean-reduced-screening/2019-08-01T17:42:41-04:00weekly0.5/security-management-magazine/articles/2012/01/u.s.-government-asks-science-journals-to-redact-flu-research/2019-08-01T17:42:42-04:00weekly0.5/security-management-magazine/articles/2012/01/california-law-limits-use-of-credit-checks/2020-01-27T12:13:17-05:00weekly0.5/security-management-magazine/articles/2012/01/fires-.-.-.-accidental-or-arson-fire-investigations/2020-01-27T12:18:42-05:00weekly0.5/security-management-magazine/articles/2012/01/hacking-exposed-wireless-security-secrets--solutions/2020-01-27T13:10:52-05:00weekly0.5/security-management-magazine/articles/2012/01/emergency-communications/2020-01-27T12:08:44-05:00weekly0.5/security-management-magazine/articles/2012/01/active-shooter-training-for-military-base-security/2020-01-28T12:07:46-05:00weekly0.5/security-management-magazine/articles/2012/01/ranking-of-cloud-security-measures/2020-01-28T11:41:52-05:00weekly0.5/security-management-magazine/articles/2012/01/court-case-hostile-work-environment/2020-01-27T13:24:17-05:00weekly0.5/security-management-magazine/articles/2012/01/a-worldwide-perspective/2019-08-01T17:42:42-04:00weekly0.5/security-management-magazine/articles/2012/01/maine-prohibits-biometrics-in-state-ids/2020-01-27T12:05:10-05:00weekly0.5/security-management-magazine/articles/2012/01/homeland-security-best-practices-for-local-government-2nd-edition/2020-01-27T13:18:22-05:00weekly0.5/security-management-magazine/articles/2012/01/social-media-and-free-speech/2020-01-28T11:48:24-05:00weekly0.5/security-management-magazine/articles/2012/01/tasers-and-unreasonable-force/2020-01-28T11:53:52-05:00weekly0.5/security-management-magazine/articles/2012/01/bill-seeks-to-alter-twic-application-and-distribution-process/2020-01-28T12:14:16-05:00weekly0.5/security-management-magazine/articles/2012/01/failure-to-return-employee-calls-sufficient-for-retaliation-case/2020-01-28T11:45:49-05:00weekly0.5/security-management-magazine/articles/2012/01/witness-history/2020-01-29T10:14:41-05:00weekly0.5/security-management-magazine/articles/2012/01/transparency-in-numbers/2020-01-28T12:11:20-05:00weekly0.5/security-management-magazine/articles/2012/01/tripping-up-terrorists/2020-01-29T10:04:45-05:00weekly0.5/security-management-magazine/articles/2012/01/monitoring-employee-web-activity/2020-01-27T13:39:59-05:00weekly0.5/security-management-magazine/articles/2012/01/u.s.-europe-privacy-practices/2020-01-29T10:10:12-05:00weekly0.5/security-management-magazine/articles/2012/01/firms-flock-to-managed-services/2020-01-27T12:24:01-05:00weekly0.5/security-management-magazine/articles/2012/01/the-mark-center-makes-its-mark/2020-05-08T14:26:52-04:00weekly0.5/security-management-magazine/articles/2012/01/a-worldwide-perspective2/2020-01-27T12:00:32-05:00weekly0.5/security-management-magazine/articles/2012/01/accidents-will-happen/2020-01-27T11:52:20-05:00weekly0.5/security-management-magazine/articles/2012/01/legal-report-january-2012/2020-01-27T13:34:55-05:00weekly0.5/security-management-magazine/articles/2012/01/industry-news-january-2012/2020-01-27T13:31:27-05:00weekly0.5/security-management-magazine/articles/2012/01/mastering-project-management/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/survey-many-people-know-about-workplace-misconduct-and-are-willing-to-report-it----for-money/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/dhs-reports-almost-200-explosive-device-incidents-in-october/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/worth-a-look-camcam/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/police-release-name-of-officer-killed-at-virginia-tech/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/rep-king-the-u.s.-military-is-being-infiltrated-by-al-qaeda/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/chemm-ist-to-help-first-responders-diagnose-chemical-exposure/2019-08-01T17:42:44-04:00weekly0.5/security-management-magazine/articles/2011/12/the-assessment-center-handbook-for-police-and-fire-personnel/2019-12-16T17:27:13-05:00weekly0.5/security-management-magazine/articles/2011/12/californias-data-breach-laws-strengthened/2019-12-17T10:13:23-05:00weekly0.5/security-management-magazine/articles/2011/12/medical-marijuana-in-the-workplace/2019-12-17T10:42:33-05:00weekly0.5/security-management-magazine/articles/2011/12/bill-seeks-to-amend-patriot-act/2019-12-17T12:25:52-05:00weekly0.5/security-management-magazine/articles/2011/12/negligent-security/2019-08-01T17:42:45-04:00weekly0.5/security-management-magazine/articles/2011/12/chart-sources-of-corporate-data-breaches/2019-12-16T17:47:49-05:00weekly0.5/security-management-magazine/articles/2011/12/calling-all-protestors/2019-12-16T17:26:51-05:00weekly0.5/security-management-magazine/articles/2011/12/immunizing-tipsters/2019-12-17T10:30:14-05:00weekly0.5/security-management-magazine/articles/2011/12/fusing-to-fight-copper-thefts/2019-12-17T10:27:06-05:00weekly0.5/security-management-magazine/articles/2011/12/tracking-data-use/2019-12-17T13:42:12-05:00weekly0.5/security-management-magazine/articles/2011/12/legal-report-december-2011/2019-12-17T10:37:55-05:00weekly0.5/security-management-magazine/articles/2011/12/experts-share-compliance-tactics/2019-12-17T10:19:32-05:00weekly0.5/security-management-magazine/articles/2011/12/north-by-northwest/2019-12-17T13:32:01-05:00weekly0.5/security-management-magazine/articles/2011/12/checking-out-security-solutions/2019-12-17T10:04:32-05:00weekly0.5/security-management-magazine/articles/2011/12/industry-news-december-2011/2019-12-17T10:34:04-05:00weekly0.5/security-management-magazine/articles/2011/12/new-disability-rules/2019-12-17T13:23:43-05:00weekly0.5/security-management-magazine/articles/2011/12/corralling-corruption-in-the-eu/2019-12-17T10:09:12-05:00weekly0.5/security-management-magazine/articles/2011/11/firefighters-say-illegal-immigrants-in-border-areas-keep-them-from-fighting-fires/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/fema-says-alert-system-test-yielded-positive-unexpected-results/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/fema-promotes-innovation-in-emergency-management/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/did-the-emergency-alert-system-fail-its-first-test/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/bipartisan-group-produces-crash-course-on-nuclear-threatscountermeasures/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/when-ricin-exposure-happens-its-no-accident/2019-08-01T17:42:46-04:00weekly0.5/security-management-magazine/articles/2011/11/animal-rights-extremists-target-medical-students/2019-10-16T09:10:29-04:00weekly0.5/security-management-magazine/articles/2011/11/fda-releases-safety-plan-for-imported-food/2019-12-18T12:34:52-05:00weekly0.5/security-management-magazine/articles/2011/11/cross-training-for-first-responders/2019-12-17T14:10:19-05:00weekly0.5/security-management-magazine/articles/2011/11/animal-rights-extremists-soft-targets/2019-12-17T13:55:40-05:00weekly0.5/security-management-magazine/articles/2011/11/court-case-prison-searches-did-not-violate-fourth-amendment/2019-12-18T14:06:47-05:00weekly0.5/security-management-magazine/articles/2011/11/connecticut-law-bans-credit-reports/2019-12-17T14:00:27-05:00weekly0.5/security-management-magazine/articles/2011/11/tortured-us-citizens-may-proceed-with-lawsuit/2019-12-18T14:24:54-05:00weekly0.5/security-management-magazine/articles/2011/11/court-case-airport-security-fees/2019-12-17T13:50:58-05:00weekly0.5/security-management-magazine/articles/2011/11/ingredients-for-better-imports/2019-12-18T13:18:24-05:00weekly0.5/security-management-magazine/articles/2011/11/social-media-privacy-and-legal-discovery/2019-12-18T14:22:11-05:00weekly0.5/security-management-magazine/articles/2011/11/fighting-fire-with-prevention/2019-12-18T12:30:26-05:00weekly0.5/security-management-magazine/articles/2011/11/refining-risk-management/2019-12-18T14:13:54-05:00weekly0.5/security-management-magazine/articles/2011/11/security-comes-with-the-lease/2020-10-05T13:41:21-04:00weekly0.5/security-management-magazine/articles/2011/11/guidance-for-working-in-disaster-areas/2019-12-18T12:42:56-05:00weekly0.5/security-management-magazine/articles/2011/11/police-embrace-social-media/2019-12-18T14:03:48-05:00weekly0.5/security-management-magazine/articles/2011/11/lessons-learned-from-trident-breach/2019-12-18T13:28:05-05:00weekly0.5/security-management-magazine/articles/2011/11/minimizing-the-risks-of-online-banking/2020-02-26T10:21:19-05:00weekly0.5/security-management-magazine/articles/2011/11/trade-secret-protection/2019-12-18T14:36:28-05:00weekly0.5/security-management-magazine/articles/2011/11/legal-report-november-2011/2019-12-18T13:23:02-05:00weekly0.5/security-management-magazine/articles/2011/11/industry-news-november-2011/2019-12-18T13:04:25-05:00weekly0.5/security-management-magazine/articles/2011/11/how-to-control-cards/2019-12-18T12:49:41-05:00weekly0.5/security-management-magazine/articles/2011/10/as-the-availability-of-drugs-increases-more-young-people-become-abusers/2019-08-01T18:03:34-04:00weekly0.5/security-management-magazine/articles/2011/10/dhs-identifies-method-terrorists-could-use-to-attack-u.s.-water-supplies/2019-08-01T18:03:34-04:00weekly0.5/security-management-magazine/articles/2011/10/community-colleges-less-likely-to-implement-layered-notification-systems/2019-08-01T18:03:34-04:00weekly0.5/security-management-magazine/articles/2011/10/employee-theftthe-largest-source-of-shrink-in-north-america/2019-08-01T18:03:34-04:00weekly0.5/security-management-magazine/articles/2011/10/u.s.-earns-low-marks-on-bio-response-report-card/2019-08-01T18:03:34-04:00weekly0.5/security-management-magazine/articles/2011/10/preventing-crowd-violence/2020-10-02T16:20:58-04:00weekly0.5/security-management-magazine/articles/2011/10/bill-would-increase-economic-espionage-penalties/2019-12-20T14:38:06-05:00weekly0.5/security-management-magazine/articles/2011/10/assessing-progress-in-the-war-on-drugs/2019-12-20T11:24:20-05:00weekly0.5/security-management-magazine/articles/2011/10/court-case-airport-body-scanners/2019-12-20T11:16:00-05:00weekly0.5/security-management-magazine/articles/2011/10/unreasonable-force/2019-12-20T21:27:34-05:00weekly0.5/security-management-magazine/articles/2011/10/behind-the-numbers/2019-12-20T14:23:05-05:00weekly0.5/security-management-magazine/articles/2011/10/weapons/2019-12-20T21:39:49-05:00weekly0.5/security-management-magazine/articles/2011/10/chemical-facility-security/2020-09-02T10:37:02-04:00weekly0.5/security-management-magazine/articles/2011/10/new-threat-arises-in-a-flash/2019-12-20T20:49:55-05:00weekly0.5/security-management-magazine/articles/2011/10/catching-the-counterfeiters/2019-12-20T14:26:57-05:00weekly0.5/security-management-magazine/articles/2011/10/dhs-tries-to-secure-innovation/2019-12-20T14:34:29-05:00weekly0.5/security-management-magazine/articles/2011/10/safely-connecting-computing-devices/2019-12-20T20:58:41-05:00weekly0.5/security-management-magazine/articles/2011/10/manulife-outsources-vm-scanning/2019-12-20T20:45:00-05:00weekly0.5/security-management-magazine/articles/2011/10/watching-over-the-waterways/2019-12-20T21:37:30-05:00weekly0.5/security-management-magazine/articles/2011/10/sick-of-data-protection-rules/2019-12-20T21:04:27-05:00weekly0.5/security-management-magazine/articles/2011/10/avoiding-the-spearphishers-barb/2019-12-20T11:28:37-05:00weekly0.5/security-management-magazine/articles/2011/10/legal-report-october-2011/2019-12-20T11:13:13-05:00weekly0.5/security-management-magazine/articles/2011/10/industry-news-october-2011/2019-12-20T20:30:14-05:00weekly0.5/security-management-magazine/articles/2011/10/how-to-outsource-wisely/2019-12-20T14:42:23-05:00weekly0.5/security-management-magazine/articles/2011/09/mixed-reactions-after-death-of-al-qaeda-mastermind/2020-06-23T19:22:39-04:00weekly0.5/security-management-magazine/articles/2011/09/more-than-four-million-hold-u.s.-security-clearances/2019-08-01T18:03:36-04:00weekly0.5/security-management-magazine/articles/2011/09/bush-shares-disaster-recovery-lessons-at-asis-event/2019-08-01T18:03:36-04:00weekly0.5/security-management-magazine/articles/2011/09/asis-opens-57th-annual-seminar-and-exhibits-by-commemorating-9-11/2019-08-01T18:03:36-04:00weekly0.5/security-management-magazine/articles/2011/09/law-enforcement-come-out-against-national-right-to-carry-act/2019-08-01T18:03:36-04:00weekly0.5/security-management-magazine/articles/2011/09/tsa-debunks-scam-reported-by-new-york-post-columnist/2019-08-01T18:03:36-04:00weekly0.5/security-management-magazine/articles/2011/09/9-11-reflections-regrets-and-resolutions/2020-01-02T13:49:03-05:00weekly0.5/security-management-magazine/articles/2011/09/military-threat-level-raised-to-fpcon-bravo/2020-06-23T19:22:39-04:00weekly0.5/security-management-magazine/articles/2011/09/website-highlights-efforts-to-combat-gang-violence/2020-01-03T10:41:54-05:00weekly0.5/security-management-magazine/articles/2011/09/court-case-students-and-social-media-parody/2020-01-03T11:10:29-05:00weekly0.5/security-management-magazine/articles/2011/09/bolstering-security-education/2020-01-02T14:19:11-05:00weekly0.5/security-management-magazine/articles/2011/09/breach-insurance-gains-steam/2020-01-02T14:24:50-05:00weekly0.5/security-management-magazine/articles/2011/09/building-an-enterprise-wide-business-continuity-program/2020-01-02T14:33:49-05:00weekly0.5/security-management-magazine/articles/2011/09/cyber-attacks-protecting-national-infrastructure/2020-01-02T15:15:32-05:00weekly0.5/security-management-magazine/articles/2011/09/advanced-interviewing-techniques-second-edition/2020-01-02T13:54:46-05:00weekly0.5/security-management-magazine/articles/2011/09/court-case-drug-use-and-the-ada/2020-01-02T15:18:13-05:00weekly0.5/security-management-magazine/articles/2011/09/first-amendment/2020-01-02T15:23:11-05:00weekly0.5/security-management-magazine/articles/2011/09/challenges-in-intelligence-analysis-lessons-learned-from-1300-bce-to-the-present/2020-01-02T14:42:11-05:00weekly0.5/security-management-magazine/articles/2011/09/state-legislation/2020-01-03T11:14:01-05:00weekly0.5/security-management-magazine/articles/2011/09/reporting-guidelines-for-whistleblowers/2020-01-03T11:45:46-05:00weekly0.5/security-management-magazine/articles/2011/09/considering-civil-liberties/2020-01-02T15:04:46-05:00weekly0.5/security-management-magazine/articles/2011/09/complacency-may-be-the-real-enemy/2020-01-02T14:58:53-05:00weekly0.5/security-management-magazine/articles/2011/09/suspicious-activity-reporting/2020-06-23T19:22:40-04:00weekly0.5/security-management-magazine/articles/2011/09/are-we-still-at-risk/2020-06-23T19:22:41-04:00weekly0.5/security-management-magazine/articles/2011/09/cracking-down-on-trafficking/2020-01-02T15:08:36-05:00weekly0.5/security-management-magazine/articles/2011/09/gang-victimization-realities/2020-01-02T15:30:37-05:00weekly0.5/security-management-magazine/articles/2011/09/tracking-digital-footprints-in-the-field/2020-01-03T11:35:23-05:00weekly0.5/security-management-magazine/articles/2011/09/maritime-messages/2020-01-03T11:07:07-05:00weekly0.5/security-management-magazine/articles/2011/09/too-focused-on-safe-havens/2020-06-23T19:22:41-04:00weekly0.5/security-management-magazine/articles/2011/09/is-it-really-possible-to-trust-travelers/2020-01-03T10:53:49-05:00weekly0.5/security-management-magazine/articles/2011/09/virtual-reality-racing-and-the-final-frontier/2020-01-03T11:41:34-05:00weekly0.5/security-management-magazine/articles/2011/09/before-the-games-begin/2020-10-02T16:23:51-04:00weekly0.5/security-management-magazine/articles/2011/09/legal-report-september-2011/2020-01-03T10:58:42-05:00weekly0.5/security-management-magazine/articles/2011/09/industry-news-september-2011/2020-01-03T10:46:34-05:00weekly0.5/security-management-magazine/articles/2011/09/changes-in-the-classroom/2020-01-02T14:51:05-05:00weekly0.5/security-management-magazine/articles/2011/08/advanced-persistent-threats-a-main-concern-after-year-of-the-hack/2019-08-01T18:03:39-04:00weekly0.5/security-management-magazine/articles/2011/08/gps-implants-may-be-more-fiction-than-science/2019-08-01T18:03:39-04:00weekly0.5/security-management-magazine/articles/2011/08/$00.000025-the-going-rate-on-the-black-market-for-your-email-address/2024-01-16T15:21:48-05:00weekly0.5/security-management-magazine/articles/2011/08/blame-it-on-el-nino-researchers-link-conflict-to-climate-change/2019-08-01T18:03:39-04:00weekly0.5/security-management-magazine/articles/2011/08/experts-say-need-to-know-should-trump-security-clearance/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/virginia-earthquake-a-reminder-for-adequate-disaster-planning/2020-10-02T16:52:20-04:00weekly0.5/security-management-magazine/articles/2011/08/diy-drones-will-be-the-next-threat-to-port-security/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/former-dhs-chief-calls-interoperable-communications-failure-a-national-disgrace/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/flash-mobs-an-emerging-threat-to-retailers/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/drone-stakeholders-stress-robots-humanitarian-upside/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/email-providers-move-toward-two-factor-authentication/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/implantable-medical-devices-hacks-and-countermeasures/2019-08-01T18:03:40-04:00weekly0.5/security-management-magazine/articles/2011/08/a-stuxnet-type-hack-could-disable-prison-security-systems/2020-11-25T16:50:53-05:00weekly0.5/security-management-magazine/articles/2011/08/to-carry-or-not-to-carry/2020-01-03T14:02:26-05:00weekly0.5/security-management-magazine/articles/2011/08/intelligence-led-policing/2020-01-06T10:38:39-05:00weekly0.5/security-management-magazine/articles/2011/08/casino-security-and-gaming-surveillance/2020-01-03T14:07:15-05:00weekly0.5/security-management-magazine/articles/2011/08/court-case-discrimination-in-security-clearances/2020-01-03T14:20:48-05:00weekly0.5/security-management-magazine/articles/2011/08/best-practices-in-gene-synthesis/2020-01-03T13:57:29-05:00weekly0.5/security-management-magazine/articles/2011/08/federal-hacking-law-also-applies-to-data-theft/2020-01-03T14:11:22-05:00weekly0.5/security-management-magazine/articles/2011/08/the-definitive-handbook-of-business-continuity-management-third-edition/2020-01-03T14:18:31-05:00weekly0.5/security-management-magazine/articles/2011/08/airport-and-aviation-security-u.s.-policy-and-strategy-in-the-age-of-global-terrorism/2020-01-03T13:53:01-05:00weekly0.5/security-management-magazine/articles/2011/08/sec-issues-final-rule-for-whistleblower-program/2020-01-06T12:00:32-05:00weekly0.5/security-management-magazine/articles/2011/08/top-ten-responses-to-phishing-attacks/2020-01-06T11:39:41-05:00weekly0.5/security-management-magazine/articles/2011/08/dhs-not-exempt-from-federal-privacy-violations/2020-01-06T11:03:02-05:00weekly0.5/security-management-magazine/articles/2011/08/bills-seeks-to-strengthen-penalties-for-bribery-and-corruption-convictions/2020-01-03T14:14:49-05:00weekly0.5/security-management-magazine/articles/2011/08/retaliation/2020-01-06T11:13:12-05:00weekly0.5/security-management-magazine/articles/2011/08/exploding-terrorist-myths/2020-06-23T19:22:42-04:00weekly0.5/security-management-magazine/articles/2011/08/figuring-out-fingerprints/2020-01-03T14:29:15-05:00weekly0.5/security-management-magazine/articles/2011/08/securing-synthetic-biology/2020-01-06T11:19:28-05:00weekly0.5/security-management-magazine/articles/2011/08/one-card-to-rule-them-all/2020-01-06T10:59:19-05:00weekly0.5/security-management-magazine/articles/2011/08/when-darkness-falls-in-delhi/2020-01-06T11:56:19-05:00weekly0.5/security-management-magazine/articles/2011/08/moving-towards-trusted-identities/2020-01-06T10:54:27-05:00weekly0.5/security-management-magazine/articles/2011/08/the-earning-curve/2020-01-06T11:34:30-05:00weekly0.5/security-management-magazine/articles/2011/08/securitys-worth-measured-in-pounds/2020-01-06T11:28:47-05:00weekly0.5/security-management-magazine/articles/2011/08/protecting-the-smart-grid/2020-11-25T17:21:07-05:00weekly0.5/security-management-magazine/articles/2011/08/legal-report-august-2011/2020-01-06T10:47:13-05:00weekly0.5/security-management-magazine/articles/2011/08/industry-news-august-2011/2020-01-03T14:33:20-05:00weekly0.5/security-management-magazine/articles/2011/08/volunteers-augment-security/2020-01-06T11:51:40-05:00weekly0.5/security-management-magazine/articles/2011/07/italian-guns-to-be-manufactured-with-rfid-technology/2019-08-01T18:03:42-04:00weekly0.5/security-management-magazine/articles/2011/07/experts-testify-on-al-shabaab-before-the-homeland-security-committee/2020-06-23T19:22:43-04:00weekly0.5/security-management-magazine/articles/2011/07/white-house-announces-transnational-organized-crime-strategy/2020-06-23T19:22:43-04:00weekly0.5/security-management-magazine/articles/2011/07/canadas-drop-in-crime-attributed-to-holistic-crime-prevention-strategies/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/objectvideo-files-suit-with-the-itc-to-protect-patents/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/militant-group-seeks-removal-from-terrorism-list-has-lawmaker-support/2020-06-23T19:22:44-04:00weekly0.5/security-management-magazine/articles/2011/07/tsa-must-ask-for-public-comment-on-use-of-whole-body-scanners/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/cbp-taking-out-cartel-leadership-has-no-impact-on-flow-of-drugs/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/urban-area-perspective---portland/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/san-diego-law-enforcement-warns-that-hotels-could-be-used-for-bomb-making-labs/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/afternoon-security-brief-airport-breaches-wi-fi-security-baggage-screening-and-more/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/afternoon-security-brief-malware-risk-er-security-trafficking-legislation-and-more/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/opposition-party-candidates-often-left-unprotected-during-campaigns/2019-08-01T18:03:43-04:00weekly0.5/security-management-magazine/articles/2011/07/examining-hezbollahs-activities-in-the-americas/2020-06-23T19:22:45-04:00weekly0.5/security-management-magazine/articles/2011/07/protecting-the-bravest/2020-01-07T16:01:07-05:00weekly0.5/security-management-magazine/articles/2011/07/federal-facilities-designing-site-security/2020-01-07T15:33:44-05:00weekly0.5/security-management-magazine/articles/2011/07/fraud-conviction-of-former-enron-executive-upheld/2020-01-07T15:37:27-05:00weekly0.5/security-management-magazine/articles/2011/07/crisis-communications-a-casebook-approach-fourth-edition/2020-01-07T12:08:10-05:00weekly0.5/security-management-magazine/articles/2011/07/united-states-earthquake-resilience/2020-01-07T16:04:36-05:00weekly0.5/security-management-magazine/articles/2011/07/court-case-border-searches/2020-01-07T11:34:29-05:00weekly0.5/security-management-magazine/articles/2011/07/behind-the-numbers/2019-08-01T18:03:44-04:00weekly0.5/security-management-magazine/articles/2011/07/court-case-religious-discrimination/2020-01-07T15:19:30-05:00weekly0.5/security-management-magazine/articles/2011/07/fisas-constitutionality-challenged/2020-01-07T10:46:05-05:00weekly0.5/security-management-magazine/articles/2011/07/can-the-united-states-bounce-back/2020-01-07T11:58:14-05:00weekly0.5/security-management-magazine/articles/2011/07/safeguarding-children/2020-01-07T16:11:13-05:00weekly0.5/security-management-magazine/articles/2011/07/a-lock-on-security/2020-01-07T11:00:51-05:00weekly0.5/security-management-magazine/articles/2011/07/strengthening-global-cooperation/2020-01-07T16:15:54-05:00weekly0.5/security-management-magazine/articles/2011/07/effective-privacy-on-a-tight-budget/2020-01-07T15:27:45-05:00weekly0.5/security-management-magazine/articles/2011/07/a-force-to-reckon-with/2020-01-07T10:54:32-05:00weekly0.5/security-management-magazine/articles/2011/07/no-artistry-in-these-crimes/2020-01-07T15:52:37-05:00weekly0.5/security-management-magazine/articles/2011/07/blueprint-for-safer-buildings/2020-01-07T11:10:00-05:00weekly0.5/security-management-magazine/articles/2011/07/legal-report-july-2011/2020-01-07T15:45:31-05:00weekly0.5/security-management-magazine/articles/2011/07/industry-news-july-2011/2020-01-07T15:41:47-05:00weekly0.5/security-management-magazine/articles/2011/07/changing-of-the-guard/2020-01-07T12:03:15-05:00weekly0.5/security-management-magazine/articles/2011/06/are-diplomatic-security-forces-ready-for-a-more-offensive-role-in-the-middle-east/2019-08-01T18:03:45-04:00weekly0.5/security-management-magazine/articles/2011/06/analyst-describes-privacy-policy-best-practices/2019-08-01T18:03:45-04:00weekly0.5/security-management-magazine/articles/2011/06/house-subcommittee-explores-whether-wireless-broadband-expansion-could-affect-aviation-safety/2019-08-01T18:03:45-04:00weekly0.5/security-management-magazine/articles/2011/06/experts-stress-u.s.-still-does-not-have-a-coherent-strategy-to-fight-radicalization/2020-06-23T19:22:46-04:00weekly0.5/security-management-magazine/articles/2011/06/afternoon-security-brief-drug-testing-errors-immigration-law-problems-falsified-background-checks-and-more/2019-08-01T18:03:45-04:00weekly0.5/security-management-magazine/articles/2011/06/how-9-11-has-driven-technology-advancements/2020-06-23T19:22:46-04:00weekly0.5/security-management-magazine/articles/2011/06/gao-assesses-physical-security-at-general-aviation-airports/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/two-reports-examine-trends-in-organized-retail-crime/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/upcoming-legislation-would-increase-biothreat-readiness/2020-06-23T19:22:47-04:00weekly0.5/security-management-magazine/articles/2011/06/cbo-outlines-options-for-expanding-military-drone-programs/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/millennials-could-dictate-the-future-of-employment-screening/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/national-institute-of-justice-finds-tasers-safe/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/priceless-how-i-went-undercover-to-rescue-the-worlds-stolen-treasures/2020-01-08T17:46:42-05:00weekly0.5/security-management-magazine/articles/2011/06/the-handbook-for-campus-threat-assessment--management-teams/2020-01-08T11:13:46-05:00weekly0.5/security-management-magazine/articles/2011/06/baking-in-strong-privacy-controls/2020-01-08T10:52:55-05:00weekly0.5/security-management-magazine/articles/2011/06/a-tool-for-disaster-preparedness/2020-01-08T11:08:05-05:00weekly0.5/security-management-magazine/articles/2011/06/behind-the-numbers-top-five-risk-priorities-of-large-companies/2019-08-01T18:03:46-04:00weekly0.5/security-management-magazine/articles/2011/06/calculating-casualties/2020-01-08T11:04:04-05:00weekly0.5/security-management-magazine/articles/2011/06/the-arc-of-noaas-assistance/2020-01-08T18:15:14-05:00weekly0.5/security-management-magazine/articles/2011/06/sustaining-nuclear-forensics/2020-01-08T18:07:52-05:00weekly0.5/security-management-magazine/articles/2011/06/keeping-data-in-its-place/2020-01-08T11:35:24-05:00weekly0.5/security-management-magazine/articles/2011/06/retail-security-south-of-the-border/2020-01-08T17:56:38-05:00weekly0.5/security-management-magazine/articles/2011/06/planning-for-tumultuous-times/2020-10-02T16:51:35-04:00weekly0.5/security-management-magazine/articles/2011/06/the-matrix-quandary/2020-01-08T18:21:38-05:00weekly0.5/security-management-magazine/articles/2011/06/securitys-successful-operation/2020-01-08T18:02:51-05:00weekly0.5/security-management-magazine/articles/2011/06/legal-report-june-2011/2020-01-08T11:39:50-05:00weekly0.5/security-management-magazine/articles/2011/06/industry-news-june-2011/2020-01-08T11:18:12-05:00weekly0.5/security-management-magazine/articles/2011/06/investigating-abroad/2020-01-08T11:26:22-05:00weekly0.5/security-management-magazine/articles/2011/05/airport-screening/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/screeners-no-longer-isolated/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/rand-trusted-traveler-program-should-result-in-security-benefits/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/think-tank-recommends-frank-discussion-about-individual-responsibility-during-disasters/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/u.s.-ends-program-targeting-muslim-men/2020-06-23T19:22:47-04:00weekly0.5/security-management-magazine/articles/2011/05/standards-body-tells-companies-to-take-initiative-in-the-fight-against-global-counterfeiting/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/canada-becoming-cyber-criminal-breeding-ground/2019-08-01T18:03:48-04:00weekly0.5/security-management-magazine/articles/2011/05/al-qaida-planned-tenth-anniversary-attack/2020-06-23T19:22:48-04:00weekly0.5/security-management-magazine/articles/2011/05/conspicuously-secure-compound-helped-undo-bin-laden-officials-say/2020-06-23T19:22:48-04:00weekly0.5/security-management-magazine/articles/2011/05/osama-bin-laden-dead/2020-06-23T19:22:49-04:00weekly0.5/security-management-magazine/articles/2011/05/amber-alerts/2020-01-09T17:01:13-05:00weekly0.5/security-management-magazine/articles/2011/05/elsewhere-in-the-courts-employment/2020-01-10T13:36:45-05:00weekly0.5/security-management-magazine/articles/2011/05/state-legislation-kansas-discrimination/2020-01-13T11:33:53-05:00weekly0.5/security-management-magazine/articles/2011/05/elsewhere-in-the-courts-privacy/2020-01-10T13:39:32-05:00weekly0.5/security-management-magazine/articles/2011/05/behind-the-numbers/2020-01-09T17:04:07-05:00weekly0.5/security-management-magazine/articles/2011/05/physician-convicted-for-ties-to-al-qaeda/2020-06-23T19:22:49-04:00weekly0.5/security-management-magazine/articles/2011/05/motive-doesnt-matter/2020-01-10T14:27:17-05:00weekly0.5/security-management-magazine/articles/2011/05/getting-out-in-a-hurry/2020-01-10T13:45:26-05:00weekly0.5/security-management-magazine/articles/2011/05/deterring-chemical-and-biological-attacks/2020-01-09T17:15:46-05:00weekly0.5/security-management-magazine/articles/2011/05/screenings-red-herrings/2020-01-13T11:25:22-05:00weekly0.5/security-management-magazine/articles/2011/05/city-surveillance-success/2020-01-09T17:11:31-05:00weekly0.5/security-management-magazine/articles/2011/05/targeting-human-trafficking/2020-06-23T19:22:50-04:00weekly0.5/security-management-magazine/articles/2011/05/kodak-develops-risk-framework/2020-01-10T14:08:22-05:00weekly0.5/security-management-magazine/articles/2011/05/new-targeted-advertising-risks/2020-01-13T11:12:02-05:00weekly0.5/security-management-magazine/articles/2011/05/rethinking-the-war-on-terrorism/2020-06-23T19:22:51-04:00weekly0.5/security-management-magazine/articles/2011/05/how-to-take-a-punch/2020-11-25T17:24:48-05:00weekly0.5/security-management-magazine/articles/2011/05/securitys-nebulous-side/2020-01-13T11:31:29-05:00weekly0.5/security-management-magazine/articles/2011/05/legal-report-may-2011/2020-01-10T14:14:20-05:00weekly0.5/security-management-magazine/articles/2011/05/industry-news-may-2011/2020-01-10T14:01:44-05:00weekly0.5/security-management-magazine/articles/2011/04/u.s.-congressional-legislation-airport-security/2019-08-01T18:03:50-04:00weekly0.5/security-management-magazine/articles/2011/04/u.s.-congressional-legislation-aviation-security/2019-08-01T18:03:50-04:00weekly0.5/security-management-magazine/articles/2011/04/indonesian-jihadists-embrace-small-cells-and-targeted-attacks/2020-06-23T19:22:52-04:00weekly0.5/security-management-magazine/articles/2011/04/top-government-lab-hacked/2019-08-01T18:03:50-04:00weekly0.5/security-management-magazine/articles/2011/04/bp-anniversary-amid-growing-exploration-risks-dont-do-something-stupid/2019-08-01T18:03:50-04:00weekly0.5/security-management-magazine/articles/2011/04/travel-association-launches-grassroots-campaign-for-a-trusted-traveler-program/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/air-force-offering-prizes-for-ideas/2020-06-23T19:22:52-04:00weekly0.5/security-management-magazine/articles/2011/04/study-training-group-dynamics-critical-in-airport-security-decision-making/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/arizona-votes-to-allow-guns-on-campus/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/china-and-thailand-leaders-in-dirty-computers/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/online-community-helps-police-and-businesses-nab-crooks/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/alarm-industry-pushes-911-call-centers-to-give-priority-to-video-alarms/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/smart-grid-security/2020-01-14T10:56:28-05:00weekly0.5/security-management-magazine/articles/2011/04/elsewhere-in-the-courts-background-checks/2020-01-13T17:35:57-05:00weekly0.5/security-management-magazine/articles/2011/04/worth-a-look-send-2.0/2020-01-14T11:17:10-05:00weekly0.5/security-management-magazine/articles/2011/04/anticorruption-efforts-seen-as-flawed/2019-08-01T18:03:51-04:00weekly0.5/security-management-magazine/articles/2011/04/backscatter-safety-questions-persist/2020-01-13T17:27:36-05:00weekly0.5/security-management-magazine/articles/2011/04/anticorruption-efforts-seen-as-flawed2/2020-01-13T17:13:18-05:00weekly0.5/security-management-magazine/articles/2011/04/behind-the-numbers/2019-08-01T18:03:52-04:00weekly0.5/security-management-magazine/articles/2011/04/u.s.-judicial-decisions-background-screening/2020-01-14T11:13:26-05:00weekly0.5/security-management-magazine/articles/2011/04/sharing-helps-first-responders/2020-01-14T10:52:56-05:00weekly0.5/security-management-magazine/articles/2011/04/security-fatigue-is-a-real-threat/2020-01-14T10:48:12-05:00weekly0.5/security-management-magazine/articles/2011/04/automating-security-policies/2020-01-13T17:20:54-05:00weekly0.5/security-management-magazine/articles/2011/04/securing-the-smart-grid/2020-01-14T10:43:36-05:00weekly0.5/security-management-magazine/articles/2011/04/hell-on-wheels/2020-01-13T17:42:33-05:00weekly0.5/security-management-magazine/articles/2011/04/something-in-the-air/2020-01-14T11:01:15-05:00weekly0.5/security-management-magazine/articles/2011/04/pbs-to-the-rescue/2020-01-14T10:37:59-05:00weekly0.5/security-management-magazine/articles/2011/04/industry-news-april-2011/2020-01-14T10:27:11-05:00weekly0.5/security-management-magazine/articles/2011/04/legal-report-april-2011/2020-01-14T10:31:35-05:00weekly0.5/security-management-magazine/articles/2011/04/the-key-to-employee-happiness/2020-01-14T11:08:35-05:00weekly0.5/security-management-magazine/articles/2011/03/smartphones-could-double-as-bombs-warns-u.s.-court-committee/2020-06-23T19:22:52-04:00weekly0.5/security-management-magazine/articles/2011/03/plaintiffs-may-sue-the-government-over-warrantless-spying/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/experts-worry-more-about-aging-infrastructure-than-nuclear-plants-if-big-one-occurs-in-heartland/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/are-nuclear-evacuation-plans-a-fantasy-asks-nyt-columnist/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/travel-group-says-enough-of-one-size-fits-all-airport-security-model/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/the-importance-of-culture-during-a-disaster/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/prior-near-misses-make-people-overconfident-in-emergency-situations/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/tsa-will-retest-backscatter-scanners-as-hearing-delves-deeper-into-machines/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/darpa-to-train-troops-in-social-interaction/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/sheriff-says-muslim-americans-key-to-counterterrorism/2020-06-23T19:22:53-04:00weekly0.5/security-management-magazine/articles/2011/03/open-minds-and-history-key-to-understanding-terror-french-expert-says/2020-06-23T19:22:54-04:00weekly0.5/security-management-magazine/articles/2011/03/attackers-exploit-trust-in-pdfs/2019-08-01T18:03:53-04:00weekly0.5/security-management-magazine/articles/2011/03/supreme-court-rules-that-employer-discriminated-against-reservist-employee/2019-08-01T18:03:54-04:00weekly0.5/security-management-magazine/articles/2011/03/al-qaeda-in-arabian-peninsula-is-greatest-terror-threat-to-u.s.-experts-warn/2020-06-23T19:22:54-04:00weekly0.5/security-management-magazine/articles/2011/03/how-to-improve-your-image/2020-01-14T15:35:28-05:00weekly0.5/security-management-magazine/articles/2011/03/cybersecurity-resources-for-small-businesses/2020-01-14T11:46:23-05:00weekly0.5/security-management-magazine/articles/2011/03/data-breach-preparedness-plan/2020-01-14T11:52:30-05:00weekly0.5/security-management-magazine/articles/2011/03/behind-the-numbers/2020-01-14T11:32:42-05:00weekly0.5/security-management-magazine/articles/2011/03/state-legislation-mississippi-bullying/2020-01-14T15:55:22-05:00weekly0.5/security-management-magazine/articles/2011/03/a-little-dab-will-do-ya-in/2020-01-14T11:28:28-05:00weekly0.5/security-management-magazine/articles/2011/03/improving-ferry-security/2020-01-14T15:41:54-05:00weekly0.5/security-management-magazine/articles/2011/03/wikileaks-information-sharing-fallout/2020-01-14T16:17:37-05:00weekly0.5/security-management-magazine/articles/2011/03/bridging-the-gap/2020-01-14T11:39:32-05:00weekly0.5/security-management-magazine/articles/2011/03/the-real-price-of-virtual-kidnappings/2020-01-14T16:12:58-05:00weekly0.5/security-management-magazine/articles/2011/03/delivering-on-diversitys-promise/2020-01-14T15:21:45-05:00weekly0.5/security-management-magazine/articles/2011/03/controlling-access-system-performance/2020-01-14T11:43:47-05:00weekly0.5/security-management-magazine/articles/2011/03/supply-side-planning/2020-01-14T16:02:23-05:00weekly0.5/security-management-magazine/articles/2011/03/legal-report-march-2011/2020-01-14T15:51:56-05:00weekly0.5/security-management-magazine/articles/2011/03/industry-news-march-2011/2020-01-14T15:47:16-05:00weekly0.5/security-management-magazine/articles/2011/03/ferreting-out-fakers/2020-01-14T15:30:38-05:00weekly0.5/security-management-magazine/articles/2011/02/agencies-must-adapt-to-how-people-use-information-fema-official/2019-08-01T18:03:55-04:00weekly0.5/security-management-magazine/articles/2011/02/lack-of-trust-thwarts-cybersecurity-information-sharing/2019-08-01T18:03:55-04:00weekly0.5/security-management-magazine/articles/2011/02/patients-uneasy-about-security-of-electronic-health-records/2019-08-01T18:03:55-04:00weekly0.5/security-management-magazine/articles/2011/02/hearing-reviews-chemical-facility-security-regs-and-talks-ists/2019-08-01T18:03:55-04:00weekly0.5/security-management-magazine/articles/2011/02/full-body-scanners-feature-prominently-in-dhss-2012-budget-request/2019-08-01T18:03:55-04:00weekly0.5/security-management-magazine/articles/2011/02/tsa-will-not-expand-private-screener-program/2019-08-01T18:03:56-04:00weekly0.5/security-management-magazine/articles/2011/02/company-settles-case-over-negative-facebook-posting/2019-08-01T18:03:56-04:00weekly0.5/security-management-magazine/articles/2011/02/nypd-releases-active-shooter-recommendations-for-buildings/2019-08-01T18:03:56-04:00weekly0.5/security-management-magazine/articles/2011/02/birds-eye-view/2020-01-20T18:06:43-05:00weekly0.5/security-management-magazine/articles/2011/02/top-security-industry-private-investments-for-november/2020-01-21T12:27:59-05:00weekly0.5/security-management-magazine/articles/2011/02/redesigning-the-national-crime-victimization-survey/2020-01-20T18:23:06-05:00weekly0.5/security-management-magazine/articles/2011/02/defend-the-realm-the-authorized-history-of-mi5/2020-01-20T18:30:30-05:00weekly0.5/security-management-magazine/articles/2011/02/can-prisoners-be-deradicalized/2020-06-23T19:22:54-04:00weekly0.5/security-management-magazine/articles/2011/02/court-case-discrimination-in-compensation/2020-01-20T18:33:54-05:00weekly0.5/security-management-magazine/articles/2011/02/elsewhere-in-the-courts-discovery/2020-01-20T18:40:34-05:00weekly0.5/security-management-magazine/articles/2011/02/teacher-may-sue-school-for-false-arrest/2020-01-20T18:47:35-05:00weekly0.5/security-management-magazine/articles/2011/02/male-worker-may-sue-female-supervisor-for-sexual-harassment/2020-01-21T12:10:15-05:00weekly0.5/security-management-magazine/articles/2011/02/behind-the-numbers/2020-01-20T18:00:13-05:00weekly0.5/security-management-magazine/articles/2011/02/taking-advantage-of-cloud-computing-securely/2020-01-20T18:14:36-05:00weekly0.5/security-management-magazine/articles/2011/02/cloud-security-and-compliance-basics/2020-01-20T18:19:59-05:00weekly0.5/security-management-magazine/articles/2011/02/anxiety-catch-it/2020-01-20T17:55:30-05:00weekly0.5/security-management-magazine/articles/2011/02/the-sounds-of-violence/2020-01-21T12:15:25-05:00weekly0.5/security-management-magazine/articles/2011/02/the-trouble-with-uavs/2020-01-21T12:19:37-05:00weekly0.5/security-management-magazine/articles/2011/02/till-security-counts/2020-01-21T12:24:30-05:00weekly0.5/security-management-magazine/articles/2011/02/industry-news-february-2011/2020-01-21T11:44:34-05:00weekly0.5/security-management-magazine/articles/2011/02/legal-report-february-2011/2020-01-21T11:57:58-05:00weekly0.5/security-management-magazine/articles/2011/02/how-to-avoid-discrimination-charges/2020-01-20T18:52:19-05:00weekly0.5/security-management-magazine/articles/2011/02/preventing-violence-at-work/2020-01-21T12:03:36-05:00weekly0.5/security-management-magazine/articles/2011/02/always-room-for-improvement/2020-01-20T17:56:24-05:00weekly0.5/security-management-magazine/articles/2011/01/weapons/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/napolitano-announces-new-terror-alert-system-acknowledges-publics-role-in-preventing-attacks/2020-06-23T19:22:55-04:00weekly0.5/security-management-magazine/articles/2011/01/u.s.-regulatory-issues-genetic-discrimination/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/supreme-court-rules-on-retaliation-case/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/suspected-suicide-bomber-murders-dozens-at-moscow-airport/2020-06-23T19:22:55-04:00weekly0.5/security-management-magazine/articles/2011/01/u.s.-supreme-court-issues-ruling-in-background-screening-case/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/boston-ordinance-seeks-to-fingerprint-and-vet-business-license-seekers/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/after-hostage-standoff-discovery-to-boost-physical-security-at-hq/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/no-warrant-necessary-for-text-message-search/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/no-warrant-necessary-for-text-message-search2/2019-08-01T18:03:58-04:00weekly0.5/security-management-magazine/articles/2011/01/a-model-of-security-how-andrews-air-force-base-remains-safe-and-secure/2019-08-01T18:03:59-04:00weekly0.5/security-management-magazine/articles/2011/01/college-campuses-ranked-from-most-to-least-safe/2020-01-22T15:51:54-05:00weekly0.5/security-management-magazine/articles/2011/01/battling-cybercrime-across-borders/2020-01-22T12:27:56-05:00weekly0.5/security-management-magazine/articles/2011/01/best-practices-for-transportation-security-managers/2020-01-22T12:37:11-05:00weekly0.5/security-management-magazine/articles/2011/01/data-theft-a-rising-form-of-fraud/2020-01-22T16:00:19-05:00weekly0.5/security-management-magazine/articles/2011/01/cargo-vulnerabilities-persist/2020-06-23T19:22:56-04:00weekly0.5/security-management-magazine/articles/2011/01/this-base-is-covered/2020-01-22T12:13:13-05:00weekly0.5/security-management-magazine/articles/2011/01/behind-the-numbers/2020-01-22T12:32:33-05:00weekly0.5/security-management-magazine/articles/2011/01/where-will-criminals-strike-next/2021-01-28T13:51:36-05:00weekly0.5/security-management-magazine/articles/2011/01/biometrics-are-fallible/2020-01-22T15:47:17-05:00weekly0.5/security-management-magazine/articles/2011/01/a-command-performance/2020-01-22T12:19:44-05:00weekly0.5/security-management-magazine/articles/2011/01/directing-privacy-policies-at-consumers/2020-01-22T16:04:11-05:00weekly0.5/security-management-magazine/articles/2011/01/squelching-attacks-with-splunk/2020-01-22T16:32:55-05:00weekly0.5/security-management-magazine/articles/2011/01/this-base-is-covered2/2019-08-01T18:04:00-04:00weekly0.5/security-management-magazine/articles/2011/01/mastering-mass-transit/2020-01-22T16:18:18-05:00weekly0.5/security-management-magazine/articles/2011/01/setting-a-strategic-course/2020-01-22T16:28:35-05:00weekly0.5/security-management-magazine/articles/2011/01/legal-report-january-2011/2020-01-22T16:11:58-05:00weekly0.5/security-management-magazine/articles/2011/01/industry-news-january-2011/2020-01-22T16:07:53-05:00weekly0.5/security-management-magazine/articles/2011/01/preventing-employee-fraud/2020-01-22T16:24:57-05:00weekly0.5/security-management-magazine/articles/2010/12/gao-issues-report-on-sexual-abuse-of-kids-in-k-12-schools/2019-08-01T18:04:00-04:00weekly0.5/security-management-magazine/articles/2010/12/food-safety-bill-approved-by-congress/2019-08-01T18:04:00-04:00weekly0.5/security-management-magazine/articles/2010/12/food-safety-bill-revived/2019-08-01T18:04:00-04:00weekly0.5/security-management-magazine/articles/2010/12/ciudad-juarez-reaches-morbid-milestone-3000-murders-in-2010/2019-08-01T18:04:00-04:00weekly0.5/security-management-magazine/articles/2010/12/backscatter-full-body-scanners-can-be-defeated-journal-article-finds/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/supreme-court-hears-third-party-retaliation-case/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/security-gets-saasy-but-has-standards/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/hospital-and-healthcare-security-fifth-edition/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/a-new-plan-for-biodefense-innovation/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/bordering-on-danger/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/cryptography-engineering-design-principles-and-practical-applications/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/report-victims-of-malware/2019-08-01T18:04:01-04:00weekly0.5/security-management-magazine/articles/2010/12/a-new-plan-for-biodefense-innovation2/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/border-security-in-the-al-qaeda-era/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/court-case-an-employee-must-be-disabled-to-challenge-drug-testing-under-the-ada/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/homegrown-terrorism/2020-06-23T19:22:56-04:00weekly0.5/security-management-magazine/articles/2010/12/behind-the-numbers/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/juarez-killings/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/begin-at-the-beginning/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/the-art-of-secure-shipping/2020-11-12T16:57:42-05:00weekly0.5/security-management-magazine/articles/2010/12/put-a-lid-on-it/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/unification-not-just-a-theory/2019-08-01T18:04:02-04:00weekly0.5/security-management-magazine/articles/2010/12/virtual-healthcare/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/12/fast-food-easy-money/2020-12-16T11:49:56-05:00weekly0.5/security-management-magazine/articles/2010/12/legal-report-december-2010/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/12/industry-news-december-2010/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/12/stay-calm-in-a-crisis/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/11/christies-sold-on-the-art-of-integration/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/11/senate-passes-sweeping-food-safety--inspection-reform-bill/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/11/airport-screeners-not-getting-the-training-they-need-says-dhs-report/2019-08-01T18:04:03-04:00weekly0.5/security-management-magazine/articles/2010/11/eeoc-issues-final-rule-on-genetic-discrimination/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/supreme-court-to-hear-retaliation-case/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/counterterror-shift-in-yemen/2020-06-23T19:22:57-04:00weekly0.5/security-management-magazine/articles/2010/11/airport-security-market-strong-growth-projected/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/code-of-conduct/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/the-art-of-integration/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/a-fight-over-first-responder-bandwidth/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/banks-beef-up-end-users-security/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/behind-the-numbers/2019-08-01T18:04:04-04:00weekly0.5/security-management-magazine/articles/2010/11/planning-for-pandemics/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/regulating-security-contractors/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/hezbollahs-tri-border-hub/2020-06-23T19:22:57-04:00weekly0.5/security-management-magazine/articles/2010/11/how-to-secure-sensitive-data/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/moving-cargo-securely/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/be-smart-about-ids/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/curing-what-ails-training/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/legal-report-november-2010/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/11/industry-news-november-2010/2019-08-01T18:04:05-04:00weekly0.5/security-management-magazine/articles/2010/10/dna-spray-foils-u.k.-criminals/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/eeoc-holds-hearing-on-credit-checks-and-employment/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/senators-report-calls-for-closing-the-terror-gap/2020-06-23T19:22:57-04:00weekly0.5/security-management-magazine/articles/2010/10/school-district-settles-lawsuit-brought-over-webcam-spying/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/report-taliban-link-to-u.s.-base-guards/2020-06-23T19:22:57-04:00weekly0.5/security-management-magazine/articles/2010/10/rocket-propelled-life-preserver-wins-2010-james-dyson-award/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/lawmakers-seek-to-close-corruption-loophole/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/worth-a-look-cyberwear/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/worth-a-look-cyberwear2/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/arson-texas-anatomy-of-the-east-texas-church-fires/2019-08-01T18:04:06-04:00weekly0.5/security-management-magazine/articles/2010/10/punished-for-crimes-unknown/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/dea-special-agent-my-life-on-the-front-line/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/arson-texas-anatomy-of-the-east-texas-church-fires2/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/behind-the-numbers-ponemon-estimates-cost-of-cybercrime-2010/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/control-system-cybersecurity/2020-11-25T16:31:41-05:00weekly0.5/security-management-magazine/articles/2010/10/inside-the-guilty-mind/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/protecting-children/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/how-dallas-does-security/2019-08-01T18:04:07-04:00weekly0.5/security-management-magazine/articles/2010/10/corporate-crime-in-hard-times/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/crafting-crisis-communications/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/guiding-control-system-cybersecurity/2020-11-25T16:33:26-05:00weekly0.5/security-management-magazine/articles/2010/10/rough-waters-smooth-response/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/the-price-of-afghan-security/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/get-smart-about-protecting-phones/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/battling-blackbeards-disciples/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/legal-report-october-2010/2019-08-01T18:04:08-04:00weekly0.5/security-management-magazine/articles/2010/10/industry-news-october-2010/2019-08-01T18:04:09-04:00weekly0.5/security-management-magazine/articles/2010/09/federal-protective-service-reform-bill-advances-in-senate/2019-08-01T18:04:09-04:00weekly0.5/security-management-magazine/articles/2010/09/fusion-centers-and-sars-will-help-disrupt-homegrown-terrorists-says-napolitano/2020-06-23T19:22:58-04:00weekly0.5/security-management-magazine/articles/2010/09/war-on-al-qaeda-affiliates-succeeding-but-long-term-persistence-critical-cia-vets-say/2019-08-01T18:04:09-04:00weekly0.5/security-management-magazine/articles/2010/09/terrorism-attacks-and-arrests-in-europe-down-for-second-straight-year/2020-06-23T19:22:58-04:00weekly0.5/security-management-magazine/articles/2010/09/bill-would-require-fps-to-examine-federalizing-contract-guards/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/the-game-is-on/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/curbing-user-rights-to-bolster-security/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/lie-detection-through-eye-movement-analysis/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/behind-the-numbers/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/state-legislation-alabama-trade-secrets/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/weapons/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/security-officers/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/creating-a-security-culture/2019-08-01T18:04:10-04:00weekly0.5/security-management-magazine/articles/2010/09/how-to-prepare-for-drills/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/disrupting-terrorist-plans/2020-06-23T19:22:58-04:00weekly0.5/security-management-magazine/articles/2010/09/manet-makes-an-impression/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/networking-mapping-solution/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/forced-labor-threats/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/hershey-hits-security-sweet-spot/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/the-prescreening-puzzle/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/legal-report-september-2010/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/industry-news-september-2010/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/let-the-learning-begin/2019-08-01T18:04:11-04:00weekly0.5/security-management-magazine/articles/2010/09/u.s.-congressional-legislation-dna/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/credit-reporting-agencies-responsible-for-watch-list-errors/2020-06-23T19:22:58-04:00weekly0.5/security-management-magazine/articles/2010/08/massachusetts-new-law-limits-when-employers-can-ask-job-applicants-about-convictions/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/who-declares-h1n1-pandemic-over-and-faces-criticism/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/russian-wildfires-show-need-for-good-information-in-a-disaster/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/police-must-obtain-a-warrant-before-using-gps-tracking/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/dhs-needs-to-take-threat-of-emp-attack-seriously-physicist-warns/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/elsewhere-in-the-courts-trade-secrets/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/school-staff-and-physical-violence-from-students/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/national-biosurveillance-integration-center--hindered-by-common-obstacles/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/biosurveillance-stays-stovepiped/2019-08-01T18:04:12-04:00weekly0.5/security-management-magazine/articles/2010/08/accountable-privacy/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/behind-the-numbers/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/state-legislation-alabama-employment/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/supreme-court-update-fraud/2020-06-23T19:22:59-04:00weekly0.5/security-management-magazine/articles/2010/08/supreme-court-update-sarbanes-oxley/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/helping-employees-cope/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/threats-in-the-mail/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/judging-the-evidence/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/spreading-the-word/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/taking-security-global/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/explosives-detection/2020-06-23T19:22:59-04:00weekly0.5/security-management-magazine/articles/2010/08/crime-reporting-and-response/2019-08-01T18:04:13-04:00weekly0.5/security-management-magazine/articles/2010/08/enhancing-the-firewall/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/08/pay-for-performance/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/08/legal-report-august-2010/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/08/industry-news-august-2010/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/espn-reporter-pushes-tough-antistalking-bill/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/new-financial-law-contains-whistleblower-protections-and-incentives/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/senate-committee-holds-hearing-on-port-security/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/police-association-lax-vulnerable-to-terrorist-attack/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/aclu-level-of-government-surveillance-violates-founders-intent/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/gao-skeptical-tsa-can-screen-100-percent-of-domestic-cargo-by-august-deadline/2019-08-01T18:04:14-04:00weekly0.5/security-management-magazine/articles/2010/07/profile-of-a-british-islamist-as-a-terrorist/2020-06-23T19:22:59-04:00weekly0.5/security-management-magazine/articles/2010/07/hospitals-should-band-together-before-the-next-crisis-hits/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/al-qaedas-yemeni-franchise-publishes-english-language-e-zine/2020-06-23T19:23:00-04:00weekly0.5/security-management-magazine/articles/2010/07/u.s.-congressional-legislation-fire-safety/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/best-damn-cybercrime-and-digital-forensics-book-period/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/pocket-sized-guide-for-active-shooter-situations/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/medical-frauds-rising-cost/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/court-case-school-not-liable-for-teacher-conduct/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/email-privacy-and-the-workplace/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/companies-push-for-digital-privacy/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/active-shooter/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/changing-of-the-guards/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/what-the-nose-knows/2019-08-01T18:04:15-04:00weekly0.5/security-management-magazine/articles/2010/07/is-observe-and-report-good-policy/2020-02-25T16:30:48-05:00weekly0.5/security-management-magazine/articles/2010/07/partnering-for-a-healthy-response/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/securitys-sweet-spot/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/protecting-personal-data-in-the-eu/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/counterfeiting-and-piracy-at-what-cost/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/roadmap-to-a-safe-stay/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/hotel-makes-room-for-resilience/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/bouncing-back-after-a-distruption/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/legal-report-july-2010/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/07/industry-news-july-2010/2019-08-01T18:04:16-04:00weekly0.5/security-management-magazine/articles/2010/06/dhs-agency-criticized-over-lack-of-nuclear-terrorism-defense-plan/2020-06-23T19:23:00-04:00weekly0.5/security-management-magazine/articles/2010/06/supreme-court-rules-sarbanes-oxley-constitutional-with-minor-exception/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/u.s.-supreme-court-clarifies-honest-services-fraud/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/supreme-court-rules-that-humanitarian-aid-to-terrorist-organizations-is-illegal/2020-06-23T19:23:00-04:00weekly0.5/security-management-magazine/articles/2010/06/army-sponsored-institute-develops-virtual-reality-counterinsurgency-training-games/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/inspector-general-report-lists-crimes-committed-by-dhs-employees/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/report-ponders-how-to-keep-the-lights-on-when-a-catastrophic-event-occurs/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/u.s.-needs-to-stop-flow-of-guns-into-mexico-experts-say/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/amendment-to-defense-bill-would-prevent-transfer-of-guantanamo-prisoners/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/new-bill-would-make-it-easier-to-prosecute-identity-theft/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/court-case-background-screening-policies/2019-08-01T18:04:17-04:00weekly0.5/security-management-magazine/articles/2010/06/how-to-develop-an-ethical-culture/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/beyond-the-bodyguard-proven-tactics-and-dynamic-strategies-for-protective-practices-success/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/tsas-certified-cargo-screening-program/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/behind-the-numbers/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/lightening-the-load-for-rescue-teams/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/cartels-and-corruption/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/web-2.0-helps-in-disaster/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/curing-what-ails-hospitals/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/world-cup-security-in-play/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/lessons-learned-from-chiles-earthquake/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/stronger-healthcare-consent/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/will-air-freight-screening-plans-fly/2019-08-01T18:04:18-04:00weekly0.5/security-management-magazine/articles/2010/06/pretexting-what-you-need-to-know/2020-02-26T10:38:13-05:00weekly0.5/security-management-magazine/articles/2010/06/legal-report-june-2010/2019-08-01T18:04:19-04:00weekly0.5/security-management-magazine/articles/2010/06/industry-news-june-2010/2019-08-01T18:04:19-04:00weekly0.5/security-management-magazine/articles/2010/06/checking-from-a-distance/2019-08-01T18:04:19-04:00weekly0.5/security-management-magazine/articles/2010/05/interoperable-communications-technologies-need-uniform-testing-standards-official-says/2019-08-01T18:04:19-04:00weekly0.5/security-management-magazine/articles/2010/05/what-will-the-blowback-of-future-military-technologies-be-for-society/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/terrorists-slip-past-tsas-scientifically-untested-behavioral-threat-detection-program/2020-06-23T19:23:01-04:00weekly0.5/security-management-magazine/articles/2010/05/empower-the-director-of-national-intelligence-9-11-co-chairs-tell-white-house/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/lawmakers-hold-hearing-on-the-use-of-credit-checks-in-hiring-decisions/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/court-upholds-firing-of-federal-air-marshal-for-disclosing-sensitive-information/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/dhs-focuses-on-long-term-recovery-after-a-disaster/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/cbp-will-study-costs-of-requiring-cruise-ships-to-hand-over-their-passenger-reservation-data/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/fast-track-to-fire-safety/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/high-rise-security-and-fire-life-safety-third-edition/2019-08-01T18:07:18-04:00weekly0.5/security-management-magazine/articles/2010/05/behind-the-numbers/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/the-character-of-harms-operational-challenges-in-control/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/fema-drafts-a-national-disaster-recovery-framework/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/a-new-point-of-view-for-police/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/building-a-new-corporate-security-strategy/2020-02-25T17:29:09-05:00weekly0.5/security-management-magazine/articles/2010/05/china-stepping-up-spying-against-u.s/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/from-response-to-recovery/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/forging-public-private-relationships/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/picture-of-health/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/putting-duty-of-care-on-the-radar/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/finding-food-security-solutions/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/reining-in-data-collection/2019-08-01T18:07:19-04:00weekly0.5/security-management-magazine/articles/2010/05/two-tools-to-hold-off-hackers/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/05/the-golden-rule/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/05/legal-report-may-2010/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/05/industry-news-may-2010/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/05/caring-for-patients/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/04/tsa-not-doing-enough-to-protect-railways-from-terrorism-says-sen.-lautenberg/2020-06-23T19:23:01-04:00weekly0.5/security-management-magazine/articles/2010/04/pets-receive-x-ray-security-screening-for-bombs-at-israels-ben-gurion-airport/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/04/dhs-working-internationally-to-protect-global-aviation-system/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/04/behind-the-numbers/2019-08-01T18:07:20-04:00weekly0.5/security-management-magazine/articles/2010/04/yet-another-cyber-wake-up-call/2020-11-25T16:36:00-05:00weekly0.5/security-management-magazine/articles/2010/04/a-trojan-seal/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/aviation-and-airport-security-terrorism-and-safety-concerns-second-edition/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/holes-in-hotel-security/2020-10-23T15:18:33-04:00weekly0.5/security-management-magazine/articles/2010/04/challenges-facing-diplomatic-security/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/got-your-number/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/parsing-public-support/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/global-security-collaboration-grows/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/the-rewards-of-pci-compliance/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/the-evolving-terrorist-threat/2020-06-23T19:23:02-04:00weekly0.5/security-management-magazine/articles/2010/04/schooled-in-preparedness/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/doing-it-the-dutch-way/2019-08-01T18:07:21-04:00weekly0.5/security-management-magazine/articles/2010/04/legal-report-april-2010/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/04/industry-news-april-2010/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/04/breaches-lead-to-employee-training/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/04/managing-big-egos/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/lawmakers-hold-hearing-on-whistleblower-bill/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/biometrics-restriction-defeated-by-new-hampshire-legislature/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/state-lawmakers-defeat-bill-banning-biometrics/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/bomb-sniffing-dogs-bought-by-navy-found-in-deplorable-condition/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/experts-shift-underway-from-government-centric-approach-to-emergency-management/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/companies-seek-full-body-scans-that-ease-health-privacy-concerns/2019-08-01T18:07:22-04:00weekly0.5/security-management-magazine/articles/2010/03/legislation-would-provide-security-fix/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/from-top-to-bottom/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/defense-contractors-in-afghanistan/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/worth-a-look-strongwebmail/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/anthropology-and-the-army/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/how-stadiums-sport-security/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/israels-lessons-in-public-resilience/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/the-push-for-safer-chemicals/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/eyes-on-the-road/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/contractor-challenges-in-afghanistan/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/investing-in-privacy/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/watch-your-business-partners/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/how-intelligent-are-analytics/2019-08-01T18:07:23-04:00weekly0.5/security-management-magazine/articles/2010/03/dos-and-donts-of-documentation/2020-02-19T16:57:38-05:00weekly0.5/security-management-magazine/articles/2010/03/legal-report-march-2010/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/03/industry-news-march-2010/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/03/measuring-guard-performance/2023-12-14T12:52:01-05:00weekly0.5/security-management-magazine/articles/2010/02/jury-awards-$1.5-million-in-retaliation-case/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/congressman-admonishes-dhs-for-neglecting-public-concerns-over-screening-technology/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/obama-requests-$1-billion-to-protect-the-airline-industry-and-its-passengers-in-2011/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/building-a-digital-forensic-laboratory-establishing-and-managing-a-successful-facility/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/court-case-couple-may-sue-over-hacking-incident/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/improving-witness-identification/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/environmental-and-security-groups-align/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/pandemic-lessons-learned/2019-08-01T18:07:24-04:00weekly0.5/security-management-magazine/articles/2010/02/strategic-theater-yields-lessons/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/testing-company-aces-data-privacy-and-security/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/new-bugging-threats/2021-01-29T12:41:24-05:00weekly0.5/security-management-magazine/articles/2010/02/reining-in-web-2.0/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/from-research-to-reality/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/how-to-handle-poison-pen-letters/2024-01-12T11:33:10-05:00weekly0.5/security-management-magazine/articles/2010/02/biometrics-put-to-the-test/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/legal-report-february-2010/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/industry-news-february-2010/2019-08-01T18:07:25-04:00weekly0.5/security-management-magazine/articles/2010/02/when-employees-vent/2020-08-11T10:50:29-04:00weekly0.5/security-management-magazine/articles/2010/02/being-forewarned/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/02/counterterror-technology-and-reaction/2020-06-23T19:23:02-04:00weekly0.5/security-management-magazine/articles/2010/01/radicalized-americans-in-yemen-and-somalia-may-pose-threat-to-united-states/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/9-11-commission-co-chairs-mass-of-data-analysis-failures-main-culprits-of-christmas-day-attack/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/u.s.-airline-industry-fears-security-fee-hikes/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/tyco-acquires-broadview-security/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/senator-warns-of-boarding-pass-sleight-of-hand/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/u.k.-twitter-joke-lands-man-in-jail/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/another-montana-airport-looks-into-private-security-companies-after-breach/2019-08-01T18:07:26-04:00weekly0.5/security-management-magazine/articles/2010/01/polls-show-americans-support-harsher-aviation-security-measures/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/asis-report-tackles-preventing-burglaries-at-businesses/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/airport-security-upgrades-too-expensive-for-most-african-nations/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/hot-docs-christmas-day-terrorist-attack-edition/2020-06-23T19:23:03-04:00weekly0.5/security-management-magazine/articles/2010/01/faqs-whole-body-imaging/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/is-whole-body-imaging-the-answer-to-passenger-screening/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/enforcement-woes-on-first-day-of-new-screening-rules/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/pilot-angered-he-was-not-notified-of-attempted-attack-while-in-air/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/tsa-toughens-screening-for-travelers-from-14-countries/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/appeals-court-finds-taser-wielding-police-officer-used-excessive-force-during-traffic-stop/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/data-mining-for-intelligence-fraud-and-criminal-detection/2019-08-01T18:07:27-04:00weekly0.5/security-management-magazine/articles/2010/01/achieving-goals-in-the-new-year/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/leadership-without-borders/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/parking-lot-negligence/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/federal-whistleblower-protections/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/how-do-we-view-risks/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/cyber-neighborhood-watch/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/the-skinny-on-cfats/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/i-spy-with-my-electronic-eye/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/will-mexican-law-impact-business/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/protecting-intellectual-property-worldwide/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/fraud-and-small-business/2019-08-01T18:07:28-04:00weekly0.5/security-management-magazine/articles/2010/01/robbery-risk-reduction/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2010/01/rising-to-new-heights/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2010/01/lessons-for-layering/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2010/01/legal-report-january-2010/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2010/01/industry-news-january-2010/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2010/01/tailored-training/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/anatomy-of-a-security-breakdown/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/alleged-theft-at-citibank-underscores-worries-over-online-bank-robberies/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/civil-liberty-concerns-could-become-a-factor-in-grants-to-state-fusion-centers/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/blackwater-participated-in-cia-snatch-and-grab-raids/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/secret-service-takes-blame-for-security-breach-at-white-house-state-dinner/2019-08-01T18:07:29-04:00weekly0.5/security-management-magazine/articles/2009/12/air-cargo-vulnerable-to-tampering-before-loading-report-finds/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/new-york-city-phases-out-rolldown-security-gates/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/solving-employee-theft-new-insights-new-tactics/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/cross-pollination-yields-bumper-crop-of-ideas/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/days-of-enlightenment/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/access-control-needs-for-end-users/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/aid-and-security/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/dna-analysis-proven-forensic-science/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/the-realities-of-suicide-by-cop/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/a-new-look-at-forensics/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/baker-saves-dough/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/engineering-jihad/2019-08-01T18:07:30-04:00weekly0.5/security-management-magazine/articles/2009/12/how-effectively-are-funds-being-spent-in-afghanistan/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/emphasizing-app-security/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/reclaiming-reputations/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/new-solutions-to-old-problems/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/the-utility-of-securing-the-electric-supply/2020-11-25T17:15:42-05:00weekly0.5/security-management-magazine/articles/2009/12/legal-report-december-2009/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/industry-news-december-2009/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/12/building-a-strong-staff/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/11/credit-cards-good-enough-to-clear-security-at-ohare-investigation-reveals/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/11/u.s.-congressional-legislation-food-safety/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/11/tsa-revises-passenger-screening-policies-after-wrongfully-detaining-ron-paul-aide/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/11/asis-and-iacp-agree-to-develop-information-sharing-programs/2019-08-01T18:07:31-04:00weekly0.5/security-management-magazine/articles/2009/11/following-recommended-security-practices-helps-ship-fend-off-pirates/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/companies-need-data-champion/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/avoid-becoming-a-victim-of-atm-crime/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/atm-fraud-trends-in-europe/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/borderline-controls/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/operational-risk-management-a-case-study-approach-to-effective-planning-and-response/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/should-dhs-quantify-collaboration/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/choosing-the-right-antiterrorism-crash-barrier/2020-06-23T19:23:04-04:00weekly0.5/security-management-magazine/articles/2009/11/university-student-can-not-sue-for-unforeseeable-assault/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/how-safe-is-smart-grid/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/protecting-caregivers/2019-08-01T18:07:32-04:00weekly0.5/security-management-magazine/articles/2009/11/keeping-insiders-out/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/listening-through-walls/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/securitys-legerdemain/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/countries-see-bullying-drop/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/aligning-security-and-company-risk/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/firewalls-ips-lauded/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/hands-on-solutions/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/park-place/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/legal-report-november-2009/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/industry-news-november-2009/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/11/providing-service-to-improve-security/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/10/blackberry-app-can-spy-on-you-us-cert-warns/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/10/clinic-ups-security-due-to-anger-over-swine-flu-vaccine-shortage/2019-08-01T18:07:33-04:00weekly0.5/security-management-magazine/articles/2009/10/montana-airport-to-privatize-security-screening/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/u.k.-researchers-develop-anti-card-counting-surveillance-tool/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/fincen-details-anti-money-laundering-trends-at-large-u.s.-banks/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/energy-companies-vie-for-iraq-oil/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/dhs-to-move-3200-contractor-jobs-in-house/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/airline-employees-helped-smuggle-drugs-from-puerto-rico-to-miami-and-new-york/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/french-antiterrorism-officials-worry-about-keister-bombs/2020-06-23T19:23:05-04:00weekly0.5/security-management-magazine/articles/2009/10/chicago-public-school-systems-anti-violence-plan-pins-its-hope-on-data-analysis/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/colorado-releases-video-describing-the-8-signs-of-terrorism/2020-06-23T19:23:06-04:00weekly0.5/security-management-magazine/articles/2009/10/protecting-the-nation-from-a-distance/2019-08-01T18:07:34-04:00weekly0.5/security-management-magazine/articles/2009/10/passenger-screening-progress/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/behind-the-numbers-malicious-web-site-hosting-per-country/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/cultivating-creativity-for-competitive-advantage/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/report-how-effective-is-the-eus-data-protection-directive/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/federal-perspective---tsa/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/report-on-gun-violence-reduction-measures/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/the-management-of-police-specialized-tactical-units-second-edition/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/cold-cases-and-social-search/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/fusion-centers-forge-ahead/2020-06-23T19:23:06-04:00weekly0.5/security-management-magazine/articles/2009/10/terror-financing-trends/2020-06-23T19:23:07-04:00weekly0.5/security-management-magazine/articles/2009/10/eyeing-studies-about-surveillance-systems/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/project-safe-neighborhoods/2019-08-01T18:07:35-04:00weekly0.5/security-management-magazine/articles/2009/10/scanning-crowds-for-bombs/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/surveillance-never-folds/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/eu-data-protection-law-needs-overhaul/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/race-for-iraq-oil-stalled-by-security-fears/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/nuclear-energy-agreement-raises-concerns/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/eu-balks-at-employee-monitoring/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/exercising-is-good-for-everyone/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/absence-of-malware/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/legal-report-october-2009/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/industry-news-october-2009/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/10/foserting-awareness/2019-08-01T18:07:36-04:00weekly0.5/security-management-magazine/articles/2009/09/cheap-sensor-can-detect-trace-amounts-of-toxin-and-tnt-in-water-researchers-report/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/background-screening-hot-topic-after-arrest-in-yale-murder-case/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/liquid-restrictions-could-be-over-in-2010-while-tsa-begins-screening-powders/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/cctv-reclaims-public-housing-complexes-in-newark/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/aeromexico-plane-hijacked-by-three-men-lands-in-mexico-city-safely/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/saudi-suicide-bomber-hid-ied-in-his-anal-cavity/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/california-cruisin/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/the-criminal-records-manualcriminal-records-in-america/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/report-on-the-underground-cybercrime-economy/2019-08-01T18:07:37-04:00weekly0.5/security-management-magazine/articles/2009/09/report-cyberspace-policy-review/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/data-security-through-deletion/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/behind-the-numbers-access-controls-used-for-high-security-areas/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/keys-to-fraud-prevention/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/do-arrests-predict-future-behavior/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/streamlining-air-passenger-security-screening/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/ruling-against-fraud-alert-companies/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/new-cybersecurity-push-old-problem/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/visualizing-safer-evacuations/2020-10-02T16:27:56-04:00weekly0.5/security-management-magazine/articles/2009/09/busting-crime-on-a-budget/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/data-remains-on-discarded-drives/2019-08-01T18:07:38-04:00weekly0.5/security-management-magazine/articles/2009/09/leader-of-islamic-group-urges-u.s.-to-keep-promises/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/fake-medicines-require-global-remedy/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/do-virtual-server-risks-outweigh-rewards/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/social-engineering-risks/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/unconventional-cooperation/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/fifty-four-minutes-after-midnight/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/legal-report-september-2009/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/industry-news-september-2009/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/09/when-the-chips-are-down/2019-08-01T18:07:39-04:00weekly0.5/security-management-magazine/articles/2009/08/obsession-with-911-leaves-commercial-carriers-vulnerable-says-pilot/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/states-praise-dhss-new-management-engagement/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/nuclear-power-plants-move-to-software-based-risk-assessments-to-fend-off-fire/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/travelers-provide-airlines-with-birth-date-and-gender-starting-saturday/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/california-prison-had-history-of-safety-problems/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/lapd-chief-bratton-resigns-for-plum-position-in-private-sector/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/a-natural-solution-to-security-problems/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/av-lives/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/a-war-of-choice-on-drugs-in-mexico/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/a-natural-solution-to-security-problems2/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/arab-public-opinion-shifts-in-positive-direction/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/arabs-perception-of-us-improving/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/defense-in-breadth/2019-08-01T18:07:40-04:00weekly0.5/security-management-magazine/articles/2009/08/court-case-drug-testing-must-be-observed/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/preparing-for-cyber-extortion/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/connecting-the-dots-protecting-rights/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/fighting-against-the-wind/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/identifying-disease-spread-on-planes/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/protecting-private-jets/2024-01-12T11:26:48-05:00weekly0.5/security-management-magazine/articles/2009/08/a-picture-perfect-warehouse/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/human-trafficking-tough-to-quantify-and-prosecute/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/assessing-explosives-detection/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/schools-learn-security-lessons/2019-08-01T18:07:41-04:00weekly0.5/security-management-magazine/articles/2009/08/you-earned-it/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/08/legal-report-august-2009/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/08/industry-news-august-2009/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/08/adapting-to-change/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/07/house-votes-to-give-more-power-to-fda-to-protect-food-supply/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/07/firefighting-robots-protect-london/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/07/tjx-settles-data-breach-for-$9.7-million/2020-06-23T19:23:07-04:00weekly0.5/security-management-magazine/articles/2009/07/dhs-continues-its-pr-makeover/2019-08-01T18:07:42-04:00weekly0.5/security-management-magazine/articles/2009/07/atlantic-city-casino-security-can-detain-underage-gamblers-drinkers/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/senate-to-move-fast-on-federal-building-security-in-reports-aftermath/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/black-boxes-to-get-back-up-battery/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/new-information-sharing-task-force-nets-arrest-of-2-u.k.-cybergangs/2019-10-18T10:10:57-04:00weekly0.5/security-management-magazine/articles/2009/07/social-security-numbering-system-leaves-public-vulnerable/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/technology-eases-twic-compliance/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/a-sentinel-of-the-south-hopes-nation-listens/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/cybersecurity-sector-driven-standards/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/fbi-details-cyber-sting/2020-06-23T19:23:08-04:00weekly0.5/security-management-magazine/articles/2009/07/how-to-complete-a-risk-assessment-in-5-days-or-less/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/managing-risk-across-the-enterprise/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/outsourcing-helps-pci-woes/2019-08-01T18:07:43-04:00weekly0.5/security-management-magazine/articles/2009/07/security-awareness/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/security-budget-plunge/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/state-legislation-illinois-trade-secrets/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/making-sense-of-surveillance-claims/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/new-mexicos-private-security-watchdog/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/plain-language-not-a-communications-panacea/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/sleuthing-nuclear-smuggling/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/a-fast-solution-for-rapid-transit/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/preventing-squatting-in-britain/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/intellectual-property-piracy-harms-global-economy/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/creative-approaches-to-security-awareness-training/2019-08-01T18:07:44-04:00weekly0.5/security-management-magazine/articles/2009/07/cloud-security-in-the-air/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/07/taking-the-trauma-out-of-security/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/07/complex-rules-present-compliance-challenge/2020-06-23T19:23:08-04:00weekly0.5/security-management-magazine/articles/2009/07/legal-report-july-2009/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/07/industry-news-july-2009/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/07/who-handles-your-cash/2021-01-21T15:33:40-05:00weekly0.5/security-management-magazine/articles/2009/06/administration-plans-to-send-national-guard-to-mexican-border/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/cbp-testing-drone-along-northern-border/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/best-teams-hope-to-stem-smuggling-at-three-u.s.-ports/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/house-homeland-security-committee-passes-antiterrorism-standards-for-chemical-facilities/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/radiological-detectors-not-worth-the-cost-says-gao/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/dhs-ig-says-general-aviation-does-not-present-serious-terrorist-threat/2019-08-01T18:07:45-04:00weekly0.5/security-management-magazine/articles/2009/06/low-level-terrorism-equals-protests-question-pulled-by-pentagon/2020-10-02T16:33:11-04:00weekly0.5/security-management-magazine/articles/2009/06/union-of-murdered-guard-wanted-protective-vests/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/raytheon-pushes-math-and-science-both-critical-to-cybersecurity-it-says/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/armorgroup-will-still-protect-u.s.-embassy-in-kabul/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/homeland-security-heads-to-high-school/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/gunman-kills-security-guard-at-holocaust-museum/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/house-votes-to-limit-whole-body-imaging-at-airports/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/airline-employee-helps-roommate-smuggle-handgun/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/youtube-account-holders-target-of-phishing-scam/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/tsa-halts-delta-flights-to-kenya/2019-08-01T18:07:46-04:00weekly0.5/security-management-magazine/articles/2009/06/be-careful-what-you-search-for/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/borders-complicate-efforts-to-secure-personal-data/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/100-cargo-screening-feasible/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/cargo-security-deadline-in-doubt/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/internet-crime-complaints-rose-33-in-2008/2020-06-23T19:23:09-04:00weekly0.5/security-management-magazine/articles/2009/06/do-improvement-districts-cut-crime/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/resilience-key-to-recovery/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/air-cargo-security-deadline-in-doubt/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/railroads-find-common-contractor-screening-solution/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/schooled-on-vulnerabilities/2019-08-01T18:07:47-04:00weekly0.5/security-management-magazine/articles/2009/06/indias-growing-security-industry/2020-06-23T19:23:09-04:00weekly0.5/security-management-magazine/articles/2009/06/interrupting-the-money-flow/2020-06-23T19:23:10-04:00weekly0.5/security-management-magazine/articles/2009/06/collaboration-key-to-protecting-data/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/new-voip-encryption-challenges/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/drug-wars-rough-waters/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/dont-let-the-plan-be-the-disaster/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/dover-speedway-plays-it-safe/2020-06-23T19:23:11-04:00weekly0.5/security-management-magazine/articles/2009/06/legal-report-june-2009/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/industry-news-june-2009/2019-08-01T18:07:48-04:00weekly0.5/security-management-magazine/articles/2009/06/hot-tips-for-hotlines/2020-08-11T10:53:51-04:00weekly0.5/security-management-magazine/articles/2009/05/blog-software-creator-stands-up-to-the-great-firewall-of-china/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/90-percent-of-e-mail-is-spam-according-to-report/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/homeland-security-advocates-jewish-group-call-for-increased-security-spending-after-terror-plot/2020-06-23T19:23:11-04:00weekly0.5/security-management-magazine/articles/2009/05/domestic-terrorism-plot-against-nyc-synagogues-air-national-guard-broken-up/2020-06-23T19:23:12-04:00weekly0.5/security-management-magazine/articles/2009/05/u.s.-banks-lose-big-to-cyberthieves/2020-06-23T19:23:12-04:00weekly0.5/security-management-magazine/articles/2009/05/privacy-advocates-say-no-to-whole-body-imaging/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/british-airport-tests-facial-recognition-security-gates/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/tsas-secure-flight-launches-friday-amid-auditors-concerns/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/dept.-of-transportation-air-traffic-control-systems-have-been-hacked/2020-11-25T16:47:04-05:00weekly0.5/security-management-magazine/articles/2009/05/gao-report-on-diploma-mills/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/public-education/2019-08-01T18:07:49-04:00weekly0.5/security-management-magazine/articles/2009/05/how-to-avoid-hiring-mishaps/2019-08-01T18:07:50-04:00weekly0.5/security-management-magazine/articles/2009/05/crimeware-understanding-new-attacks-and-defenses/2020-06-23T19:23:13-04:00weekly0.5/security-management-magazine/articles/2009/05/data-breach-costs/2020-06-23T19:23:13-04:00weekly0.5/security-management-magazine/articles/2009/05/report-customer-relationships-suffer-after-data-breaches/2020-06-23T19:23:14-04:00weekly0.5/security-management-magazine/articles/2009/05/developing-an-antipiracy-program/2021-01-13T07:56:44-05:00weekly0.5/security-management-magazine/articles/2009/05/can-you-see-me-now/2019-08-01T18:07:50-04:00weekly0.5/security-management-magazine/articles/2009/05/gray-hat-hacking/2020-06-23T19:23:14-04:00weekly0.5/security-management-magazine/articles/2009/05/airport-style-screening-not-yet-feasible-for-u.k.s-railway-system/2020-06-23T19:23:14-04:00weekly0.5/security-management-magazine/articles/2009/05/tying-terror-groups-to-attacks/2020-06-23T19:23:15-04:00weekly0.5/security-management-magazine/articles/2009/05/traditional-profiling-ineffective-study-says/2019-08-01T18:07:50-04:00weekly0.5/security-management-magazine/articles/2009/05/confessions-corrupting-witnesses/2019-08-01T18:07:50-04:00weekly0.5/security-management-magazine/articles/2009/05/problems-with-pandemic-monitoring/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/are-you-prepared-for-all-hazards/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/securitys-new-chapter/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/risks-of-aid-work-in-pakistan/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/digging-into-data-about-getting-out/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/global-security-on-track/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/getting-the-bosss-ear/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/hardening-flash-drives/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/security-in-tough-times/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/communicating-to-save-lives/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/healthy-data-security/2019-08-01T18:07:51-04:00weekly0.5/security-management-magazine/articles/2009/05/how-to-avoid-hiring-mishaps2/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/05/legal-report-may-2009/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/05/industry-news-may-2009/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/accredited-schools/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/86-percent-of-public-schools-reported-crimes-in-05-06-school-year/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/bank-crime-surges-in-4th-quarter-2008-but-down-for-year/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/twic-compliance-starts-today-critics-angry-card-readers-not-deployed/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/10-years-after-columbine-schools-not-doing-the-little-things/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/american-captain-freed-by-u.s.-snipers/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/american-captain-attempts-escape-and-fails/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/2008-the-deadliest-year-for-aid-workers-report-says/2019-08-01T18:07:52-04:00weekly0.5/security-management-magazine/articles/2009/04/american-crew-retakes-ship-from-somali-pirates/2019-08-01T18:09:35-04:00weekly0.5/security-management-magazine/articles/2009/04/elsewhere-in-the-courts-negligent-hiring/2019-08-01T18:09:35-04:00weekly0.5/security-management-magazine/articles/2009/04/state-perspective---colorado/2019-08-01T18:09:35-04:00weekly0.5/security-management-magazine/articles/2009/04/ensuring-an-uneventful-stay/2020-10-23T15:16:13-04:00weekly0.5/security-management-magazine/articles/2009/04/private-security-counters-pirates/2019-08-01T18:09:36-04:00weekly0.5/security-management-magazine/articles/2009/04/fighting-stalking/2019-08-01T18:09:36-04:00weekly0.5/security-management-magazine/articles/2009/04/maintaining-security-in-a-down-economy/2019-08-01T18:09:36-04:00weekly0.5/security-management-magazine/articles/2009/04/private-plane-regulation-opposed/2019-08-01T18:09:36-04:00weekly0.5/security-management-magazine/articles/2009/04/slow-going-in-utility-cybersecurity/2020-11-25T16:58:37-05:00weekly0.5/security-management-magazine/articles/2009/04/securitys-way-of-wisdom/2019-08-01T18:09:36-04:00weekly0.5/security-management-magazine/articles/2009/04/cooperation-on-the-border/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/nuclear-threat-high-or-highly-exaggerated/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/terrorism-concerns-businesses-worldwide/2020-06-23T19:23:15-04:00weekly0.5/security-management-magazine/articles/2009/04/protecting-homo-sapiens/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/challenges-of-coming-together/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/legal-report-april-2009/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/industry-news-april-2009/2019-08-01T18:09:37-04:00weekly0.5/security-management-magazine/articles/2009/04/investigating-the-competition/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/04/taser-electronic-control-devices-and-sudden-in-custody-death-separating-evidence-from-conjecture/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/border-sheriffs-say-federal-government-must-do-more-to-secure-border/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/gao-tsa-needs-to-complete-risk-assessments-of-nations-commercial-trucking-and-bus-industries/2020-06-23T19:23:15-04:00weekly0.5/security-management-magazine/articles/2009/03/not-enough-port-workers-have-twic-cards-prompting-fears-of-port-slowdown/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/american-gun-flow-into-mexico-must-be-stopped-lawmakers-and-officials-say/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/smaller-churches-lack-security-experts-say/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/fatal-shooting-thrusts-church-security-into-spotlight-again/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/floridas-fugate-tapped-to-head-fema/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/challenges-of-coming-together/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/biometrics-for-dummies/2019-08-01T18:09:38-04:00weekly0.5/security-management-magazine/articles/2009/03/the-dark-side-the-inside-story-of-how-the-war-on-terror-turned-into-a-war-on-american-ideals/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/is-hazmat-safety-on-track/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/how-to-fire-a-key-employee/2020-08-11T10:44:31-04:00weekly0.5/security-management-magazine/articles/2009/03/create-a-no-phishing-zone/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/shedding-light-on-nighttime-surveillance/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/federation-in-the-cloud/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/its-all-about-risk/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/internet-hate-a-tough-problem-to-combat/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/staying-secure-while-saving-the-worlds-wildlife/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/vancouver-shoots-for-gold/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/an-index-of-atrocity/2019-08-01T18:09:39-04:00weekly0.5/security-management-magazine/articles/2009/03/limits-to-the-war-on-terror/2020-06-23T19:23:16-04:00weekly0.5/security-management-magazine/articles/2009/03/tracking-wireless-devices/2020-06-23T19:23:17-04:00weekly0.5/security-management-magazine/articles/2009/03/technology-offers-security-and-speed-at-the-border/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/03/keeping-tours-on-track/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/03/legal-report-march-2009/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/03/industry-news-march-2009/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/03/hard-and-soft-power-in-africa/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/body-scanners-used-as-primary-screening-technology-in-tulsa-international-airport/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/casinos-fear-iphone-card-counting-application/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/some-wildfires-in-australia-believed-to-be-the-work-of-arsonists/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/port-of-long-beach-fusion-center-opens/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/cambridge-city-council-stops-activation-of-surveillance-cameras/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/sec-failed-to-act-on-whistleblowers-warnings-in-madoff-case/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/whistleblower-tried-for-years-to-get-sec-to-stop-alleged-madoff-scheme/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/pandemic-preparedness/2019-08-01T18:09:40-04:00weekly0.5/security-management-magazine/articles/2009/02/china-rising/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/diversifying-security-technology/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/prisons-struggle-to-keep-out-contraband-cell-phones/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/ad-hoc-networks-a-key-to-disaster-communications/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/standards-for-explosives-detection/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/a-federation-of-e-mails/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/has-u.k.-security-officer-regulation-been-a-success/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/cooperating-for-security-in-pan-asia/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/measuring-true-security-risk/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/roboform-enterprise/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/robbers-cant-bank-on-lax-security/2019-08-01T18:09:41-04:00weekly0.5/security-management-magazine/articles/2009/02/too-much-information/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/02/biothreat-detection-and-response/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/02/legal-report-february-2009/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/02/industry-news-february-2009/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/02/steps-toward-career-success/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/01/man-with-painted-face-kills-two-babies-and-one-adult-at-belgium-nursery/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/01/applicants-for-twic-should-stick-to-tsa-website-or-hotline-agency-says/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/01/another-murder-at-virginia-tech-mass-notification-system-successful/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/01/virginia-tech-victim-was-decapitated-say-police/2019-08-01T18:09:42-04:00weekly0.5/security-management-magazine/articles/2009/01/bill-would-allow-prisons-to-jam-cell-phone-signals/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/transportation-plan-unveiled-for-inauguration-weekend-activities/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/tsa-to-extend-post-9-11-security-rules-to-private-jets/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/2009s-black-swans-for-international-security/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/how-to-handle-a-crisis/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/active-shooter-guidelines/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/pandemic-guidelines/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/identity-theft-loose-ends/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/challenges-for-the-new-administration/2019-08-01T18:09:43-04:00weekly0.5/security-management-magazine/articles/2009/01/the-new-administrations-plans/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/femas-lingering-trailer-trouble/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/security-rocks/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/outlook-alters-terrorism-tactics/2020-06-23T19:23:17-04:00weekly0.5/security-management-magazine/articles/2009/01/a-new-group-targets-nuclear-security/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/e-mail-archiving/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/securing-the-clouds/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/harassment-prevention/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/combining-town-and-gown/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/the-good-steward/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/industry-news-january-2009/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2009/01/legal-report-january-2009/2019-08-01T18:09:44-04:00weekly0.5/security-management-magazine/articles/2008/12/background-screening-and-investigations-managing-hiring-risk-from-the-hr-and-security-perspectives/2021-01-05T09:42:36-05:00weekly0.5/security-management-magazine/articles/2008/12/nrc-strengthens-security-at-nuclear-plants/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/canada-greyhound-buses-strengthen-security-measures/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/blackwater-guards-surrender-to-authorities/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/terrorism-insurance-reauthorized-for-7-more-years/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/more-marshals-for-courthouse-security/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/federal-law-includes-identity-theft-provisions/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/benchmarking-guidance-for-csos/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/british-reveal-risk-register/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/cyberwar-gets-real/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/tsas-access-control-criticized/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/railroad-safety-labor-changes/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/too-much-information/2019-08-01T18:09:45-04:00weekly0.5/security-management-magazine/articles/2008/12/nuclear-vulnerabilities/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/new-standards-for-drug-couriers/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/dhs-takes-on-transational-gangs/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/new-life-for-terror-databases/2020-06-23T19:23:17-04:00weekly0.5/security-management-magazine/articles/2008/12/the-import-of-good-security/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/fighting-fraud/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/protecting-personal-e-mail/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/outwitting-the-outlaws/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/attention-shoplifters/2020-02-25T17:20:11-05:00weekly0.5/security-management-magazine/articles/2008/12/legal-report-december-2008/2019-08-01T18:09:46-04:00weekly0.5/security-management-magazine/articles/2008/12/industry-news-december-2008/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/12/insights-on-investigations/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/12/privacy-minded/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/12/the-biometric-devils-in-the-details/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/law-broadens-ada-protections/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/are-robot-soldiers-more-ethical-than-humans/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/study-of-bullies-brains-shows-enjoyment-of-inflicting-pain/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/companies-face-new-id-theft-rules/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/after-the-flood/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/jihad-and-american-medicine-thinking-like-a-terrorist-to-anticipate-attacks-via-our-health-system/2020-06-23T19:23:18-04:00weekly0.5/security-management-magazine/articles/2008/11/changing-priorities/2019-08-01T18:09:47-04:00weekly0.5/security-management-magazine/articles/2008/11/taking-the-call-with-confidence/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/can-data-mining-and-privacy-coexist/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/the-future-of-threat-predictions/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/dhs-seeks-seamless-transition/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/mapping-terrorist-planning/2020-06-23T19:23:18-04:00weekly0.5/security-management-magazine/articles/2008/11/keeping-cool-in-a-crisis/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/russias-cybercrime-haven/2020-06-23T19:23:18-04:00weekly0.5/security-management-magazine/articles/2008/11/european-union-and-united-states-counterterrorism-cooperation/2020-06-23T19:23:19-04:00weekly0.5/security-management-magazine/articles/2008/11/a-new-drug-battlefield/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/malware-protection-in-the-cloud/2019-08-01T18:09:48-04:00weekly0.5/security-management-magazine/articles/2008/11/report-targets-telecommuting/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/11/phone-authentication-a-good-call/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/11/can-i-get-a-witness/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/11/rising-to-the-challenge/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/11/responding-to-eeoc-complaints/2024-01-12T11:07:28-05:00weekly0.5/security-management-magazine/articles/2008/11/legal-report-november-2008/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/11/industry-news-november-2008/2021-01-29T12:24:46-05:00weekly0.5/security-management-magazine/articles/2008/10/malware-attacks-show-the-connection-between-markets-and-cybercrime/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/10/tsa-takes-over-matching-passengers-to-watch-list-from-airlines/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/10/two-u.s.-labs-working-with-deadly-germs-not-secure-says-gao/2020-06-23T19:23:19-04:00weekly0.5/security-management-magazine/articles/2008/10/maryland-state-police-spied-on-nonviolent-activists-and-labeled-them-terrorists/2019-08-01T18:09:49-04:00weekly0.5/security-management-magazine/articles/2008/10/academic-corporate-and-government-organizations-unite-to-solve-identity-management-problems/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/2009-homeland-security-appropriations-breakdown/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/u.s.-federal-legislation-airport-screening/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/elsewhere-in-the-courts-background-screening/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/workplace-strategies-for-pandemic-preparedness/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/buildings-most-vulnerable-to-laptop-theft/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/banking-against-proliferation/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/a-burning-issue-how-to-save-lives/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/a-deadly-serious-game/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/dhs-funds-to-boost-bomb-squads/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/a-new-generation-for-911/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/how-safe-are-stun-guns/2019-08-01T18:09:50-04:00weekly0.5/security-management-magazine/articles/2008/10/protecting-personal-information/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/outlook-for-container-scanning/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/dhs-funds-to-boost-bomb-squads2/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/keeping-track-of-deposits/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/librerias-success-story/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/keeping-tabs-on-it-staff/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/security-software-for-free/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/an-eye-for-security/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/port-financing-shows-potential/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/investigating-the-insider/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/legal-report-october-2008/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/industry-news-october-2008/2019-08-01T18:09:51-04:00weekly0.5/security-management-magazine/articles/2008/10/detailing-contractor-obligations/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/small-airports-nationwide-implement-new-security-training/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/islamabad-international-airport-threatened-by-suicide-attack/2020-06-23T19:23:19-04:00weekly0.5/security-management-magazine/articles/2008/09/dhs-working-on-anxiety-detection-screener/2020-06-23T19:23:19-04:00weekly0.5/security-management-magazine/articles/2008/09/brokaw-talks-about-americas-search-for-a-balance-between-freedom-and-security/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/dhs-and-sesame-street-teach-kids-about-disaster-preparedness/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/washington-insiders-carville-and-matalin-dissect-the-presidential-campaign/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/annapolis-police-teach-residents-trash-intelligence/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/u.s.-federal-legislation-school-safety/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/the-design-and-evaluation-of-physical-protection-systems-second-edition/2019-08-01T18:09:52-04:00weekly0.5/security-management-magazine/articles/2008/09/cyber-stats-high/2020-06-23T19:23:19-04:00weekly0.5/security-management-magazine/articles/2008/09/court-case-negligence-and-juvenile-records/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/comrade-j-the-untold-secrets-of-russias-master-spy-in-america-after-the-end-of-the-cold-war/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/crisis-communications/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/ip-standards-on-the-way/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/what-are-csos-worrying-about/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/food-sector-abandons-its-isac/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/software-randomizes-airport-patrols/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/on-the-waterfront/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/colombias-rebels-battle-for-survival/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/fighting-malware-globally/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/making-drugs-that-kill/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/speaking-privately/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/industry-news-september-2008/2019-08-01T18:09:53-04:00weekly0.5/security-management-magazine/articles/2008/09/its-time-to-plan/2020-03-03T11:41:06-05:00weekly0.5/security-management-magazine/articles/2008/09/legal-report-september-2008/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/betting-on-enterprise-risk-management/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/private-records/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/pocket-workplace/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/new-views-on-airport-security/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/cooperation-rules/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/09/brevity-the-soul-of-success/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/08/survey-on-background-screening/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/08/nist-issues-report-on-collapse-of-world-trade-center-building-7/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/08/chertoff-says-laptop-border-searches-based-on-suspicion/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/08/britains-e-passports-can-be-counterfeited/2019-08-01T18:09:54-04:00weekly0.5/security-management-magazine/articles/2008/08/cctv-panacea-or-problem/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/district-offers-security-lessons/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/elsewhere-in-the-courts-school-safety/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/raising-the-bar/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/transportation-and-cargo-security-threats-and-solutions/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/security-company-not-liable-for-arrest-of-innocent-parties/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/patrols-gone-private/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/cracking-down-on-sex-trafficking/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/wiki-and-the-intel-analyst/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/fusion-centers-and-civil-rights/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/hard-questions-in-emergency-critical-care/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/pooling-resources/2019-08-01T18:09:55-04:00weekly0.5/security-management-magazine/articles/2008/08/europe-pushes-for-a-softer-u.s.-line/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/profiling-aviation-threats/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/fueling-nigerias-conflict/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/knowing-the-customers-type/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/virtually-secure-servers/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/how-vulnerable-are-we/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/learning-from-industry-leaders/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/legal-report-august-2008/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/08/industry-news-august-2008/2019-08-01T18:09:56-04:00weekly0.5/security-management-magazine/articles/2008/07/u.s.-federal-legislation-national-security/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/blackwater-to-move-away-from-protection-services/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/ahead-of-olympics-security-measures-create-gloomy-atmosphere-in-beijing/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/anti-terror-toxin-rules-may-impede-research-and-international-cooperation-say-experts/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/disgruntled-computer-engineer-locks-san-francisco-officials-out-of-computer-network/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/amtraks-counterterrorism-program-heads-west/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/dealing-with-problem-employees/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/elsewhere-in-the-courts-workers-compensation/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/britains-identity-crisis/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/car-talk-back/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/cfats-and-comprehensive-chemical-security-management/2020-06-23T19:23:20-04:00weekly0.5/security-management-magazine/articles/2008/07/another-world-of-intelligence/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/can-error-prone-staff-be-spotted/2019-08-01T18:09:57-04:00weekly0.5/security-management-magazine/articles/2008/07/success-for-federal-credentialing/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/intelligence-sharing-improves/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/homeland-security-lost-in-space/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/protecting-soft-targets-in-tough-places/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/click-to-send-illegal-money/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/culprits-not-framed/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/off-network-risks/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/airlines-strive-for-better-it-security/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/the-greening-of-security/2020-11-12T18:01:42-05:00weekly0.5/security-management-magazine/articles/2008/07/dont-strike-out-in-labor-disputes/2021-01-28T13:55:37-05:00weekly0.5/security-management-magazine/articles/2008/07/trends-in-id-cards/2019-08-01T18:09:58-04:00weekly0.5/security-management-magazine/articles/2008/07/legal-report-july-2008/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/07/industry-news-july-2008/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/07/giving-thought-to-process/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/airlines-embassies-against-collecting-biometric-info-on-exiting-foreigners/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/no-expert-needed-in-background-screening-case/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/royal-dutch-shell-offshore-oil-facility-attacked/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/poor-pandemic-advice-for-european-companies/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/gangs-experts-advocate-prevention-over-prosecution-and-prison/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/heart-attacks-car-crashes-top-causes-of-firefighter-death/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/elsewhere-in-the-courts-retaliation/2019-08-01T18:09:59-04:00weekly0.5/security-management-magazine/articles/2008/06/business-background-investigations-tools-and-techniques-for-solution-driven-due-diligence/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/agencies-still-handle-data-with-disregard/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/behind-the-numbers-companies-without-a-comprehensive-privacy-policy/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/chinas-pirates-move-up-value-chain/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/insider-theft-fires-and-vandals-top-list-of-museum-concerns/2020-11-12T16:51:01-05:00weekly0.5/security-management-magazine/articles/2008/06/preventing-wrongful-deportation/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/is-private-industry-a-tsa-scapegoat/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/probing-ports-murky-depths/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/calculating-the-margin-of-terror/2020-06-23T19:23:20-04:00weekly0.5/security-management-magazine/articles/2008/06/securing-medical-data/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/german-courts-rule-against-snooping/2019-08-01T18:10:00-04:00weekly0.5/security-management-magazine/articles/2008/06/an-iron-river-of-guns-flows-south/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/printer-vulnerabilities-exposed/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/strengthening-software-at-the-source/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/reconsidering-the-wisdom-of-thin-clients/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/saving-lives-securely/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/how-to-cultivate-a-safety-culture/2020-02-25T15:49:50-05:00weekly0.5/security-management-magazine/articles/2008/06/simple-steps-to-data-protection/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/smart-phone-data-protection/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/benefits-of-master-planning/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/legal-report-june-2008/2019-08-01T18:10:01-04:00weekly0.5/security-management-magazine/articles/2008/06/industry-news-june-2008/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/06/facilitating-creative-thinking/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/canada-firms-with-government-contracts-face-greater-scrutiny/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/academic-culture-understaffing-blamed-for-higher-ed-it-insecurity/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/bill-would-give-dhs-control-of-foot-and-mouth-research/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/worldwide-terrorism-by-tactic/2020-06-23T19:23:21-04:00weekly0.5/security-management-magazine/articles/2008/05/dont-shoot-the-messenger/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/u.s.-federal-legislation-national-security/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/canadas-privacy-best/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/truths-omitted-rather-than-lies-told/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/securing-voting-machines/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/elsewhere-in-the-courts-drug-use/2019-08-01T18:10:02-04:00weekly0.5/security-management-magazine/articles/2008/05/behind-the-numbers-top-5-drivers-for-corporate-privacy-measures/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/workers-compensation/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/discouraging-loiterers-by-design/2023-12-20T11:40:04-05:00weekly0.5/security-management-magazine/articles/2008/05/secrets-of-a-successful-self-assessment/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/the-art-of-interviews/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/college-footballs-crime-connection/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/will-your-vote-count/2019-08-01T18:10:03-04:00weekly0.5/security-management-magazine/articles/2008/05/homeland-security-hits-high-schools/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/legal-report-may-2008/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/industry-news-may-2008/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/a-new-plan-for-national-response/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/conventional-weapons-unconventional-threat/2020-06-23T19:23:21-04:00weekly0.5/security-management-magazine/articles/2008/05/parking-snatcher-solution/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/sao-paulo-makes-headway-against-crime/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/spike-in-fake-euros-raises-concern/2019-08-01T18:11:58-04:00weekly0.5/security-management-magazine/articles/2008/05/reclaiming-stolen-assets-from-corrupt-autocrats/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/05/social-sites-more-foe-than-friend/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/05/where-criminals-fear-to-tread/2020-06-30T11:23:47-04:00weekly0.5/security-management-magazine/articles/2008/05/digital-video-vulnerabilities/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/04/u.s.-federal-legislation-whistleblowers/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/04/virginia-tech-massacre-leads-to-new-safety-nets-on-campuses/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/04/draft-security-plans-for-the-world-trade-center-modeled-off-londons-ring-of-steel/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/04/dengue-fever-infects-55000-in-rio/2019-08-01T18:11:59-04:00weekly0.5/security-management-magazine/articles/2008/04/boise-most-vulnerable-city-in-western-u.s.-to-terrorist-attack/2020-06-23T19:23:22-04:00weekly0.5/security-management-magazine/articles/2008/04/u.s.-federal-legislation-terrorism-insurance/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/worldwide-terrorism-by-target/2020-06-23T19:23:22-04:00weekly0.5/security-management-magazine/articles/2008/04/teaming-up-to-reduce-risk/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/house-of-worship-security-and-training-tips/2020-02-26T10:53:20-05:00weekly0.5/security-management-magazine/articles/2008/04/elsewhere-in-the-courts-employment-screening/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/elsewhere-in-the-courts-mental-health/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/elsewhere-in-the-courts-sexual-harrassment/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/employee-sues-for-intentional-emotional-distress/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/the-right-way-to-go-wireless/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/food-testing-trends/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/protecting-the-brand/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/communications-upgrade/2019-08-01T18:12:00-04:00weekly0.5/security-management-magazine/articles/2008/04/legal-report-april-2008/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/industry-news-april-2008/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/painless-performance-reviews/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/learning-bomb-making-secrets/2020-06-23T19:23:22-04:00weekly0.5/security-management-magazine/articles/2008/04/drivers-license-rule-improved-but-imperfect/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/order-in-the-court/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/risk-and-reward-in-global-markets/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/security-research-gets-a-boost-from-the-eu/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/russian-cybercrooks-adopt-lower-profile/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/e-mail-encryption-gets-practical/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/new-trends-in-system-password-management/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/04/recipe-for-success/2019-08-01T18:12:01-04:00weekly0.5/security-management-magazine/articles/2008/03/more-passport-files-of-flagged-individuals-viewed/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/u.s.-federal-legislation-airport-security/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/public-safety-spectrum-auction-fails-to-secure-bid/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/canadian-counterterrorism-building-plans-found-in-garbage/2020-06-23T19:23:23-04:00weekly0.5/security-management-magazine/articles/2008/03/legislation-seeks-dhs-grants-for-schools/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/budget-and-staffing-cuts-hurt-federal-protective-service/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/oklahoma-bill-allows-concealed-weapons-on-campus/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/belgrade-embassy-lacked-proper-setback/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/australia-security-industry-gets-tough-on-its-guards/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/worldwide-terrorism-by-target/2020-06-23T19:23:23-04:00weekly0.5/security-management-magazine/articles/2008/03/gatekeeper-a-memoir-of-a-cia-polygraph-examiner/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/elsewhere-in-the-courts-discrimination/2019-08-01T18:12:02-04:00weekly0.5/security-management-magazine/articles/2008/03/a-site-to-see-state-security-breach-notification-laws/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/automating-access-rights/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/beware-spyware/2020-06-23T19:23:24-04:00weekly0.5/security-management-magazine/articles/2008/03/the-push-to-access-fbi-files/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/enforcing-window-standards/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/new-video-standard-offers-promise/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/legal-report-march-2008/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/a-site-for-safe-transit/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/industry-news-march-2008/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/assessing-training-results/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/the-need-for-speed/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/behind-the-numbers-factors-driving-interest-in-pc-alternatives/2019-08-01T18:12:03-04:00weekly0.5/security-management-magazine/articles/2008/03/the-question-of-a-heartland-quake/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/measured-steps-toward-safer-ports/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/europes-car-thieves-go-upscale/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/slaves-in-the-global-supply-chain/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/store-losses-studied/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/making-metrics-that-matter/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/internet-threat-management/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/strengthening-company-passwords/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/taking-screening-to-the-next-level/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/03/smashing-intelligence-stovepipes/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/02/virtual-fence-wont-be-operational-for-3-years/2019-08-01T18:12:04-04:00weekly0.5/security-management-magazine/articles/2008/02/u.s.-embassy-in-belgrade-attacked/2020-10-02T16:29:59-04:00weekly0.5/security-management-magazine/articles/2008/02/amtrak-increases-security-measures/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/illinois-campus-shooting-tests-security-plan--also-shooter-off-meds-but-had-no-prior-police-contact/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/senate-committee-holds-hearing-on-restricting-use-of-state-secrets-privilege/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/art-heist-in-zurich-significant-in-terms-of-money-and-tactics/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/illegal-worker-discovered-in-parliament/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/worldwide-terrorism-by-tactic/2020-06-23T19:23:25-04:00weekly0.5/security-management-magazine/articles/2008/02/fear-of-parking/2020-12-16T11:40:08-05:00weekly0.5/security-management-magazine/articles/2008/02/surveillance-learning-curve/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/tools-for-preventing-counterfeiting/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/strategies-to-combat-youth-violence/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/retailers-fight-e-fencing/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/legal-report-february-2008/2019-08-01T18:12:05-04:00weekly0.5/security-management-magazine/articles/2008/02/industry-news-february-2008/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/terminations-and-violence/2020-08-11T10:38:26-04:00weekly0.5/security-management-magazine/articles/2008/02/are-hospitals-soft-targets/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/bioterror-detection-draws-closer/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/an-urgent-message/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/hezbollahs-latin-american-home/2020-06-23T19:23:25-04:00weekly0.5/security-management-magazine/articles/2008/02/police-strive-but-mafia-still-thrives/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/weathering-severe-climate-and-conflict/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/id-theft-insurance-benefits/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/catching-rogue-configuration-changes/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/02/winners-in-the-spyware-wars/2019-08-01T18:12:06-04:00weekly0.5/security-management-magazine/articles/2008/01/bush-administration-tries-to-wrangle-security-contractors-in-iraq/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/u.n.-to-investigate-security-at-its-global-compounds/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/data-protection-california-retail-bill-vetoed/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/balancing-faith-and-skepticism/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/biometric-technologies-and-verification-systems/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/border-disorder/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/border-security-gao-report-on-smuggling-radioactive-materials/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/access-emergency/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/will-use-of-uavs-take-off/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/an-intelligence-sharing-success-story/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/the-value-of-exercises/2020-10-01T13:17:03-04:00weekly0.5/security-management-magazine/articles/2008/01/guarded-diplomacy/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/legal-report-january-2008/2019-08-01T18:12:07-04:00weekly0.5/security-management-magazine/articles/2008/01/industry-news-january-2008/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/managing-workplace-anxiety/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/cell-phones-secure-online-banking/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/closed-circuit-television-third-edition/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/scouting-for-signs-of-pandemic/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/school-improves-image/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/flying-safer-skies/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/vein-recognition-use-grows/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/ranking-global-cybercrime/2020-06-23T19:23:26-04:00weekly0.5/security-management-magazine/articles/2008/01/pirates-beaten-back/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2008/01/fighting-terrorism-in-the-u.k/2020-06-23T19:23:26-04:00weekly0.5/security-management-magazine/articles/2008/01/a-strategic-view/2019-08-01T18:12:08-04:00weekly0.5/security-management-magazine/articles/2006/12/terrorism-insurance/2020-06-23T19:23:32-04:00weekly0.5/security-management-magazine/articles/2006/12/top-10-performing-security-stocks-for-november-2006/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2006/12/food-borne-illness/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2006/12/whistleblower-bill-stalled/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2006/12/interview-david-l.-miller/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2006/12/s.-378-status/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/bully-battle/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/legal-report-december-2006/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/scientists-allege-poor-nuclear-security/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/parking-aligns-with-protection/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/industry-news-december-2006/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/picture-of-innovation/2020-10-02T16:22:28-04:00weekly0.5/security-management-magazine/articles/2006/12/state-perspective--iowa/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/unbiased-investigations/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/port-security-bill-signed-into-law/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/security-goes-to-school/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/complex-protection-made-easy/2019-08-01T18:12:23-04:00weekly0.5/security-management-magazine/articles/2006/12/spinach-crisis-leaves-bad-taste/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/setting-standards-for-canine-detection/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/defining-interoperable-communications/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/digital-cameras-protect-a-local-utility/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/where-have-all-the-guards-gone/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/discovery-rules-of-the-digital-age/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/state-of-readiness/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/introduction-to-homeland-security-second-edition/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/12/enemy-at-the-water-cooler-real-life-stories-of-insider-threats-and-enterprise-security-management-countermeasures/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/11/one-in-a-million/2019-08-01T18:12:24-04:00weekly0.5/security-management-magazine/articles/2006/11/club-owner-may-be-liable-for-failing-to-protect-patrons/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/assessing-cargo-supply-risk/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/cyberthreats-at-chemical-plants/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/demystifying-terrorism-terrorism-awareness-training-course/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/building-standards-for-hurricane-defense/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/legal-report-november-2006/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/pandemic-resources-for-business/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/bright-lights-blind-cameras/2021-01-29T12:34:41-05:00weekly0.5/security-management-magazine/articles/2006/11/industry-news-november-2006/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/airtight-security/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/bill-requires-dhs-to-enhance-maritime-security/2019-08-01T18:12:25-04:00weekly0.5/security-management-magazine/articles/2006/11/security-gets-offensive/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/the-psyche-of-female-bombers/2020-06-23T19:23:33-04:00weekly0.5/security-management-magazine/articles/2006/11/looking-at-laptop-losses/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/high-tech-chemical-nose/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/keeping-normandy-plans-off-the-front-page/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/security-renewal-goes-royal/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/detecting-early-signs-of-trouble/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/antisocial-networking-sites/2019-08-01T18:12:26-04:00weekly0.5/security-management-magazine/articles/2006/11/financial-services-firms-under-siege/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/11/making-data-breaches-public/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/11/security-convergence-roadmap-released/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/11/keeping-students-safe/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/11/guarding-the-big-ditch/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/11/its-all-about-the-rules/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/10/top-10-performing-security-stocks-for-july-2006/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/10/court-case-company-pays-$1.24-million-in-discrimination-case/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/10/enhancing-security-at-chemical-facilities/2019-08-01T18:12:27-04:00weekly0.5/security-management-magazine/articles/2006/10/check-fraud-tips/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/building-designs-cope-with-threats/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/the-derbys-unbridled-security/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/sizing-up-ip/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/tips-for-background-checks/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/legal-report-october-2006/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/where-copyright-meets-the-internet/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/industry-news-october-2006/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/securitys-input-on-outsourcing/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/olympics-results-not-all-downhill/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/a-plan-for-sharing/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/security-at-the-new-frontier/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/criminals-cash-in-on-stale-checks/2019-08-01T18:12:28-04:00weekly0.5/security-management-magazine/articles/2006/10/is-the-cia-too-cautious/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/10/a-lock-on-student-safety/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/10/who-owns-the-net/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/10/laptop-lessons-learned/2020-06-23T19:23:34-04:00weekly0.5/security-management-magazine/articles/2006/10/following-standard-is-not-standard-practice/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/10/you-be-the-judge/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/the-problem-of-student-party-riots/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/patrolling-performance/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/bill-proposes-school-funding-for-school-security/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/2005-school-security-statistics/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/eeoc-issues-policy-guidance-specific-to-race-and-color-discrimination/2019-08-01T18:12:29-04:00weekly0.5/security-management-magazine/articles/2006/09/border-measures-at-cross-purposes/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/casinos-strengthen-their-security-hand/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/cell-networks-evolve-into-data-networks/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/legal-report-september-2006/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/arbitration-dos-and-donts/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/whos-impersonating-hospital-inspectors/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/industry-news-september-2006/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/license-plates-drive-video-improvements/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/train-staff-virtually-anywhere/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/seeing-the-risk-through-the-trees/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/another-hidden-enemy-in-iraq/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/taking-hurricane-lessons-to-the-bank/2019-08-01T18:12:30-04:00weekly0.5/security-management-magazine/articles/2006/09/bioterror-focus-changing-public-health-systems/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/assessing-threats-from-passengers/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/screening-exports/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/olden-days-new-technology/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/growing-threat-to-online-applications/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/in-for-nasty-weather/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/holding-the-line/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/09/vulnerability-assessment-of-physical-protection-systems/2019-08-01T18:12:31-04:00weekly0.5/security-management-magazine/articles/2006/08/top-10-performing-security-stocks-for-june/2020-06-23T19:23:34-04:00weekly0.5/security-management-magazine/articles/2006/08/gangs-kidnappers-and-other-threats/2020-06-23T19:23:34-04:00weekly0.5/security-management-magazine/articles/2006/08/legal-report-august-2006/2020-06-23T19:23:34-04:00weekly0.5/security-management-magazine/articles/2006/08/recipe-for-food-safety/2020-06-23T19:23:35-04:00weekly0.5/security-management-magazine/articles/2006/08/industry-news-august-2006/2020-11-25T17:27:47-05:00weekly0.5/security-management-magazine/articles/2006/08/using-words-to-defuse-violence/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/grocery-store-not-liable-for-malicious-prosecution/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/s.-2631-would-prohibit-false-travel-documents/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/port-security-bill-approved-by-hor/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/counterfeiting-bill-signed-into-law/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/private-sectory-finds-iit-hard-to-regain-airport-screening-business/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/focus-on-cctvs-value/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/plants-find-right-security-chemistry/2019-08-01T18:12:32-04:00weekly0.5/security-management-magazine/articles/2006/08/homeland-security-sales-patently-unfair/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/whats-behind-country-risk-ratings/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/sharing-critical-info-with-dhs-gets-easier/2020-11-25T16:26:15-05:00weekly0.5/security-management-magazine/articles/2006/08/state-perspective-interview-with-james-w.-mcmahon/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/creating-an-integrated-approach/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/to-encrypt-or-not-to-encrypt-that-is-the-question/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/cybersecurity-checklist-for-business-managers/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/spying-trouble/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/08/on-the-money/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/07/looking-for-secure-outsource-partners/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/07/worth-a-look-portable-data-safes/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/07/h.r.-4353-notifying-airline-passengers-about-unscreened-cargo/2019-08-01T18:12:33-04:00weekly0.5/security-management-magazine/articles/2006/07/private-no-more/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/cargo-security-getting-some-respect/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/dhss-new-schools-of-thought/2020-06-23T19:23:35-04:00weekly0.5/security-management-magazine/articles/2006/07/has-cybercrime-surpassed-physical-crime/2020-06-23T19:23:36-04:00weekly0.5/security-management-magazine/articles/2006/07/industry-news-july-2006/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/legal-report-july-2006/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/putting-a-premium-on-risk-reduction/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/rail-security-in-transition/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/resolving-workplace-conflict/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/fbis-efforts-to-protect-seaports-investigated/2020-06-23T19:23:36-04:00weekly0.5/security-management-magazine/articles/2006/07/a-clear-shot-at-chemical-plant-security/2020-06-23T19:23:36-04:00weekly0.5/security-management-magazine/articles/2006/07/mi5-offers-antiterror-advice/2019-08-01T18:12:34-04:00weekly0.5/security-management-magazine/articles/2006/07/terrorist-war-games-focus-on-it/2020-11-25T17:12:42-05:00weekly0.5/security-management-magazine/articles/2006/07/glittering-cctv-system-is-gold/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/07/old-e-mail-worms-never-die/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/07/turmoil-in-latin-america/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/07/a-chip-off-the-privacy-block/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/top-10-performing-security-stocks-for-march-2006/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/drug-companies-gain-from-bioshield-ii/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/how-small-companies-comply-with-sarbanes-oxley/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/body-armor-for-special-event-security/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/dealing-artfully-with-disaster/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/hospitals-probing-stun-gun-use/2019-08-01T18:12:35-04:00weekly0.5/security-management-magazine/articles/2006/06/industry-news-june-2006/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/legal-report-june-2006/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/positive-spin-on-liaisons/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/preventing-wanderlust-in-patients/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/h.r.-32-takes-on-counterfeiting/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/studies-reveal-system-flaws/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/the-air-up-there/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/storefront-protection-some-say-great-others-grating/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/water-security-on-tap/2020-11-25T17:10:07-05:00weekly0.5/security-management-magazine/articles/2006/06/putting-muscle-into-access-control/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/building-trusting-relationships/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/more-compliance-less-security/2019-08-01T18:12:36-04:00weekly0.5/security-management-magazine/articles/2006/06/delete-now-erase/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/06/road-of-risks/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/06/nostalgic-for-the-days-of-my-doom/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/06/guarding-against-poor-performance/2020-05-08T14:11:27-04:00weekly0.5/security-management-magazine/articles/2006/06/security-not-spartan-at-msu/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/worth-a-look-traveling-with-encryption/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/dhs-grant-process/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/dhs-grant-process-reviewed/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/coast-guard-defines-new-items-as-dangerous/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/are-companies-valuing-intellectual-assets/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/better-service-through-surveys/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/cctv-at-another-junction/2019-08-01T18:12:37-04:00weekly0.5/security-management-magazine/articles/2006/05/do-al-qaeda-tapes-augur-attacks/2020-06-23T19:23:37-04:00weekly0.5/security-management-magazine/articles/2006/05/industry-news-may-2006/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/legal-report-may-2006/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/strategies-for-cutting-turnover/2020-02-25T16:50:03-05:00weekly0.5/security-management-magazine/articles/2006/05/why-the-weak-links/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/challenges-and-trends/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/mapping-the-blackboard-jungle/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/keeping-track-of-firefighters/2019-08-01T18:12:38-04:00weekly0.5/security-management-magazine/articles/2006/05/defending-the-homeland-a-military-priority/2019-08-01T18:14:04-04:00weekly0.5/security-management-magazine/articles/2006/05/database-drills-public-health/2019-08-01T18:14:04-04:00weekly0.5/security-management-magazine/articles/2006/05/extinguishing-fire-safety-problems/2019-08-01T18:14:04-04:00weekly0.5/security-management-magazine/articles/2006/05/when-cybercriminals-turn-pro/2020-06-23T19:23:37-04:00weekly0.5/security-management-magazine/articles/2006/05/exterminating-online-pests/2019-08-01T18:14:04-04:00weekly0.5/security-management-magazine/articles/2006/05/doing-business-in-asia/2019-08-01T18:14:04-04:00weekly0.5/security-management-magazine/articles/2006/04/worth-a-look-web-browsing-under-wraps/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/online-fraud/2020-06-23T19:23:37-04:00weekly0.5/security-management-magazine/articles/2006/04/aircraft-cargo-security/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/industry-news-april-2006/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/into-through-out-of-africa/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/leading-in-tough-times/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/legal-report-april-2006/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/old-school-new-system/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/putting-vendors-to-the-test/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/hospital-liable-for-independent-contractors-assault-on-nurse/2019-08-01T18:14:05-04:00weekly0.5/security-management-magazine/articles/2006/04/tips-for-tightening-fraud-controls/2020-10-05T16:49:22-04:00weekly0.5/security-management-magazine/articles/2006/04/identity-theft-can-be-fun/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/dhs-struggling-with-risk-management/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/community-policing-gets-a-makeover/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/middle-east-asia-drive-up-terrorism/2020-06-23T19:23:37-04:00weekly0.5/security-management-magazine/articles/2006/04/scoping-out-malicious-mail/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/pinning-down-online-money-laundering/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/information-security-guidelines-for-banks/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/harrassment-lawsuits-and-lessons/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/04/off-the-shelf-shrink-solution/2019-08-01T18:14:06-04:00weekly0.5/security-management-magazine/articles/2006/03/universities-failing-when-it-comes-to-sex-crimes/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/guns-in-business-parking-lots/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/challenges-confront-federal-smart-card/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/dont-let-others-trade-your-secrets/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/industry-news-march-2006/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/legal-report-march-2006/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/presentation-prowess/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/the-detective-and-the-database/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/union-boma-spar-over-security/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/battle-over-guns-in-the-workplace/2019-08-01T18:14:07-04:00weekly0.5/security-management-magazine/articles/2006/03/specific-risks-for-general-aviation/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/intelligent-reform-still-elusive/2020-06-23T19:23:38-04:00weekly0.5/security-management-magazine/articles/2006/03/behaving-like-a-terrorist/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/watching-over-guests/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/riding-the-web-2.0-wave/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/has-spam-been-canned/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/aligning-security-with-business-objectives/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/crime-fighters-collaborate/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/03/trouble-on-the-line/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/02/s.-467-extends-tria-for-2-years/2020-06-23T19:23:38-04:00weekly0.5/security-management-magazine/articles/2006/02/workplace-violence-is-no-joke/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/02/healthy-approach-to-data-protection/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/02/eu-approves-data-retention-directive/2019-08-01T18:14:08-04:00weekly0.5/security-management-magazine/articles/2006/02/h.r.-4437-seeks-to-strengthen-borders/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/finding-success-through-succession/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/industry-news-february-2006/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/legal-report-february-2006/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/levers-against-liability/2020-12-16T11:46:45-05:00weekly0.5/security-management-magazine/articles/2006/02/now-were-talking/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/whos-listening/2021-01-29T12:39:16-05:00weekly0.5/security-management-magazine/articles/2006/02/will-every-rat-have-its-day/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/high-on-the-job/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/employer-liable-for-providing-misleading-employee-reference/2019-08-01T18:14:09-04:00weekly0.5/security-management-magazine/articles/2006/02/identity-theft-overview/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/a-dose-of-flu-preparedness/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/data-today-preemptive-tomorrow-predictive/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/sox-compliance-full-of-holes/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/european-islamic-policies-examined/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/the-betamax-dilemma/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/web-sites-provide-rich-harvest-for-spammers/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/growing-respect-for-it-security-professionals/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/02/i-bot/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/01/attacks-on-colombian-pipelines/2019-08-01T18:14:10-04:00weekly0.5/security-management-magazine/articles/2006/01/nuclear-assets-vulnerable/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/physical-security-for-it/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/hospital-safety-not-childs-play/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/10-ways-to-reduce-credit-card-fraud/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/aptitude-for-destruction-case-studies-of-organizational-learning-in-five-terrorist-groups/2020-06-23T19:23:38-04:00weekly0.5/security-management-magazine/articles/2006/01/go-phish/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/accomodating-religions-at-work/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/converging-goals/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/industry-news-january-2006/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/legal-report-january-2006/2019-08-01T18:14:11-04:00weekly0.5/security-management-magazine/articles/2006/01/living-with-bad-policies/2020-08-11T10:58:32-04:00weekly0.5/security-management-magazine/articles/2006/01/security-experts-doing-the-math/2020-06-23T19:23:39-04:00weekly0.5/security-management-magazine/articles/2006/01/internet-guide-to-food-safety-and-security/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/a-look-at-laptop-theft/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/deadly-flu-or-chicken-little-syndrome/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/first-responder-testers-sought/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/knocking-gangs-off-the-network/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/better-safe-than-sar-less/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/diagnosing-a-problem/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/dog-use-dogged-by-questions/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/military-museum-guards-against-fire/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/the-growing-trend-toward-convergence/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/break-of-faith-loss-of-dollars/2019-08-01T18:14:12-04:00weekly0.5/security-management-magazine/articles/2006/01/dhs-improves-its-infosec/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2006/01/when-faith-and-work-clash/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2006/01/arming-the-road-warrior/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2006/01/masters-of-disaster/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2006/01/a-practical-guide-to-security-assessments/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2005/12/a-matter-of-degrees/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2005/12/bar-held-liable-for-assaulted-patron/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2005/12/smart-solutions-to-security-problems/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2005/12/companys-confidentiality-agreements-violated-federal-law/2019-08-01T18:14:13-04:00weekly0.5/security-management-magazine/articles/2005/12/zero-day-approaches/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/s.b.-62-targets-cyber-predators/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/the-case-against-star-wars/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/dont-be-spooked-by-spyware/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/the-case-against-star-wars2/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/building-business-partnerships/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/industry-news-december-2005/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/legal-report-december-2005/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/secure-flight-encountering-turbulence/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/teamsters-bash-rail-security/2019-08-01T18:14:14-04:00weekly0.5/security-management-magazine/articles/2005/12/911-commission-dismayed-by-inaction/2020-06-23T19:23:39-04:00weekly0.5/security-management-magazine/articles/2005/12/returning-to-the-scenes-of-the-crime/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/no-consensus-on-fema-focus/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/reporting-of-potential-health-problems-examined/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/efforts-to-tighten-borders-continue/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/protecting-a-magic-music-hall/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/the-perils-of-wireless-networking/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/dots-security-off-track/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/12/ramping-up-garage-design/2021-01-12T10:48:47-05:00weekly0.5/security-management-magazine/articles/2005/12/fifty-years-of-advancing-security/2020-11-12T17:57:16-05:00weekly0.5/security-management-magazine/articles/2005/11/copy-scan-fax-steal/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/11/court-case-workplace-safety-and-discrimination-laws/2019-08-01T18:14:15-04:00weekly0.5/security-management-magazine/articles/2005/11/eeoc-guidelines-cancer-as-a-disability/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/kindergarten-cop/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/animal-id-fights-agroterrorism/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/report-examines-consumer-data-mining-by-federal-agencies/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/client-not-liable-for-guards-injuries/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/legal-report-november-2005/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/getting-to-i-confess/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/forgers-born-not-made/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/digital-video-may-have-its-day-in-court/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/industry-news-november-2005/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/its-always-training-time/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/todays-lessons-tip-lines/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/theft-from-afar-hacking-into-rfid/2019-08-01T18:14:16-04:00weekly0.5/security-management-magazine/articles/2005/11/a-voip-in-the-wilderness/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/voip-security-risks/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/training-in-israel-for-terrorism-in-the-u.s/2020-06-23T19:23:39-04:00weekly0.5/security-management-magazine/articles/2005/11/information-sharing-through-fusion-centers/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/a-secure-backup-plan/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/engulfed-by-disaster/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/evacuation-procedures/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/communication-breakdown/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/emergency-medical-services/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/banking-on-recovery-plans/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/keeping-mass-transit-ahead-of-the-curve/2019-08-01T18:14:17-04:00weekly0.5/security-management-magazine/articles/2005/11/survey-assesses-vital-services/2020-11-25T17:07:29-05:00weekly0.5/security-management-magazine/articles/2005/11/inspiration-and-instruction/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/11/facility-managers-guide-to-security-protecting-your-assets/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/h.r.-2345-combats-counterfeit-drugs/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/legal-report-october-2005/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/do-london-bombings-signal-a-new-course/2020-06-23T19:23:40-04:00weekly0.5/security-management-magazine/articles/2005/10/preparing-places-of-refuge/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/industry-news-october-2005/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/leading-by-example/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/distilled-protection/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/how-to-handle-disability-issues/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/spoof-proof/2019-08-01T18:14:18-04:00weekly0.5/security-management-magazine/articles/2005/10/s.-1052-focuses-on-transportation-security/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/reporting-id-theft/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/setting-the-dogs-on-suicide-bombers/2020-06-23T19:23:40-04:00weekly0.5/security-management-magazine/articles/2005/10/clues-to-campus-crime-reports/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/gao-defense-trade-blows-over-classified-data/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/security-as-a-governance-concern/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/founding-fathers-finding-refuge/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/tunnel-safety-off-the-rails/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/market-forces-vs.-legislation-whats-your-view/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/hijacking-cyberspace/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/will-rage-turn-to-rampage/2020-08-11T11:06:46-04:00weekly0.5/security-management-magazine/articles/2005/10/procurement-problems-at-dhs/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/national-preparedness-plan-faces-challenges/2019-08-01T18:14:19-04:00weekly0.5/security-management-magazine/articles/2005/10/protecting-malls-from-a-terrorist-threat/2019-10-15T12:30:09-04:00weekly0.5/security-management-magazine/articles/2005/10/fine-tuning-e-mail-control/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/10/the-all-seeing-eye-in-the-sky/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/10/one-on-one-protection/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/dhs-change-creates-challenges/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/terrorism-insurance/2020-06-23T19:23:40-04:00weekly0.5/security-management-magazine/articles/2005/09/cursing-the-boss/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/fatal-fires-on-college-campuses/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/dhs-still-struggling-with-cybersecurity/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/be-prepared/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/deal-fraud-out/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/this-facade-isnt-just-a-pretty-face/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/quarterbacking-the-super-bowl/2020-11-25T16:42:22-05:00weekly0.5/security-management-magazine/articles/2005/09/nothing-succeeds-like-succession-planning/2019-08-01T18:14:20-04:00weekly0.5/security-management-magazine/articles/2005/09/distinguishing-tourists-from-terrorists/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/supporting-staff-development/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/cramming-for-an-it-exam/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/wrongful-termination/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/contractors-with-foreign-connections-questioned/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/dhs-faces-challenges-in-fulfilling-cybersecurity-responsibilities/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/restaurant-found-liable-for-sexual-harassment/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/malware-fighting-maclicious-code/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/09/homeland-defense/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/08/the-inside-story-on-outsource-planning/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/08/rfid-a-primer/2019-08-01T18:14:21-04:00weekly0.5/security-management-magazine/articles/2005/08/intelligent-design2/2020-12-16T11:35:56-05:00weekly0.5/security-management-magazine/articles/2005/08/rfid-a-primer2/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/companies-cant-make-employees-pay-for-their-drug-tests/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/whistleblower-s.b.-494-approved/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/benchmarks-in-compensation/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/federalwireless-woes/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/federal-wireless-woes/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/aggression-in-the-workplace-preventing-and-managing-high-risk-behavior/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/can-i-see-some-id/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/cargo-security/2019-08-01T18:14:22-04:00weekly0.5/security-management-magazine/articles/2005/08/labor-laws-changing-tides/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/legal-report-august-2005/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/freedom-tower-security-to-be-overhauled/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/a-diverting-practice/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/checking-on-sarbanes-oxley/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/industry-news-august-2005/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/putting-the-praise-in-appraisals/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/wrongful-termination-suit-denied/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/digging-up-the-dirt-on-pharming/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/when-insiders-attack/2019-08-01T18:14:23-04:00weekly0.5/security-management-magazine/articles/2005/08/security-in-motion/2020-11-12T16:53:47-05:00weekly0.5/security-management-magazine/articles/2005/08/from-back-burner-to-business-imperative/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/lessons-from-the-anthrax-attacks/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/study-documents-airport-hassles/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/new-direction-for-drug-fight/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/will-drivers-licenses-have-real-security/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/building-blocks-for-future-intelligence/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/traveling-with-intelligence/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/defending-networks-against-targeted-trojans/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/the-dr.-who-conundrum/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/containing-cargo-risk/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/08/the-ethical-hack-a-framework-for-business-value-penetration-testing/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/07/authorization-needed-to-enter-nuclear-facilities/2019-08-01T18:14:24-04:00weekly0.5/security-management-magazine/articles/2005/07/s.b.-152-would-require-bullying-prevention-programs/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/polygraphs-get-results/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/s.-378-creates-new-seaport-security-crimes/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/data-hiding-fundamentals-and-applications-content-security-in-digital-multimedia/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/with-it-you-get-escrow/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/a-new-course-for-card-access/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/asking-the-hard-questions/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/preparing-fire-wardens/2020-02-25T17:23:29-05:00weekly0.5/security-management-magazine/articles/2005/07/learning-to-love-confrontation/2019-08-01T18:14:25-04:00weekly0.5/security-management-magazine/articles/2005/07/legal-report-july-2005/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/fraud-artists-more-skillful/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/ctpat-ship-shape-or-shipped-out/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/feds-exit-the-matrix/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/industry-news-july-2005/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/centralized-food-data-reporting-is-lacking/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/workers-compensation-benefits-after-assault-on-company-property/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/security-economy/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/global-jihad-one-hit-at-a-time/2020-06-23T19:23:40-04:00weekly0.5/security-management-magazine/articles/2005/07/digital-maps-draw-better-response/2019-08-01T18:14:26-04:00weekly0.5/security-management-magazine/articles/2005/07/trouble-in-the-blogosphere/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/07/spot-the-bot/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/07/putting-technology-behind-bars/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/07/dont-lock-in-fire-code-violations/2023-12-13T11:21:26-05:00weekly0.5/security-management-magazine/articles/2005/06/the-key-to-winning-contracts/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/06/the-key-to-winning-contracts2/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/06/s.-467-would-extend-tria-for-3-more-years/2020-06-23T19:23:41-04:00weekly0.5/security-management-magazine/articles/2005/06/quick-bytes-the-roi-of-smart-cards/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/06/efficacy-and-safety-of-stun-guns/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/06/bomb-threats-in-school/2021-01-06T13:25:41-05:00weekly0.5/security-management-magazine/articles/2005/06/breath-of-fresh-air-for-building-security/2019-08-01T18:14:27-04:00weekly0.5/security-management-magazine/articles/2005/06/agroterrorism-challenges-remain/2020-06-23T19:23:41-04:00weekly0.5/security-management-magazine/articles/2005/06/a-dash-of-danger/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/the-right-course-for-learning/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/go-forth-without-fraud/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/the-key-to-winning-contracts3/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/theres-no-free-lunch/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/auditing-for-anomalies/2020-10-05T16:59:51-04:00weekly0.5/security-management-magazine/articles/2005/06/motivating-through-appraisals/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/industry-news-june-2005/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/safety-act-process-painful-but-rx-planned/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/legal-report-june-2005/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/two-senate-bills-on-fingerprinting/2019-08-01T18:14:28-04:00weekly0.5/security-management-magazine/articles/2005/06/firearms-in-the-workplace/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/medical-testing-on-job-applicants/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/centralizing-card-control/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/secure-flight-in-holding-pattern/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/vaulting-into-digital-video/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/when-good-software-goes-bad/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/making-a-federal-case-of-it-security/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/courting-trouble/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/06/dos-and-donts-for-digital-evidence/2020-02-26T10:41:21-05:00weekly0.5/security-management-magazine/articles/2005/06/light-their-fires/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/05/respecting-and-protecting-elders/2019-08-01T18:14:29-04:00weekly0.5/security-management-magazine/articles/2005/05/shedding-light-on-university-security/2021-01-12T10:45:51-05:00weekly0.5/security-management-magazine/articles/2005/05/common-carrier-ruled-liable-for-off-duty-crew-member-assault/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/employee-terminated-in-discrimination-case/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/report-finds-intel-flaws/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/impeccable-credentials/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/builders-construct-better-security/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/fighting-diploma-mills-by-degrees/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/car-viruses-and-other-future-computer-related-threats/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/tracking-performance-trends/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/you-mean-he-works-for-us/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/legal-report-may-2005/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/industry-news-may-2005/2019-08-01T18:14:30-04:00weekly0.5/security-management-magazine/articles/2005/05/building-a-better-team/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/whats-the-verdict-on-digital-evidence/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/nyc-building-guards-woefully-unprepared/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/what-is-critical-infrastructure-anyway/2020-11-25T16:23:24-05:00weekly0.5/security-management-magazine/articles/2005/05/study-questions-cctvs-value/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/when-dorms-get-too-warm/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/untangling-web-of-wasted-time/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/05/party-planning-under-the-gun/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/04/vulnerable-infrastructure/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/04/court-case-random-drug-testing-is-justified/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/04/cctv-lowers-the-stakes/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/04/staging-security-in-a-theater-of-war/2019-08-01T18:14:31-04:00weekly0.5/security-management-magazine/articles/2005/04/information-security-and-breaches-of-information/2020-06-23T19:23:42-04:00weekly0.5/security-management-magazine/articles/2005/04/crs-contemplates-port-water-threats/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/the-39-steps-to-it-security/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/court-case-employer-negligence/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/network-security-assessment/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/inside-the-spam-cartel-by-spammer-x/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/crate-expectations-for-cargo-security-strategy/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/secret-service-does-its-share/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/manager-heal-thyself/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/strike-one-for-trilogy/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/the-very-model-of-a-modern-cso/2019-08-01T18:14:32-04:00weekly0.5/security-management-magazine/articles/2005/04/mission-to-mitigate/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/04/getting-a-handle-on-incidents/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/04/prescription-for-data-protection/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/04/where-crimes-converge-investigations-merge/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/04/legal-report-april-2005/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/04/industry-news-april-2005/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/03/experts-evaluate-bioshield/2020-06-23T19:23:43-04:00weekly0.5/security-management-magazine/articles/2005/03/survey-problems-with-container-tracking/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/03/journal-of-physical-security/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/03/court-case-safety-devices-for-employees/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/03/jury-awards-employee-$1.57-million-in-discrimination-case/2019-08-01T18:14:33-04:00weekly0.5/security-management-magazine/articles/2005/03/is-the-free-market-best-for-homeland-security/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/court-case-retaliation-for-reporting-safety-violations/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/ada-guidelines-for-the-food-service-industry/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/advanced-interviewing-techniques-proven-strategies-for-law-enforcement-military-and-security-personnel/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/id-theft/2020-06-23T19:23:43-04:00weekly0.5/security-management-magazine/articles/2005/03/the-challenge-of-making-safer-structures/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/fbi-checks-offer-promise-problems/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/critics-call-for-dhs-overhaul/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/safety-act-process-needs-improvment/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/keys-to-learning/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/iso-proof-of-quality/2020-09-30T15:53:05-04:00weekly0.5/security-management-magazine/articles/2005/03/cul8r-dude/2019-08-01T18:14:34-04:00weekly0.5/security-management-magazine/articles/2005/03/cooperation-not-convergence/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/making-tough-calls-easy/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/ipods-sing-for-investigators/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/where-trouble-meets-the-road/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/insight-about-outsourcing/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/from-bluetooth-to-redfang/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/the-blame-game-and-how-to-play-it/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/legal-report-march-2005/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/industry-news-march-2005/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/03/the-path-to-peak-performance/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/02/report-on-pipeline-security-in-saudi-arabia/2019-08-01T18:14:35-04:00weekly0.5/security-management-magazine/articles/2005/02/court-case-company-may-drug-test-worker-who-is-in-rehab/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/cyberpros-on-the-march/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/dhs-cybersecurity/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/advanced-surveillance/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/food-supply-chain-security/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/guidance-for-banks-regarding-money-laundering/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/lessons-from-museum-fires/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/the-cissp-prep-guide-mastering-the-cissp-and-issep-exams-second-edition/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/introduction-to-homeland-security/2019-08-01T18:14:36-04:00weekly0.5/security-management-magazine/articles/2005/02/terrorists-in-the-drivers-seat/2020-06-23T19:23:43-04:00weekly0.5/security-management-magazine/articles/2005/02/predicting-terror-attacks/2020-06-23T19:23:44-04:00weekly0.5/security-management-magazine/articles/2005/02/gps-tracks-journey/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/problems-in-passe-in-passaic-valley/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/managing-marginal-workers/2020-05-08T14:44:58-04:00weekly0.5/security-management-magazine/articles/2005/02/keystroke-loggers-catch-a-break/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/open-debate-on-open-source/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/how-to-avoid-hiring-hazards/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/whos-the-safest-bet-for-the-job/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/adapting-to-automated-fraud/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/the-best-laid-plans/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/20-20-spy-sight/2020-06-23T19:23:44-04:00weekly0.5/security-management-magazine/articles/2005/02/safe-and-secure/2019-08-01T18:14:37-04:00weekly0.5/security-management-magazine/articles/2005/02/legal-report-february-2005/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/02/industry-news-february-2005/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/louisiana-law-mandates-background-checks/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/lock-problems/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/court-case-premises-liability/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/public-private-liasions/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/banking-on-encryption/2019-08-01T18:14:38-04:00weekly0.5/security-management-magazine/articles/2005/01/business-confronts-terrorism-risks-and-response/2020-06-23T19:23:45-04:00weekly0.5/security-management-magazine/articles/2005/01/out-of-sight-out-of-mind/2020-06-23T19:23:45-04:00weekly0.5/security-management-magazine/articles/2005/01/gao-report-formidable-information-and-technology-management-challenge-requires-institutional-approach/2020-06-23T19:23:46-04:00weekly0.5/security-management-magazine/articles/2005/01/intellectual-property-it-really-is-a-matter-of-life-and-death/2020-06-23T19:23:46-04:00weekly0.5/security-management-magazine/articles/2005/01/court-case-negligence/2020-06-23T19:23:46-04:00weekly0.5/security-management-magazine/articles/2005/01/nuclear-facilities-still-vulnerable-to-terrorist-attacks/2020-06-23T19:23:47-04:00weekly0.5/security-management-magazine/articles/2005/01/copyrights-and-file-sharing-software/2020-06-23T19:23:47-04:00weekly0.5/security-management-magazine/articles/2005/01/withholding-security-plans/2020-06-23T19:23:48-04:00weekly0.5/security-management-magazine/articles/2005/01/when-is-a-crime-just-a-crime/2020-06-23T19:23:48-04:00weekly0.5/security-management-magazine/articles/2005/01/special-collections-security-not-always-special/2020-06-23T19:23:48-04:00weekly0.5/security-management-magazine/articles/2005/01/laptops-dont-have-legs/2020-06-23T19:23:49-04:00weekly0.5/security-management-magazine/articles/2005/01/saints-and-sinners-in-business/2020-06-23T19:23:50-04:00weekly0.5/security-management-magazine/articles/2005/01/authentication-schemes-lift-the-e-mail-veil/2020-06-23T19:23:50-04:00weekly0.5/security-management-magazine/articles/2005/01/the-smart-cards-are-coming...-really/2020-06-23T19:23:51-04:00weekly0.5/security-management-magazine/articles/2005/01/tough-tracks-for-railroads/2020-06-23T19:23:51-04:00weekly0.5/security-management-magazine/articles/2005/01/forging-ahead-for-group-goals/2020-06-23T19:23:52-04:00weekly0.5/security-management-magazine/articles/2005/01/unification-theory/2020-06-23T19:23:52-04:00weekly0.5/security-management-magazine/articles/2005/01/fence-and-sensibility/2020-06-23T19:23:53-04:00weekly0.5/security-management-magazine/articles/2005/01/legal-report-janaury-2005/2020-06-23T19:23:53-04:00weekly0.5/security-management-magazine/articles/2005/01/industry-news-january-2005/2020-06-23T19:23:54-04:00weekly0.5/security-management-magazine/articles/2007/12/does-dhs-spend-too-much-on-short-term-technology/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/whistleblower-protection-passes-senate/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/virtual-border-fencing-a-go-despite-problems/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/why-should-the-boss-listen-to-you/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/businesses-in-scotland-benefit-from-counter-terrorism-training/2020-06-23T19:23:27-04:00weekly0.5/security-management-magazine/articles/2007/12/9-11-commission/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/video-voyeurism/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/worldwide-terrorism-by-target/2020-06-23T19:23:27-04:00weekly0.5/security-management-magazine/articles/2007/12/who-is-preparing-for-the-inevitable-pandemic/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/12/caring-for-patients-records/2019-08-01T18:12:09-04:00weekly0.5/security-management-magazine/articles/2007/11/miami-police-to-test-drones/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/college-makes-gps-cell-phones-mandatory/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/better-controls-for-contractors/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/british-government-loses-private-data-of-7.5-million-families/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/whos-health-report/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/insecurity-at-ohare/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/court-case-the-ada-and-medical-records/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/court-case-providing-screening-data-to-employees/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/bush-issues-information-sharing-report/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/bill-for-maritime-security-and-bagging-screening-await-president-obamas-signature/2019-08-01T18:12:10-04:00weekly0.5/security-management-magazine/articles/2007/11/numbers/2020-06-23T19:23:27-04:00weekly0.5/security-management-magazine/articles/2007/11/worldwide-terrorism-by-tactic/2020-06-23T19:23:28-04:00weekly0.5/security-management-magazine/articles/2007/11/the-new-hall-monitor/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/11/colorado-law-prohibits-discrimination-based-on-sexual-orientation/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/11/court-case-a-single-comment-can-be-evidence-of-racial-discrimination/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/11/can-your-business-withstand-a-flu-pandemic/2020-03-17T13:23:01-04:00weekly0.5/security-management-magazine/articles/2007/11/collapse-and-consequences/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/11/problems-with-the-transportation-worker-identification-credential/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/10/nasa-will-release-airline-survey/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/10/an-alarming-trend/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/10/suppressed-nasa-report-spreads-doubt/2019-08-01T18:12:11-04:00weekly0.5/security-management-magazine/articles/2007/10/9-11-chairman-criticizes-fbis-counterterrorism-efforts/2020-06-23T19:23:28-04:00weekly0.5/security-management-magazine/articles/2007/10/white-house-makes-case-against-house-fisa-bill/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/agriculture-inspections-compromised/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/blackwater-founder-defends-his-contractors/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/blackwater-usa-sought-to-cover-up-deadly-iraq-shootings/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/you-might-be-a-terrorist-if/2020-06-23T19:23:29-04:00weekly0.5/security-management-magazine/articles/2007/10/courthouse-security/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/building-security/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/10/workplace-violence/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/09/alarm-monitoring/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/09/small-and-medium-homeland-security-stocks-may-have-peaked/2019-08-01T18:12:12-04:00weekly0.5/security-management-magazine/articles/2007/09/the-new-face-of-meth-in-america/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/blackwater-usa-banned-from-iraq/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/biometric-primer/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/explosions-rip-through-mexican-oil-pipelines/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/court-case-ada-and-alcohol-abuse/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/seeing-al-qaeda-everywhere-and-in-everything-hurts-counterterrorism/2020-06-23T19:23:29-04:00weekly0.5/security-management-magazine/articles/2007/09/judge-stops-dhs-crackdown-on-illegal-hires/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/worldwide-terrorism-by-target/2020-06-23T19:23:30-04:00weekly0.5/security-management-magazine/articles/2007/09/eeoc-guidelines-on-family-responsibility-discrimination/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/domestic-violence/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/are-cities-sapping-immigration-laws/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/the-bodyguards-bible/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/international-security/2019-08-01T18:12:13-04:00weekly0.5/security-management-magazine/articles/2007/09/checking-it-backgrounds/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/09/chinas-weapons-buildup/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/09/civic-minded-or-still-crazy-after-all-these-years/2020-06-23T19:23:30-04:00weekly0.5/security-management-magazine/articles/2007/09/the-concept-of-security-providers-accreditation/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/09/tsunami-warning/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/08/cartoon-cops-patrol-chinese-web-users/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/08/new-dhs-rules-will-hurt-farmers-industry-says/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/08/agriculture-security/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/08/top-10-security-stocks-for-april/2019-08-01T18:12:14-04:00weekly0.5/security-management-magazine/articles/2007/08/background-screening/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/aviation-security-how-the-dhs-handled-a-2004-incident/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/crooks-zero-in-on-vulnerable-data/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/data-disaster/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/afghanistans-opium-addiction/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/airport-security/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/investigations/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/airport-security2/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/08/canadas-air-and-sea-vulnerability/2020-06-23T19:23:31-04:00weekly0.5/security-management-magazine/articles/2007/07/study-drug-use-low-among-those-in-safety-sensitive-jobs/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/07/report-dhs-screening-programs-redundant/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/07/the-barriers-to-interoperability/2019-08-01T18:12:15-04:00weekly0.5/security-management-magazine/articles/2007/07/is-this-the-beginning-of-stability-in-the-congo/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/07/campus-access-controlled/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/07/the-heavy-burden-of-it-infrastructure-upgrades/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/07/environmental-security/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/07/chinese-jigsaw-puzzle/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/the-threat-of-kidnapping-in-nigeria/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/college-increases-security-after-rape-and-murder/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/testing-robotic-help-for-rescue-workers/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/dhs-rule-requires-security-for-high-risk-chemical-facilities/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/connecticut---employment-law/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/counterintelligence-strategy/2019-08-01T18:12:16-04:00weekly0.5/security-management-magazine/articles/2007/06/communications-interoperability/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/crude-oil-and-corruption/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/web-application-security-standards/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/deterring-terrorists-not-shoppers/2020-06-23T19:23:31-04:00weekly0.5/security-management-magazine/articles/2007/06/premises-liability/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/consumer-data-protection/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/rail-security/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/06/courthouse-security/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/top-10-security-stocks-for-march/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/drug-makers-protection-prescription/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/court-case-sex-discrimination/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/washington-law-prohibits-sexual-orientation-discrimination/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/liability/2019-08-01T18:12:17-04:00weekly0.5/security-management-magazine/articles/2007/05/rule-puts-drivers-license-debate-in-high-gear/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/05/dealing-with-crises/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/05/drivers-licenses/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/05/a-new-perspective-on-protecting-personal-data/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/05/communications/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/spotting-ieds-amid-the-ipods/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/top-10-security-stocks-for-february/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/violent-behavior/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/court-case-boss-not-guilty-of-bullying/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/rail-security/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/digital-evidence-guidebook/2019-08-01T18:12:18-04:00weekly0.5/security-management-magazine/articles/2007/04/all-along-the-watchtower/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/04/fingerprint-technology/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/04/insights-on-internet-investigations/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/04/driving-the-debate-on-drivers-licenses/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/04/premises-liability/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/school-safety/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/background-screening-for-employees-at-nuclear-facilities/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/court-case-arming-security-guards/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/privacy/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/bodyguard-principles-protection-and-operational-planning/2020-02-26T10:19:08-05:00weekly0.5/security-management-magazine/articles/2007/03/britains-cctv-surveilled/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/airport-security/2019-08-01T18:12:19-04:00weekly0.5/security-management-magazine/articles/2007/03/tea-leaves-and-terrorism-trends/2020-06-23T19:23:32-04:00weekly0.5/security-management-magazine/articles/2007/03/risk-analysis-and-the-security-survey-third-edition/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/false-imprisonment/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/pharmaceutical-crimes/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/securing-utility-and-energy-infrastructures/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/banks-prove-themselves-to-customers---and-vice-versa/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/barriers-to-better-it-security/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/criminal-history/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/deadline-looms-for-fixing-no-fly-lists/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/defend-america/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/it-security/2019-08-01T18:12:20-04:00weekly0.5/security-management-magazine/articles/2007/02/corruption-around-the-world/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/02/pediatric-terrorism/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/top-10-security-stocks-for-november/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/smart-solutions-to-security-problems/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/school-safety/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/state-identity-theft-laws/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/computer-security/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/smart-cards/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/security-offensive/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/cybersecurity-progress/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/data-security-toolkit/2019-08-01T18:12:21-04:00weekly0.5/security-management-magazine/articles/2007/01/911-and-the-future-of-transportation-security/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/the-abcs-of-usb/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/in-search-of-unbiased-investigation/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/corruption/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/rfid/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/worth-a-look/2019-08-01T18:12:22-04:00weekly0.5/security-management-magazine/articles/2007/01/prisons-fostering-extremism/2020-06-23T19:23:32-04:00weekly0.5/security-management-magazine/articles/2004/12/function-over-form/2020-06-23T19:23:54-04:00weekly0.5/security-management-magazine/articles/2004/12/security-equipment/2020-06-23T19:23:55-04:00weekly0.5/security-management-magazine/articles/2004/12/cargo-security-measures-in-the-108th-congress/2021-01-21T15:39:51-05:00weekly0.5/security-management-magazine/articles/2004/12/concealed-weapons/2020-06-23T19:23:56-04:00weekly0.5/security-management-magazine/articles/2004/12/diploma-mills/2020-06-23T19:23:56-04:00weekly0.5/security-management-magazine/articles/2004/12/investigations/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/law-increases-penalties-for-identity-theft/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/crime-against-tourists/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/a-shocking-state-of-it-security/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/hacking-for-bobby-fischer/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/attendees-celebrate-the-past-and-future/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/school-security/2020-06-23T19:23:57-04:00weekly0.5/security-management-magazine/articles/2004/12/law-designed-to-limit-spam/2020-06-23T19:23:58-04:00weekly0.5/security-management-magazine/articles/2004/12/testimony-on-reform-at-the-cia/2020-06-23T19:23:58-04:00weekly0.5/security-management-magazine/articles/2004/12/nuclear-security/2020-06-23T19:23:58-04:00weekly0.5/security-management-magazine/articles/2004/12/a-web-of-intelligence-networks/2020-06-23T19:23:58-04:00weekly0.5/security-management-magazine/articles/2004/11/security-design/2020-06-23T19:23:59-04:00weekly0.5/security-management-magazine/articles/2004/11/premises-liability/2020-06-23T19:23:59-04:00weekly0.5/security-management-magazine/articles/2004/11/bioterrorism-defense/2020-06-23T19:23:59-04:00weekly0.5/security-management-magazine/articles/2004/11/pda-forensics-guide/2020-06-23T19:23:59-04:00weekly0.5/security-management-magazine/articles/2004/11/information-sharing/2020-06-23T19:24:00-04:00weekly0.5/security-management-magazine/articles/2004/11/law-enforcement-responsibilities--security-management/2020-06-23T19:24:00-04:00weekly0.5/security-management-magazine/articles/2004/11/the-buzz-over-zigbee/2020-06-23T19:24:01-04:00weekly0.5/security-management-magazine/articles/2004/11/libel/2020-06-23T19:24:03-04:00weekly0.5/security-management-magazine/articles/2004/11/wiretaps/2020-06-23T19:24:03-04:00weekly0.5/security-management-magazine/articles/2004/11/maritime-security/2020-06-23T19:24:03-04:00weekly0.5/security-management-magazine/articles/2004/11/changing-the-guard-private-prisons-and-the-control-of-crime/2020-06-23T19:24:05-04:00weekly0.5/security-management-magazine/articles/2004/10/first-responders-and-interoperable-communications/2020-06-23T19:24:05-04:00weekly0.5/security-management-magazine/articles/2004/10/report-fire-safety-in-nursing-homes/2020-06-23T19:24:07-04:00weekly0.5/security-management-magazine/articles/2004/10/protection-goes-beyond-prayer/2020-06-23T19:24:07-04:00weekly0.5/security-management-magazine/articles/2004/10/prescription-fraud/2020-06-23T19:24:08-04:00weekly0.5/security-management-magazine/articles/2004/10/information-sharing/2020-06-23T19:24:09-04:00weekly0.5/security-management-magazine/articles/2004/10/responders-private-sector-incommunicado/2020-06-23T19:24:10-04:00weekly0.5/security-management-magazine/articles/2004/10/sevis-at-your-service/2020-06-23T19:24:10-04:00weekly0.5/security-management-magazine/articles/2004/10/9-11-monographs-available/2020-06-23T19:24:11-04:00weekly0.5/security-management-magazine/articles/2004/10/cargo-security-still-stalling/2020-06-23T19:24:11-04:00weekly0.5/security-management-magazine/articles/2004/10/cctv/2020-06-23T19:24:11-04:00weekly0.5/security-management-magazine/articles/2004/10/border-protection/2020-06-23T19:24:12-04:00weekly0.5/security-management-magazine/articles/2004/10/court-security-a-guide-for-post-9-11-environments/2020-06-23T19:24:13-04:00weekly0.5/security-management-magazine/articles/2004/10/cryptography-for-dummies/2020-06-23T19:24:13-04:00weekly0.5/security-management-magazine/articles/2004/10/quick-bytes-organized-scams/2020-06-23T19:24:14-04:00weekly0.5/security-management-magazine/articles/2004/10/quick-bytes-time-well-spent/2020-06-23T19:24:14-04:00weekly0.5/security-management-magazine/articles/2004/10/checks-on-checks/2020-06-23T19:24:14-04:00weekly0.5/security-management-magazine/articles/2004/10/why-oh-wireless-spam/2020-06-23T19:24:15-04:00weekly0.5/security-management-magazine/articles/2004/10/quick-bytes-im-in-trouble/2020-06-23T19:24:15-04:00weekly0.5/security-management-magazine/articles/2004/10/a-site-to-see/2020-06-23T19:24:16-04:00weekly0.5/security-management-magazine/articles/2004/10/defining-moments/2020-06-23T19:24:16-04:00weekly0.5/security-management-magazine/articles/2004/10/high-risk-organizations/2020-06-23T19:24:16-04:00weekly0.5/security-management-magazine/articles/2004/10/them-and-us-cult-thinking-and-the-terrorist-threat/2020-06-23T19:24:16-04:00weekly0.5/security-management-magazine/articles/2004/10/bullying-peer-harassment-and-victimization-in-the-schools-the-next-generation-of-prevention/2020-06-23T19:24:17-04:00weekly0.5/security-management-magazine/articles/2004/10/the-psychology-and-law-of-workplace-violence-a-handbook-for-mental-health-professionals-and-employers/2020-06-23T19:24:17-04:00weekly0.5/security-management-magazine/articles/2004/10/keystone-to-antiterror-fight/2020-06-23T19:24:17-04:00weekly0.5/security-management-magazine/articles/2004/10/to-serve-and-protect/2019-08-01T18:14:45-04:00weekly0.5/security-management-magazine/articles/2004/10/the-right-mailroom-milieu/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/nuclear-security/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/the-new-security-universe/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/weapons-at-risk/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/study-of-gang-activity-in-rural-areas/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/world-trade-center/2020-06-23T19:24:18-04:00weekly0.5/security-management-magazine/articles/2004/09/screening-for-airport-employees/2020-06-23T19:24:19-04:00weekly0.5/security-management-magazine/articles/2004/09/aviation-safety/2020-06-23T19:24:19-04:00weekly0.5/security-management-magazine/articles/2004/09/emergency-responders/2020-06-23T19:24:19-04:00weekly0.5/security-management-magazine/articles/2004/09/software-pirates/2020-06-23T19:24:19-04:00weekly0.5/security-management-magazine/articles/2004/09/the-young-and-the-restive/2020-06-23T19:24:19-04:00weekly0.5/security-management-magazine/articles/2004/09/cargo-security/2020-06-23T19:24:20-04:00weekly0.5/security-management-magazine/articles/2004/09/court-case-e-mail-insufficient-for-policy-documents/2020-06-23T19:24:20-04:00weekly0.5/security-management-magazine/articles/2004/09/fda-food-may-be-detained-if-deemed-unsafe/2020-06-23T19:24:21-04:00weekly0.5/security-management-magazine/articles/2004/09/concealed-weapons/2020-06-23T19:24:21-04:00weekly0.5/security-management-magazine/articles/2004/08/port-security/2020-06-23T19:24:21-04:00weekly0.5/security-management-magazine/articles/2004/08/crisis-insurance/2020-06-23T19:24:22-04:00weekly0.5/security-management-magazine/articles/2004/08/from-jericho-to-jersey-barrier/2020-06-23T19:24:22-04:00weekly0.5/security-management-magazine/articles/2004/08/digging-deeper-into-data-mining2/2020-06-23T19:24:23-04:00weekly0.5/security-management-magazine/articles/2004/08/a-report-on-biometrics-in-aviation-security/2020-06-23T19:24:23-04:00weekly0.5/security-management-magazine/articles/2004/08/building-cleared-of-glass-danger/2020-06-23T19:24:24-04:00weekly0.5/security-management-magazine/articles/2004/08/surveillance/2020-06-23T19:24:24-04:00weekly0.5/security-management-magazine/articles/2004/08/intellectual-property/2020-06-23T19:24:25-04:00weekly0.5/security-management-magazine/articles/2004/08/us-visit/2020-06-23T19:24:25-04:00weekly0.5/security-management-magazine/articles/2004/08/counterfeiting/2020-06-23T19:24:26-04:00weekly0.5/security-management-magazine/articles/2004/08/rail-security/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/nuclear-security/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/special-protection-for-special-collections/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/zero-tolerance/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/working-wirelessly-and-wisely/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/copyright-infringement/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/airport-screener/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/bioterror/2020-06-23T19:49:10-04:00weekly0.5/security-management-magazine/articles/2004/07/browser-breakers/2020-06-23T19:49:11-04:00weekly0.5/security-management-magazine/articles/2004/07/bulking-up-video-surveillance/2020-06-23T19:49:11-04:00weekly0.5/security-management-magazine/articles/2004/07/buy-lie-and-sell-high-how-investors-lost-out-on-enron-and-the-internet-bubble/2020-06-23T19:49:11-04:00weekly0.5/security-management-magazine/articles/2004/07/cargo-security-gao-report-on-tampering/2020-06-23T19:49:11-04:00weekly0.5/security-management-magazine/articles/2004/07/a-model-of-cost-effectiveness/2020-06-23T19:49:11-04:00weekly0.5/security-management-magazine/articles/2004/07/tagging-rfids-privacy-problems/2020-06-23T19:49:12-04:00weekly0.5/security-management-magazine/articles/2004/07/theft/2020-06-23T19:49:12-04:00weekly0.5/security-management-magazine/articles/2004/07/contracting-computer-troubles/2020-06-23T19:49:13-04:00weekly0.5/security-management-magazine/articles/2004/07/contracting-computer-troubles2/2020-06-23T19:49:13-04:00weekly0.5/security-management-magazine/articles/2004/07/computer-security-sourcebook-and-communications-security-sourcebook/2020-06-23T19:49:13-04:00weekly0.5/security-management-magazine/articles/2004/07/critical-infrastructure-protection/2020-06-23T19:49:13-04:00weekly0.5/security-management-magazine/articles/2004/06/court-case-school-must-balance-drug-testing-and-privacy-rights/2020-06-23T19:49:13-04:00weekly0.5/security-management-magazine/articles/2004/06/transportation/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/effective-physical-security-third-edition/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/it-gains-clout-in-making-security-decisions/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/premises-liability/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/report-theft-of-heavy-equipment/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/it-technology-primer/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/criminal-case-files-go-online/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/what-is-homeland-security/2020-06-23T19:49:14-04:00weekly0.5/security-management-magazine/articles/2004/06/nist-issues-card-technology-report/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/06/gao-report-on-us-visit-program/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/06/maritime-security/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/06/task-force-pushes-for-early-warning-system/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/06/task-force-pushes-for-early-warning-system2/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/06/a-virtually-risk-free-crisis/2020-06-23T19:49:15-04:00weekly0.5/security-management-magazine/articles/2004/04/sec-announces-examinations-of-wall-street-firms-cybersecurity-measures/2020-06-23T19:49:16-04:00weekly0.5/security-management-magazine/articles/2004/03/whither-domestic-terrorists/2020-06-23T19:49:16-04:00weekly0.5/security-management-magazine/articles/2004/03/when-a-pictures-worth-a-thousand-worries/2020-06-23T19:49:16-04:00weekly0.5/security-management-magazine/articles/2004/03/fuming-over-unplanned-reaction/2020-06-23T19:49:16-04:00weekly0.5/security-management-magazine/articles/2004/03/reducing-traumas-toll/2020-06-23T19:49:17-04:00weekly0.5/security-management-magazine/articles/2004/03/new-working-group-targets-scammers/2020-06-23T19:49:17-04:00weekly0.5/security-management-magazine/articles/2004/03/nsf-scores-well-on-security/2020-06-23T19:49:17-04:00weekly0.5/security-management-magazine/articles/2004/03/whats-security-worth/2020-06-23T19:49:17-04:00weekly0.5/security-management-magazine/articles/2004/03/keeping-chaos-under-control/2020-06-23T19:49:18-04:00weekly0.5/security-management-magazine/articles/2004/03/the-proper-prescription/2020-06-23T19:49:18-04:00weekly0.5/security-management-magazine/articles/2004/03/defenses-morph-as-viruses-mutate/2020-06-23T19:49:18-04:00weekly0.5/security-management-magazine/articles/2004/03/the-school-year-in-pictures/2020-06-23T19:49:18-04:00weekly0.5/security-management-magazine/articles/2004/03/a-pound-of-prevention/2020-06-23T19:49:19-04:00weekly0.5/security-management-magazine/articles/2004/03/no-surprises-in-these-boxes/2020-06-23T19:49:19-04:00weekly0.5/security-management-magazine/articles/2004/03/legal-report-march-2004/2020-06-23T19:49:19-04:00weekly0.5/security-management-magazine/articles/2004/03/industry-news-march-2004/2020-06-23T19:49:20-04:00weekly0.5/security-management-magazine/articles/2004/02/image-is-everything-in-stopping-crime/2020-06-23T19:49:20-04:00weekly0.5/security-management-magazine/articles/2004/02/food-security-made-alimentary/2020-06-23T19:49:21-04:00weekly0.5/security-management-magazine/articles/2004/02/training-your-team/2020-06-23T19:49:21-04:00weekly0.5/security-management-magazine/articles/2004/02/liscouski-cites-milestones-offers-industry-options/2020-06-23T19:49:22-04:00weekly0.5/security-management-magazine/articles/2004/02/summit-a-step-toward-cybersecurity/2020-06-23T19:49:23-04:00weekly0.5/security-management-magazine/articles/2004/02/the-road-to-rage/2020-08-11T11:04:04-04:00weekly0.5/security-management-magazine/articles/2004/02/the-importance-of-being-earnest/2020-10-05T16:52:50-04:00weekly0.5/security-management-magazine/articles/2004/02/warding-off-evil-spirits/2020-06-23T19:49:25-04:00weekly0.5/security-management-magazine/articles/2004/02/when-the-front-lines-are-local/2020-06-23T19:49:27-04:00weekly0.5/security-management-magazine/articles/2004/02/time-to-check-out-liability-trends/2020-10-08T13:07:48-04:00weekly0.5/security-management-magazine/articles/2004/02/legal-report-february-2004/2020-06-23T19:49:28-04:00weekly0.5/security-management-magazine/articles/2004/02/industry-news-february-2004/2020-10-08T13:03:55-04:00weekly0.5/security-management-magazine/articles/2004/01/toy-weapons-under-fire/2020-10-08T12:51:17-04:00weekly0.5/security-management-magazine/articles/2004/01/going-backup-before-going-down/2020-10-08T12:47:19-04:00weekly0.5/security-management-magazine/articles/2004/01/make-security-a-hot-product/2020-10-08T12:43:24-04:00weekly0.5/security-management-magazine/articles/2004/01/what-if-freddie-krueger-wrote-code/2020-10-08T12:41:25-04:00weekly0.5/security-management-magazine/articles/2004/01/the-key-to-earning/2020-10-08T12:39:11-04:00weekly0.5/security-management-magazine/articles/2004/01/shared-intelligence-makes-everyone-smarter/2020-10-08T12:34:20-04:00weekly0.5/security-management-magazine/articles/2004/01/how-companies-can-compete-for-contracts/2020-10-08T12:30:09-04:00weekly0.5/security-management-magazine/articles/2004/01/protecting-the-zone/2020-10-08T10:58:53-04:00weekly0.5/security-management-magazine/articles/2004/01/leadership-in-a-time-of-change/2020-10-08T10:56:53-04:00weekly0.5/security-management-magazine/articles/2004/01/building-up-system-defenses/2020-10-08T10:54:42-04:00weekly0.5/security-management-magazine/articles/2004/01/whos-pulling-the-data-strings/2020-10-08T10:47:01-04:00weekly0.5/security-management-magazine/articles/2004/01/legal-report-january-2004/2020-10-08T10:47:40-04:00weekly0.5/security-management-magazine/articles/2004/01/industry-news-january-2004/2020-10-07T16:23:33-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/advertise-archives/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/contact-us/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/demographics/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/fine-print/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/article-development/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/custom-content/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/podcasts/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/2021_GSX_Sponsorships/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/newsletters/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/websites/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/events/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/security-technology/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/security-management/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/awards/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise/editorial-calendar/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/contact-us/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/demographics/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/fine-print/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/article-development/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/newsletters/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/events/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/security-technology/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/awards/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2023/editorial-calendar/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/advertise-archives/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/contact-us/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/demographics/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/fine-print/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/article-development/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/custom-content/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/podcasts/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/2022_GSX_Sponsorships/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/newsletters/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/websites/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/events/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/security-technology/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/security-management/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/awards/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise2/editorial-calendar/2024-08-29T13:00:49-04:00weekly0.5/security-management-magazine/articles/2024/11/deescalation/2024-11-07T11:30:58-05:00weekly0.5/security-management-magazine/articles/2024/11/cpted/2024-11-11T06:17:31-05:00weekly0.5/security-management-magazine/articles/2024/11/white-collar/2024-11-18T06:16:33-05:00weekly0.5/security-management-magazine/articles/2024/11/certification-profile/2024-11-07T08:39:41-05:00weekly0.5/security-management-magazine/articles/2024/11/target-tehran-book-review/2024-11-06T08:34:20-05:00weekly0.5/security-management-magazine/articles/2024/11/legal-report/2024-11-15T08:01:54-05:00weekly0.5/security-management-magazine/articles/2024/11/industry-news/2024-11-15T14:00:09-05:00weekly0.5/security-management-magazine/articles/2024/11/asis-news/2024-11-27T09:51:19-05:00weekly0.5/security-management-magazine/articles/2024/09/career-transition/2024-09-01T09:11:44-04:00weekly0.5/security-management-magazine/articles/2024/09/soc/2024-09-09T07:00:23-04:00weekly0.5/security-management-magazine/articles/2024/09/banks/2024-09-16T08:24:34-04:00weekly0.5/security-management-magazine/articles/2024/09/ali-nomais/2024-09-11T13:49:50-04:00weekly0.5/security-management-magazine/articles/2024/09/legal-report/2024-09-17T09:00:21-04:00weekly0.5/security-management-magazine/articles/2024/09/industry-news/2024-09-19T09:00:20-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/how-to-manage-amid-mistrust/2024-10-22T17:18:26-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/where-to-network-and-eat-in-orlando-during-gsx/2024-09-19T09:55:12-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/lippold-think-in-the-long-term/2024-09-19T09:54:10-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/how-to-build-resilience-at-your-organization/2024-09-19T18:37:13-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/lessons-from-finland/2024-10-22T17:17:06-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/facilitator-in-chief/2024-10-10T14:47:35-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/discover-dublin-at-asis-europe-2025/2024-09-19T09:48:31-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/Marin-Be-Active-Defender/2024-10-22T17:16:14-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/El-Kaliouby-Humans-Can-Leverage-AI/2024-10-22T17:15:14-04:00weekly0.5/security-management-magazine/articles/2024/gsx-daily/How-to-Use-ESG-as-a-Global-Strategy-to-Address-Risk/2024-10-22T17:14:43-04:00weekly0.5/security-management-magazine/articles/2024/10/election-security/2024-10-17T10:40:19-04:00weekly0.5/security-management-magazine/articles/2024/10/culture/2024-10-21T08:15:26-04:00weekly0.5/security-management-magazine/articles/2024/10/asis-news-celebrating-wins/2024-10-07T09:29:00-04:00weekly0.5/security-management-magazine/articles/2024/10/certification-profile/2024-10-09T08:00:10-04:00weekly0.5/security-management-magazine/articles/2024/10/legal-report/2024-10-17T11:31:54-04:00weekly0.5/security-management-magazine/articles/2024/10/asis-news/2024-10-24T10:24:18-04:00weekly0.5/security-management-magazine/articles/2024/10/industry-news/2024-10-25T09:33:08-04:00weekly0.5/security-management-magazine/articles/2024/08/biometrics/2024-08-12T08:18:11-04:00weekly0.5/security-management-magazine/articles/2024/08/lawsuits/2024-08-19T08:14:33-04:00weekly0.5/security-management-magazine/articles/2024/08/legal-report/2024-08-05T09:54:29-04:00weekly0.5/security-management-magazine/articles/2024/08/brooke-hopperstad-app/2024-08-15T08:40:36-04:00weekly0.5/security-management-magazine/articles/2024/08/gsx-2024-product-showcase/2024-08-26T13:16:08-04:00weekly0.5/security-management-magazine/articles/2024/08/industry-news/2024-08-28T09:10:37-04:00weekly0.5/security-management-magazine/articles/2024/08/asis-news/2024-08-29T09:08:13-04:00weekly0.5/security-management-magazine/articles/2024/01/extremism/2024-01-01T09:34:45-05:00weekly0.5/security-management-magazine/articles/2024/01/k9/2024-01-15T08:17:02-05:00weekly0.5/security-management-magazine/articles/2024/01/healthcare-cybersecurity/2024-01-22T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/01/cy-oatridge-cpp-aiming-for-an-inclusive-purposeful-strategy/2024-01-16T13:34:24-05:00weekly0.5/security-management-magazine/articles/2024/01/how-to-establish-a-policy-for-using-naloxone-a-lifesaving-tool/2024-01-24T09:49:55-05:00weekly0.5/security-management-magazine/articles/2024/01/book-review-off-the-edge-flat-earthers-conspiracy-culture-and-why-people-will-believe-anything/2024-01-18T08:06:14-05:00weekly0.5/security-management-magazine/articles/2024/01/asis-news/2024-01-26T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/01/marketplace/2024-01-29T14:04:04-05:00weekly0.5/security-management-magazine/articles/2024/01/balancing-ai-innovation-and-regulation/2024-01-26T07:00:11-05:00weekly0.5/security-management-magazine/articles/2024/02/wpv-retail/2024-02-12T07:53:35-05:00weekly0.5/security-management-magazine/articles/2024/02/access-control/2024-02-19T09:01:42-05:00weekly0.5/security-management-magazine/articles/2024/02/legal-report/2024-02-05T08:19:41-05:00weekly0.5/security-management-magazine/articles/2024/02/eva-nolle-certification-profile/2024-02-19T09:49:24-05:00weekly0.5/security-management-magazine/articles/2024/02/book-review-rise-of-security/2024-02-16T16:40:36-05:00weekly0.5/security-management-magazine/articles/2024/02/industry-news/2024-02-16T09:00:24-05:00weekly0.5/security-management-magazine/articles/2024/02/asis-news/2024-02-23T06:00:11-05:00weekly0.5/security-management-magazine/articles/2024/03/schools/2024-03-01T06:00:10-05:00weekly0.5/security-management-magazine/articles/2024/03/site-hardening/2024-03-11T08:14:47-04:00weekly0.5/security-management-magazine/articles/2024/03/nist-csf/2024-03-18T08:22:51-04:00weekly0.5/security-management-magazine/articles/2024/03/jakson-phillips-certification-profile/2024-03-07T11:41:43-05:00weekly0.5/security-management-magazine/articles/2024/03/industry-news/2024-03-29T10:58:36-04:00weekly0.5/security-management-magazine/articles/2024/03/asis-news/2024-03-29T10:48:56-04:00weekly0.5/security-management-magazine/articles/2024/04/cannabis/2024-04-15T08:08:04-04:00weekly0.5/security-management-magazine/articles/2024/04/concierge/2024-04-22T15:17:08-04:00weekly0.5/security-management-magazine/articles/2024/04/asis-europe-2024/2024-04-03T08:50:30-04:00weekly0.5/security-management-magazine/articles/2024/04/isc-west-2024-product-showcase/2024-04-05T08:07:23-04:00weekly0.5/security-management-magazine/articles/2024/04/legal-report/2024-04-08T11:39:11-04:00weekly0.5/security-management-magazine/articles/2024/04/certification-profile-gatiti/2024-04-10T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/industry-news/2024-04-17T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/04/asis-news/2024-10-28T13:26:42-04:00weekly0.5/security-management-magazine/articles/2024/04/book-review-privacy-leader-compass/2024-04-26T07:44:10-04:00weekly0.5/security-management-magazine/articles/2024/05/toxic-workplaces/2024-05-01T07:29:39-04:00weekly0.5/security-management-magazine/articles/2024/05/zoo/2024-05-13T08:16:04-04:00weekly0.5/security-management-magazine/articles/2024/05/audio/2024-05-20T06:00:10-04:00weekly0.5/security-management-magazine/articles/2024/05/certification-profile-ben-brown/2024-05-10T10:06:13-04:00weekly0.5/security-management-magazine/articles/2024/05/asis-news-nominating-committee/2024-05-23T10:15:06-04:00weekly0.5/security-management-magazine/articles/2024/05/book-review-locks-insecurity-engineering/2024-05-24T08:36:11-04:00weekly0.5/security-management-magazine/articles/2024/05/legal-report-encryption-privacy/2024-05-22T08:00:11-04:00weekly0.5/security-management-magazine/articles/2024/05/marketplace/2024-05-29T11:41:34-04:00weekly0.5/security-management-magazine/articles/2024/05/industry-news/2024-05-30T07:31:47-04:00weekly0.5/security-management-magazine/articles/2024/06/deepfakes/2024-06-17T08:05:09-04:00weekly0.5/security-management-magazine/articles/2024/06/food/2024-06-24T08:08:00-04:00weekly0.5/security-management-magazine/articles/2024/06/certification-Francisco-Hernandez-CPP/2024-06-13T18:37:09-04:00weekly0.5/security-management-magazine/articles/2024/06/legal-report/2024-06-13T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/06/rise-of-the-mavericks-book-review/2024-06-20T08:56:44-04:00weekly0.5/security-management-magazine/articles/2024/06/industry-news/2024-06-25T11:00:11-04:00weekly0.5/security-management-magazine/articles/2024/06/asis-news/2024-06-27T07:30:02-04:00weekly0.5/security-management-magazine/articles/2024/12/red-team/2024-12-16T07:33:37-05:00weekly0.5/security-management-magazine/articles/2024/12/terry-owens-certification-profile/2024-12-04T08:47:12-05:00weekly0.5/security-management-magazine/articles/2024/12/robin-hood-effect/2024-12-12T09:13:02-05:00weekly0.5/security-management-magazine/articles/2024/12/legal-report/2024-12-09T12:17:03-05:00weekly0.5/security-management-magazine/articles/2024/12/travel-risk-concerns/2024-12-23T10:32:58-05:00weekly0.5/security-management-magazine/articles/2024/12/coaching-critical-thinking/2024-12-26T18:18:06-05:00weekly0.5/security-management-magazine/articles/2024/12/influence-philosophy/2024-12-30T14:06:35-05:00weekly0.5/security-management-magazine/articles/2024/12/asis-news/2024-12-19T09:37:16-05:00weekly0.5/security-management-magazine/articles/2024/12/industry-news/2024-12-18T22:50:42-05:00weekly0.5/security-management-magazine/articles/2023/03/buyinstrategies/2023-03-01T11:21:17-05:00weekly0.5/security-management-magazine/articles/2023/03/extremism-and-houses-of-worship/2023-03-20T08:16:57-04:00weekly0.5/security-management-magazine/articles/2023/03/investigations/2023-03-27T07:57:43-04:00weekly0.5/security-management-magazine/articles/2023/03/mass-evacuations/2023-03-13T09:09:42-04:00weekly0.5/security-management-magazine/articles/2023/03/infographic-revisiting-readiness/2023-03-01T15:29:39-05:00weekly0.5/security-management-magazine/articles/2023/03/legal-report-australian-casino-faces-class-action-suits/2023-03-03T07:00:10-05:00weekly0.5/security-management-magazine/articles/2023/03/certification-profile-emilian-irimescu-cpp-psp/2023-03-09T09:29:08-05:00weekly0.5/security-management-magazine/articles/2023/03/book-review-encyclopedia-of-security-and-emergency-management/2023-03-22T11:22:28-04:00weekly0.5/security-management-magazine/articles/2023/03/book-review-war-transformed/2023-03-22T11:49:22-04:00weekly0.5/security-management-magazine/articles/2023/03/missing-the-bigger-picture/2023-03-10T11:03:14-05:00weekly0.5/security-management-magazine/articles/2023/03/industry-news/2023-03-10T11:28:54-05:00weekly0.5/security-management-magazine/articles/2023/03/marketplace/2023-03-17T08:42:43-04:00weekly0.5/security-management-magazine/articles/2023/03/asis-news/2023-03-23T10:27:00-04:00weekly0.5/security-management-magazine/articles/2023/05/uncrewed-aerial-systems/2023-05-22T08:05:58-04:00weekly0.5/security-management-magazine/articles/2023/05/how-to-become-a-cso/2023-05-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/05/climate-change-and-security/2023-05-15T06:35:01-04:00weekly0.5/security-management-magazine/articles/2023/05/legal-report/2023-05-08T08:09:54-04:00weekly0.5/security-management-magazine/articles/2023/05/certification-profile-zulaykhah-aileru-psp/2023-07-21T15:44:01-04:00weekly0.5/security-management-magazine/articles/2023/05/industry-news-lax-horton-solution-people-mover/2023-05-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/05/book-review-healthcare-security-solutions-for-management-operations-and-administration/2023-05-17T08:55:01-04:00weekly0.5/security-management-magazine/articles/2023/05/book-review-youth-violence-prevention-the-pathway-back-through-inclusion-and-connection/2023-05-24T07:16:42-04:00weekly0.5/security-management-magazine/articles/2023/05/marketplace-high-volume-shredders-specialized-doors-video-intercoms-and-more/2023-05-19T08:06:49-04:00weekly0.5/security-management-magazine/articles/2023/05/asis-news-how-to-get-involved-with-upcoming-events-and-global-governance-activities/2023-05-26T08:21:01-04:00weekly0.5/security-management-magazine/articles/2023/02/resilience-ramifications/2023-02-03T11:02:41-05:00weekly0.5/security-management-magazine/articles/2023/02/reputation-security/2023-02-13T11:56:49-05:00weekly0.5/security-management-magazine/articles/2023/02/mental-health-for-security/2023-02-20T08:40:53-05:00weekly0.5/security-management-magazine/articles/2023/02/four-elements-of-security-planning/2023-02-07T09:26:07-05:00weekly0.5/security-management-magazine/articles/2023/02/certification-profile-hwee-fong-yong-app/2023-02-09T08:32:40-05:00weekly0.5/security-management-magazine/articles/2023/02/for-effective-governance-start-with-why/2023-02-23T11:04:19-05:00weekly0.5/security-management-magazine/articles/2023/02/legal-report-former-london-police-officer-sentenced-to-prison-for-abusing-women-and-his-authority/2023-02-10T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/02/book-review-go-hck-yourself-a-simple-introduction-to-cyber-attacks-and-defense/2023-02-16T08:23:47-05:00weekly0.5/security-management-magazine/articles/2023/02/book-review-drug-wars/2023-02-23T08:52:08-05:00weekly0.5/security-management-magazine/articles/2023/02/marketplace-emergency-call-stations-ai-video-analytics-and-more/2023-02-17T09:39:00-05:00weekly0.5/security-management-magazine/articles/2023/02/isc-west-2023-product-showcase/2023-03-06T10:06:24-05:00weekly0.5/security-management-magazine/articles/2023/02/industry-news-restaurant-group-turns-to-remote-socs-to-monitor-security-videos/2023-02-17T09:39:00-05:00weekly0.5/security-management-magazine/articles/2023/02/asis-news-upcoming-events-standards-and-scholarships/2023-02-24T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/04/the-how-of-security-governance/2023-04-05T09:00:21-04:00weekly0.5/security-management-magazine/articles/2023/04/insider-threats/2023-04-17T09:17:01-04:00weekly0.5/security-management-magazine/articles/2023/04/workplace-violence-in-healthcare/2023-04-24T07:49:08-04:00weekly0.5/security-management-magazine/articles/2023/04/legal-report/2023-04-11T07:59:23-04:00weekly0.5/security-management-magazine/articles/2023/04/certification-profile-jared-gibbons-app/2023-04-13T06:00:11-04:00weekly0.5/security-management-magazine/articles/2023/04/industry-news-finnish-hypermarkets-select-idis-for-new-vms-solution/2023-04-14T08:28:12-04:00weekly0.5/security-management-magazine/articles/2023/04/Resilience-Management-How-to-Turn-a-Threat-into-an-Opportunity/2023-04-19T09:19:38-04:00weekly0.5/security-management-magazine/articles/2023/04/book-review-basic-handbook-of-police-supervision/2023-04-20T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/04/book-review-from-berkeley-to-berlin-how-the-rad-lab-helped-avert-nuclear-war/2023-05-08T13:08:27-04:00weekly0.5/security-management-magazine/articles/2023/04/marketplace-access-control-door-lights-cloud-solutions-and-more/2023-04-21T08:23:10-04:00weekly0.5/security-management-magazine/articles/2023/04/asis-news/2023-04-26T08:38:34-04:00weekly0.5/security-management-magazine/articles/2023/07/diversity-equity-and-inclusion/2023-07-03T14:34:16-04:00weekly0.5/security-management-magazine/articles/2023/07/travel-security/2023-07-26T09:44:11-04:00weekly0.5/security-management-magazine/articles/2023/07/nonprofit-security/2023-07-17T08:06:12-04:00weekly0.5/security-management-magazine/articles/2023/07/legal-report/2023-07-10T09:02:05-04:00weekly0.5/security-management-magazine/articles/2023/07/on-the-point-of-a-double-edged-sword-technical-standards-protect-and-defend/2024-01-12T11:37:58-05:00weekly0.5/security-management-magazine/articles/2023/07/certification-profile-maurice-hicks-cpp/2023-07-13T08:59:42-04:00weekly0.5/security-management-magazine/articles/2023/07/book-review-autumn-of-our-discontent/2023-07-19T08:41:20-04:00weekly0.5/security-management-magazine/articles/2023/07/book-review-fool-me-once/2023-07-26T08:15:36-04:00weekly0.5/security-management-magazine/articles/2023/07/legal-nightmares-email-instant-messages/2023-07-26T08:15:36-04:00weekly0.5/security-management-magazine/articles/2023/07/industry-news-mod-pizza-flips-for-video-and-alarm-management/2023-07-14T08:42:57-04:00weekly0.5/security-management-magazine/articles/2023/07/marketplace/2023-07-21T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/07/asis-news-advance-rates-for-gsx-end-soon/2023-07-27T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/08/esg/2023-08-14T10:06:11-04:00weekly0.5/security-management-magazine/articles/2023/08/cryptocurrency/2023-08-21T12:00:22-04:00weekly0.5/security-management-magazine/articles/2023/08/legal-report/2023-08-07T08:28:20-04:00weekly0.5/security-management-magazine/articles/2023/08/certification-profile-meshal-aljohani-cpp-pci-psp/2023-10-31T10:41:19-04:00weekly0.5/security-management-magazine/articles/2023/08/book-review-modern-management-and-leadership-best-practice-essentials-with-cisocso-applications/2023-08-09T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/08/book-review-inside-abu-ghraib/2023-08-16T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/08/industry-news-german-factory-improves-workplace-security-with-video-surveillance/2023-08-11T09:04:53-04:00weekly0.5/security-management-magazine/articles/2023/08/marketplace-ai-powered-analytics-ptz-cameras-power-management-and-more/2023-08-18T08:54:03-04:00weekly0.5/security-management-magazine/articles/2023/08/asis-news-how-to-get-involved-with-asis-today/2023-08-24T08:00:10-04:00weekly0.5/security-management-magazine/articles/2023/08/gsx-2023-product-showcase/2023-08-24T01:01:01-04:00weekly0.5/security-management-magazine/articles/2023/08/editors-note-log-off/2023-08-28T08:41:46-04:00weekly0.5/security-management-magazine/articles/2023/11/soft-skills/2023-11-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/11/dynamic-risk-assessment/2023-11-13T08:07:21-05:00weekly0.5/security-management-magazine/articles/2023/11/legal-report-uber-to-face-almost-80-negligence-lawsuits-from-passengers/2024-01-02T10:58:10-05:00weekly0.5/security-management-magazine/articles/2023/11/industry-news-nycs-penn-station-gets-upgraded-audio-communications-solutions/2023-11-12T07:00:10-05:00weekly0.5/security-management-magazine/articles/2023/11/fasi-uddin-certification-profile/2023-11-16T11:22:04-05:00weekly0.5/security-management-magazine/articles/2023/11/the-future-of-security-navigating-change/2024-01-02T11:21:03-05:00weekly0.5/security-management-magazine/articles/2023/11/marketplace/2024-01-08T09:26:48-05:00weekly0.5/security-management-magazine/articles/2023/11/book-review-cybersecurity-for-executives-managers-and-leaders/2024-01-08T10:44:19-05:00weekly0.5/security-management-magazine/articles/2023/11/asis-news-new-asis-research-and-upcoming-events/2023-11-30T10:47:11-05:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/boosting-your-threat-assessment-savvy/2023-08-31T11:16:45-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/assessing-the-insider-threat/2024-01-16T15:10:18-05:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/assessing-the-ai-revolution/2023-08-31T11:28:48-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Sikorski-Geopolitics-Democratic-Values/2023-08-29T08:00:10-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/the-sm-editors-reading-guide-for-gsx-2023/2023-08-29T13:36:42-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/views-from-vienna-at-asis-europe-2024/2024-01-08T10:04:34-05:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/aim-for-authenticity-at-cso-secure-horizons/2023-08-29T08:00:11-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Your-Monday-GSX-2023-Guide/2023-09-26T12:41:56-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/ASIS-Bookstore-Broaden-Your-Security-Knowledge/2023-09-11T05:00:11-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Former-CIA-Spy-to-Speak-at-GSX-2023/2023-08-29T08:00:11-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/insights-from-angela-osborne/2023-09-05T15:32:34-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/insights-from-mackenzie-grahek/2023-09-05T15:29:47-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Your-Tuesday-GSX-2023-Guide/2023-09-26T12:41:23-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/it-security-leaders-get-the-most-out-of-gsx/2023-09-05T15:19:51-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Your-Wednesday-GSX-2023-Guide/2023-09-26T12:37:33-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Using-ESRM-to-Gain-a-Seat-at-the-Table/2023-09-12T07:29:58-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/for-an-impactful-elevator-pitch-aim-to-connect-emotionally/2023-09-12T07:29:58-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/redesigning-in-dallas/2023-09-11T15:53:33-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/benefits-of-aiding-ukraine/2023-09-11T16:54:17-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/How-to-Look-Out-for-Potential-Attacker-Red-Flags/2024-01-02T12:37:31-05:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Chemical-security-its-a-partnership-thing/2023-09-12T07:29:58-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/security-excellence-awarded/2023-09-13T05:00:10-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/leveraging-technology-for-more-proactive-security/2023-09-13T05:00:10-04:00weekly0.5/security-management-magazine/articles/2023/gsx-daily-2023/Workplace-safety-how-to-address-remote-risks/2023-12-20T11:50:38-05:00weekly0.5/security-management-magazine/articles/2023/09/workforce-development/2023-08-31T12:32:05-04:00weekly0.5/security-management-magazine/articles/2023/09/marathon-and-mass-event-security/2023-09-18T10:24:39-04:00weekly0.5/security-management-magazine/articles/2023/09/esrm/2023-09-18T09:05:06-04:00weekly0.5/security-management-magazine/articles/2023/09/security-design-101/2023-09-25T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/09/certification-profile-mykola-mikheiev-cpp-pci-psp/2023-09-07T11:35:29-04:00weekly0.5/security-management-magazine/articles/2023/09/legal-report/2023-09-08T11:40:29-04:00weekly0.5/security-management-magazine/articles/2023/09/industry-news-vms-platform-offers-utah-school-district-future-flexibility/2023-09-19T13:50:00-04:00weekly0.5/security-management-magazine/articles/2023/09/marketplace-perimeter-security-ai-analytics-vandal-resistant-intercoms-and-more/2023-09-25T10:05:08-04:00weekly0.5/security-management-magazine/articles/2023/09/asis-news-celebrating-our-achievements-and-looking-to-the-future/2023-09-28T09:33:25-04:00weekly0.5/security-management-magazine/articles/2024/07/convergence/2024-07-01T08:31:37-04:00weekly0.5/security-management-magazine/articles/2024/07/resilience/2024-07-15T08:08:24-04:00weekly0.5/security-management-magazine/articles/2024/07/william-tenney-ASIS-CEO/2024-07-01T09:00:20-04:00weekly0.5/security-management-magazine/articles/2024/07/risk-management-research/2024-07-22T08:37:13-04:00weekly0.5/security-management-magazine/articles/2024/07/oswald-smiley-certification/2024-07-11T07:00:10-04:00weekly0.5/security-management-magazine/articles/2024/07/Legal-report-SCOTUS-rulings/2024-07-16T09:58:43-04:00weekly0.5/security-management-magazine/articles/2024/07/book-review-private-security/2024-07-22T10:02:37-04:00weekly0.5/security-management-magazine/articles/2024/07/industry-news/2024-07-19T15:36:25-04:00weekly0.5/security-management-magazine/articles/2024/07/asis-news-research-gsx/2024-07-26T09:03:34-04:00weekly0.5/security-management-magazine/articles/2023/12/retail-theft/2023-12-11T10:29:54-05:00weekly0.5/security-management-magazine/articles/2023/12/cyber-incident-response/2023-12-18T06:00:10-05:00weekly0.5/security-management-magazine/articles/2023/12/certification-profile-neo-seate-cpp-pci-psp/2024-01-08T09:14:20-05:00weekly0.5/security-management-magazine/articles/2023/12/industry-news-remote-guard-services-provide-proof-to-arrest-missing-menaces/2024-01-08T09:28:24-05:00weekly0.5/security-management-magazine/articles/2023/12/book-review-1-leadership/2024-01-08T10:14:38-05:00weekly0.5/security-management-magazine/articles/2023/12/legal-report-eu-member-states-allowed-to-ban-employees-religious-garb/2023-12-14T11:31:36-05:00weekly0.5/security-management-magazine/articles/2023/12/asis-news-meet-your-2024-leadership/2023-12-20T08:39:05-05:00weekly0.5/security-management-magazine/articles/2023/10/road-safety/2023-10-16T08:04:16-04:00weekly0.5/security-management-magazine/articles/2023/10/how-to-fire-people-safely/2023-10-23T07:58:34-04:00weekly0.5/security-management-magazine/articles/2023/10/the-carrot-and-the-stick-how-audits-sustain-success/2023-10-05T08:35:49-04:00weekly0.5/security-management-magazine/articles/2023/10/legal-report-october-2023/2024-01-02T11:19:00-05:00weekly0.5/security-management-magazine/articles/2023/10/certification-profile-chris-mckechnie-psp/2023-10-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/10/book-review-the-bin-laden-papers/2024-01-02T11:10:11-05:00weekly0.5/security-management-magazine/articles/2023/10/industry-news/2023-10-18T10:49:21-04:00weekly0.5/security-management-magazine/articles/2023/10/3-keys-to-effective-strategic-communication/2023-10-26T06:00:10-04:00weekly0.5/security-management-magazine/articles/2023/10/advice-on-the-record-tips-for-csos-interacting-with-journalists/2023-10-26T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/10/marketplace-mass-transit-surveillance-intercoms-and-more/2023-10-20T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/10/asis-news-time-to-renew-plus-other-association-news/2023-10-27T09:28:01-04:00weekly0.5/security-management-magazine/articles/2023/06/school-security-and-active-assailants/2023-06-20T11:21:38-04:00weekly0.5/security-management-magazine/articles/2023/06/fuel-theft-and-cartels/2023-06-12T08:07:11-04:00weekly0.5/security-management-magazine/articles/2023/06/trauma-informed-workplace/2023-06-26T08:51:21-04:00weekly0.5/security-management-magazine/articles/2023/06/legal-report/2023-06-02T09:01:38-04:00weekly0.5/security-management-magazine/articles/2023/06/certification-profile-valentina-sabucco-app/2023-06-12T14:29:48-04:00weekly0.5/security-management-magazine/articles/2023/06/industry-news-canadian-casino-and-resort-upgrade-video-surveillance-and-access-control/2023-06-13T08:27:35-04:00weekly0.5/security-management-magazine/articles/2023/06/book-review-the-cyber-elephant/2023-06-22T07:00:11-04:00weekly0.5/security-management-magazine/articles/2023/06/book-review-intelligence-analysts/2023-06-28T07:00:10-04:00weekly0.5/security-management-magazine/articles/2023/06/marketplace-site-management-software-visible-weapon-detection-and-more/2023-06-21T08:30:08-04:00weekly0.5/security-management-magazine/articles/2023/06/2023-asis-foundation-fitness-challengelaunches-plus-more-asis-news/2023-06-23T07:00:10-04:00weekly0.5/security-management-magazine/articles/2025/01/burnout/2025-01-28T08:53:40-05:00weekly0.5/security-management-magazine/articles/2025/01/garages/2025-01-13T07:48:13-05:00weekly0.5/security-management-magazine/articles/2025/01/incident-reports/2025-01-20T09:13:54-05:00weekly0.5/security-management-magazine/articles/2025/01/joe-olivarez-ASIS-president/2025-01-15T08:58:42-05:00weekly0.5/security-management-magazine/articles/2025/01/marcelo-wilson/2025-01-14T15:54:26-05:00weekly0.5/security-management-magazine/articles/2025/01/industry-news/2025-01-21T08:54:18-05:00weekly0.5/security-management-magazine/articles/2025/01/family-executive-protection/2025-01-31T08:32:30-05:00weekly0.5/security-management-magazine/articles/2025/01/ideological-violence/2025-01-27T08:37:29-05:00weekly0.5/security-management-magazine/articles/2025/01/asis-news/2025-01-30T09:35:36-05:00weekly0.5/security-management-magazine/articles/2025/02/convenience-stores/2025-02-10T07:43:22-05:00weekly0.5/security-management-magazine/articles/2025/02/premier-ciso-book-review/2025-02-17T10:00:10-05:00weekly0.5/security-management-magazine/articles/2025/02/asis-research-security-trends/2025-02-24T07:43:58-05:00weekly0.5/security-management-magazine/articles/2025/02/orellana-mcbride/2025-02-14T10:04:56-05:00weekly0.5/security-management-magazine/articles/2025/02/legal-report/2025-02-19T08:34:26-05:00weekly0.5/security-management-magazine/articles/2025/02/industry-news/2025-02-20T10:51:33-05:00weekly0.5/security-management-magazine/articles/2025/02/asis-news/2025-02-27T09:05:14-05:00weekly0.5/security-management-magazine/articles/2025/03/inclusion/2025-03-01T08:34:49-05:00weekly0.5/security-management-magazine/articles/2025/03/pandemic-readiness/2025-03-10T08:38:19-04:00weekly0.5/security-management-magazine/articles/2025/03/metrics/2025-03-17T08:23:45-04:00weekly0.5/security-management-magazine/articles/2025/03/certification-profile-okpala/2025-03-12T08:55:37-04:00weekly0.5/security-management-magazine/articles/2025/03/research-active-assailants/2025-03-24T08:19:43-04:00weekly0.5/security-management-magazine/articles/2025/03/responsible-technology/2025-03-21T08:37:10-04:00weekly0.5/security-management-magazine/articles/2025/03/asis-news/2025-03-26T08:50:53-04:00weekly0.5/security-management-magazine/articles/2025/03/legal-report/2025-03-27T08:37:46-04:00weekly0.5/security-management-magazine/articles/2025/03/industry-news/2025-03-28T11:56:22-04:00weekly0.5/security-management-magazine/articles/2025/04/k12/2025-04-14T07:59:09-04:00weekly0.5/security-management-magazine/articles/2025/04/budgets/2025-04-21T07:47:41-04:00weekly0.5/security-management-magazine/articles/2025/04/isc-west-2025-product-showcase/2025-03-13T13:50:18-04:00weekly0.5/security-management-magazine/articles/2025/04/certification-profile/2025-04-09T08:00:10-04:00weekly0.5/security-management-magazine/articles/2025/04/legal-report/2025-04-22T10:25:27-04:00weekly0.5/security-management-magazine/articles/2025/04/asis-news/2025-04-29T11:42:14-04:00weekly0.5/security-management-magazine/articles/2025/04/industry-news/2025-04-30T08:00:10-04:00weekly0.5/security-management-magazine/articles/2025/05/mass-protests/2025-04-30T12:25:45-04:00weekly0.5/security-management-magazine/articles/2025/05/extreme-temperatures/2025-05-12T07:33:41-04:00weekly0.5/security-management-magazine/articles/2025/05/certification-profile/2025-05-19T14:14:08-04:00weekly0.5/security-management-magazine/articles/2025/05/What-Responsible-AI-Means-in-the-Modern-Security-Industry/2025-05-22T12:30:41-04:00weekly0.5/security-management-magazine/articles/2025/05/asis-news/2025-05-29T10:15:17-04:00weekly0.5/security-management-magazine/articles/2025/05/industry-news/2025-05-28T12:12:12-04:00weekly0.5/security-management-magazine/articles/2025/06/executive-protection/2025-06-16T08:21:17-04:00weekly0.5/security-management-magazine/articles/2025/06/inclusive-security-policies/2025-06-23T08:48:01-04:00weekly0.5/security-management-magazine/articles/2025/06/teaching-cybersecurity-book/2025-06-03T11:10:55-04:00weekly0.5/security-management-magazine/articles/2025/06/hartford-rtcc-case-study/2025-06-05T11:05:39-04:00weekly0.5/security-management-magazine/articles/2025/06/certification-profile/2025-06-30T16:26:13-04:00weekly0.5/security-management-magazine/articles/2025/06/asis-news/2025-06-27T09:00:21-04:00weekly0.5/security-management-magazine/articles/2025/06/legal-report/2025-06-24T09:00:21-04:00weekly0.5/security-management-magazine/articles/2025/06/industry-news/2025-06-26T10:01:51-04:00weekly0.5/security-management-magazine/articles/2025/07/career-competency/2025-07-01T08:39:15-04:00weekly0.5/security-management-magazine/articles/2025/07/USIP/2025-07-21T08:31:50-04:00weekly0.5/security-management-magazine/articles/2025/07/concerts/2025-07-14T08:02:07-04:00weekly0.5/security-management-magazine/articles/2025/07/safer-youth-travel/2025-07-23T09:08:48-04:00weekly0.5/security-management-magazine/articles/2025/07/retail-energy-volatility/2025-07-29T09:13:20-04:00weekly0.5/security-management-magazine/articles/2025/07/legal-report/2025-07-16T14:58:04-04:00weekly0.5/security-management-magazine/articles/2025/07/book-review/2025-07-24T09:20:20-04:00weekly0.5/security-management-magazine/articles/2025/07/asis-news/2025-08-05T11:39:20-04:00weekly0.5/security-management-magazine/articles/2025/07/industry-news/2025-07-31T12:50:00-04:00weekly0.5/security-management-magazine/articles/2025/08/threat-assessment/2025-08-18T08:05:41-04:00weekly0.5/security-management-magazine/articles/2025/08/certification-profile/2025-08-04T08:12:42-04:00weekly0.5/security-management-magazine/articles/2025/08/guards-to-guardians/2025-08-07T08:00:11-04:00weekly0.5/security-management-magazine/articles/2025/08/debate-skills-for-ai/2025-08-12T14:12:04-04:00weekly0.5/security-management-magazine/articles/2025/08/ai-simulations-cybersecurity-training/2025-08-21T08:50:46-04:00weekly0.5/security-management-magazine/articles/2025/08/legal-report/2025-08-11T11:30:46-04:00weekly0.5/security-management-magazine/articles/2025/08/research-security-intelligence/2025-08-25T08:13:42-04:00weekly0.5/security-management-magazine/articles/2025/09/change-management/2025-09-01T10:02:25-04:00weekly0.5/security-management-magazine/articles/2025/09/barriers/2025-09-15T07:59:25-04:00weekly0.5/security-management-magazine/articles/2025/09/violent-incident-recovery/2025-09-22T08:00:15-04:00weekly0.5/security-management-magazine/articles/2025/09/2025-gsx-product-showcase/2025-09-29T09:30:10-04:00weekly0.5/security-management-magazine/articles/2025/09/bodyworn-camera-programs/2025-09-08T08:12:48-04:00weekly0.5/security-management-magazine/articles/2025/09/AI-powered-manipulation/2025-09-11T08:01:22-04:00weekly0.5/security-management-magazine/articles/2025/09/industry-news/2025-09-04T13:52:11-04:00weekly0.5/security-management-magazine/articles/2025/09/certification-profile/2025-09-10T09:00:20-04:00weekly0.5/security-management-magazine/articles/2025/09/asis-news/2025-09-25T09:01:08-04:00weekly0.5/security-management-magazine/articles/2025/10/flooding/2025-10-13T08:56:28-04:00weekly0.5/security-management-magazine/articles/2025/10/disruptive-behavior/2025-10-20T08:14:55-04:00weekly0.5/security-management-magazine/articles/2025/10/certification-profile/2025-10-08T09:00:20-04:00weekly0.5/security-management-magazine/articles/2025/10/legal-report/2025-10-14T12:59:25-04:00weekly0.5/security-management-magazine/articles/2025/10/curiosity-business-challenges/2025-10-29T14:41:33-04:00weekly0.5/security-management-magazine/articles/2025/10/reframe-decision-making/2025-10-31T09:16:42-04:00weekly0.5/security-management-magazine/articles/2025/10/cso-perspective-secure-horizons/2025-10-29T14:41:01-04:00weekly0.5/security-management-magazine/articles/2025/10/industry-news/2025-10-30T14:38:34-04:00weekly0.5/security-management-magazine/articles/2025/10/njit-case-study/2025-10-30T16:11:25-04:00weekly0.5/security-management-magazine/articles/2025/11/geopolitical-resilience/2025-11-01T07:54:40-04:00weekly0.5/security-management-magazine/articles/2025/11/multitenant/2025-11-10T07:52:46-05:00weekly0.5/security-management-magazine/articles/2025/11/title-ix-investigations/2025-11-17T08:03:09-05:00weekly0.5/security-management-magazine/articles/2025/11/certification-profile/2025-11-05T09:00:10-05:00weekly0.5/security-management-magazine/articles/2025/11/marketplace/2025-11-06T11:22:24-05:00weekly0.5/security-management-magazine/articles/2025/11/book-review-firefighting-paradox/2025-11-18T11:46:57-05:00weekly0.5/security-management-magazine/articles/2025/11/legal-report/2025-11-20T08:18:05-05:00weekly0.5/security-management-magazine/articles/2025/11/asis-news/2025-11-24T08:32:58-05:00weekly0.5/security-management-magazine/articles/2025/11/industry-news/2025-11-26T11:31:08-05:00weekly0.5/security-management-magazine/articles/2025/12/employee-retention/2025-12-15T08:04:28-05:00weekly0.5/security-management-magazine/articles/2025/12/research-executive-protection/2025-12-08T08:08:55-05:00weekly0.5/security-management-magazine/articles/2025/12/certification-profile/2025-12-04T08:28:24-05:00weekly0.5/security-management-magazine/articles/2025/12/marketplace/2025-12-10T09:18:15-05:00weekly0.5/security-management-magazine/articles/2025/12/legal-report/2025-12-11T11:49:24-05:00weekly0.5/security-management-magazine/articles/2025/12/asis-news/2025-12-18T15:37:06-05:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/contact-us/2024-08-29T13:05:55-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/demographics/2024-08-29T13:06:01-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/fine-print/2024-08-29T13:06:07-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/article-development/2024-08-29T13:06:17-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/podcasts/2024-08-29T13:06:33-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/newsletters/2024-08-29T13:06:56-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/events/2024-08-29T13:07:39-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/security-technology/2024-08-29T13:07:47-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/awards/2024-08-29T13:08:00-04:00weekly0.5/security-management-magazine/resources/advertise-archives/advertise-2024/editorial-calendar/2024-08-29T13:08:08-04:00weekly0.5/security-management-magazine/articles/1994/11/campaign-security-hits-the-hustings/2020-06-23T19:49:38-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/asis-europe-2026/2025-09-29T07:44:04-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/asis-asia-pacific-conference-2025/2025-09-29T07:44:04-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/asis-latam-2026/2025-09-29T07:44:04-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/where-to-network-and-eat-in-new-orleans-gsx/2025-09-26T08:02:40-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/ian-bremmer-navigating-leadership-in-a-g-zero-world/2025-09-26T08:48:25-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/when-high-profile-means-danger-security-must-change-tactics/2025-09-29T07:44:04-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/the-role-security-leaders-play-in-building-operational-resilience/2025-10-01T07:29:56-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/asis-celebrates-gsx-2025/2025-09-30T08:51:56-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/how-ai-is-impacting-the-security-industry/2025-09-30T07:32:12-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/from-prevention-to-effective-response-to-recovery/2025-09-29T07:44:04-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/against-attackers-security-needs-more-than-an-ounce-of-prevention/2025-09-30T07:32:12-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/rashidi-remembering-the-need-for-human-critical-thinking-in-the-ai-age/2025-09-30T07:32:12-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/take-charge-of-your-career-at-career-hq/2025-09-26T08:02:39-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/setting-the-tone-for-success-nakasone-shares-skillsets-of-effective-security-leaders/2025-10-01T10:12:02-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/bremmer-a-power-vacuum-in-global-leadership-leaves-room-for-giant-geopolitical-shifts/2025-09-30T17:48:45-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/heres-to-security-excellence/2025-09-29T18:09:23-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/to-realize-opportunities-approach-issues-with-appreciative-inquiry/2025-09-29T17:56:57-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/sol-rashidi-on-what-it-takes-to-thrive-in-todays-workplace-with-ai/2025-09-30T17:36:45-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/interactive-workshop-focuses-on-crime-prevention-and-cpted-fundamentals/2025-09-30T17:54:02-04:00weekly0.5/security-management-magazine/articles/2025/gsx-daily/3-emerging-trends-for-socs/2025-09-30T18:20:34-04:00weekly0.5/security-management-magazine/articles/2021/11/transit-system-pairs-mental-health-and-security-professionals/2021-11-01T07:01:56-04:00weekly0.5/security-management-magazine/articles/2021/11/novemberdecember-2021-marketplace/2021-11-01T07:01:56-04:00weekly0.5/security-management-magazine/articles/2021/11/asis-news-novemberdecember-2021/2021-11-01T07:02:02-04:00weekly0.5/security-management-magazine/articles/2021/11/risk-adrift/2021-11-01T07:01:57-04:00weekly0.5/security-management-magazine/articles/2021/11/developing-careers-in-developing-nations/2021-11-01T07:02:00-04:00weekly0.5/security-management-magazine/articles/2021/11/editors-note-how-to-curate-connection/2021-11-01T07:02:03-04:00weekly0.5/security-management-magazine/articles/2021/11/certification-profile-pushkar-tripathi-cpp-pci-psp/2022-04-22T13:35:08-04:00weekly0.5/security-management-magazine/articles/2021/11/celebrity-protection-in-the-spotlight/2023-12-13T10:52:37-05:00weekly0.5/security-management-magazine/articles/2021/11/the-management-of-police-specialized-tactical-units-third-edition/2021-11-01T07:01:55-04:00weekly0.5/security-management-magazine/articles/2021/11/conflict-climate-and-covid-19-measuring-worldwide-hunger-hotspots/2021-11-01T07:02:01-04:00weekly0.5/security-management-magazine/articles/2021/11/organizational-culture-drove-employee-resilience-during-covid-19/2021-11-01T07:02:04-04:00weekly0.5/security-management-magazine/articles/2021/11/book-review-cybersecurity-lessons-from-covid-19/2021-11-01T07:01:57-04:00weekly0.5/security-management-magazine/articles/2021/11/book-review-business-continuity-planning-increasing-workplace-resilience-to-disasters/2021-11-01T07:02:04-04:00weekly0.5/security-management-magazine/articles/2021/11/legal-report-novemberdecember-2021/2021-11-01T07:01:55-04:00weekly0.5/security-management-magazine/articles/2021/11/semiconductor-slowdown/2022-04-07T15:18:58-04:00weekly0.5/security-management-magazine/articles/2021/11/november-2021-industry-news/2021-11-01T07:01:54-04:00weekly0.5/security-management-magazine/articles/2021/11/the-active-shooter-that-wasnt/2022-04-07T14:46:26-04:00weekly0.5/security-management-magazine/articles/2021/11/coping-with-vagrancy-in-atm-vestibules/2022-11-02T13:00:07-04:00weekly0.5/security-management-magazine/articles/2021/11/retail-thieves-follow-the-money-to-multichannel-fraud/2021-11-01T07:02:00-04:00weekly0.5/security-management-magazine/articles/2021/11/semiconductor-slowdown-The-National-Security-Threat/2021-11-01T07:01:58-04:00weekly0.5/security-management-magazine/articles/2022/03/to-succeed-cisos-shift-strategies/2022-10-26T08:37:27-04:00weekly0.5/security-management-magazine/articles/2022/03/the-dual-use-dilemma-insights-from-the-arms-fair/2022-04-26T16:52:36-04:00weekly0.5/security-management-magazine/articles/2022/03/a-digital-dimension-of-abuse/2022-03-01T08:04:37-05:00weekly0.5/security-management-magazine/articles/2022/03/Next-Generation-Enterprise-Security-Risk-Management/2022-07-07T10:02:53-04:00weekly0.5/security-management-magazine/articles/2022/03/haste-makes-waste-covid-19-fraud-capitalizes-on-lack-of-oversight-controls/2022-08-29T10:42:31-04:00weekly0.5/security-management-magazine/articles/2022/03/editors-note-minding-the-smart-meters/2022-04-06T14:59:24-04:00weekly0.5/security-management-magazine/articles/2022/03/covid-19-fraud-consumers-in-the-crosshairs/2022-03-01T08:04:38-05:00weekly0.5/security-management-magazine/articles/2022/03/book-review-intimate-partner-violence-risk-and-security-securing-womens-lives-in-a-global-world/2022-03-01T08:04:31-05:00weekly0.5/security-management-magazine/articles/2022/03/book-review-how-the-internet-really-works-an-illustrated-guide-to-protocols-privacy-censorship-and-governance/2022-03-01T08:04:32-05:00weekly0.5/security-management-magazine/articles/2022/03/hospital-surveillance-manages-videos-and-offers-insight/2022-03-01T08:04:33-05:00weekly0.5/security-management-magazine/articles/2022/03/march-2022-legal-report/2022-03-01T08:04:30-05:00weekly0.5/security-management-magazine/articles/2022/03/curbing-theft-at-the-end-of-the-last-mile/2023-01-02T08:54:59-05:00weekly0.5/security-management-magazine/articles/2022/03/asis-news-a-meeting-of-minds-at-asis-europe/2022-03-01T08:04:34-05:00weekly0.5/security-management-magazine/articles/2022/03/certification-profile-vashita-mehra-cpp-pci-psp/2022-03-01T08:04:42-05:00weekly0.5/security-management-magazine/articles/2022/03/book-review-my-non-political-fbi/2022-03-01T08:04:42-05:00weekly0.5/security-management-magazine/articles/2022/03/marchapril-2022-marketplace/2022-03-01T08:04:33-05:00weekly0.5/security-management-magazine/articles/2022/03/infographic-law-and-order-in-the-time-of-covid-19/2022-03-01T08:04:34-05:00weekly0.5/security-management-magazine/articles/2022/03/marchapril-2022-industry-news/2022-03-01T08:04:35-05:00weekly0.5/security-management-magazine/articles/2022/03/timeline-the-next-esrm-revolution/2022-03-01T08:04:35-05:00weekly0.5/security-management-magazine/articles/2022/03/featured-product-showcase/2022-03-16T16:46:03-04:00weekly0.5/security-management-magazine/articles/2022/01/paper-trails-tracking-coupon-fraudsters/2024-01-08T09:56:58-05:00weekly0.5/security-management-magazine/articles/2022/01/battling-storage-lag-for-upgraded-surveillance/2022-01-01T11:54:40-05:00weekly0.5/security-management-magazine/articles/2022/01/tracking-the-elements-that-undermine-essential-work/2022-01-01T11:54:51-05:00weekly0.5/security-management-magazine/articles/2022/01/ransomware-continues-to-rise-as-nations-struggle-to-address-payouts/2022-01-01T11:55:02-05:00weekly0.5/security-management-magazine/articles/2022/01/crisis-intervention-a-stabilizing-force/2023-02-23T09:37:46-05:00weekly0.5/security-management-magazine/articles/2022/01/frozen-progress-building-winter-storm-continuity-in-texas/2022-05-26T14:13:09-04:00weekly0.5/security-management-magazine/articles/2022/01/asis-news-januaryfebruary-2022/2022-01-01T11:55:40-05:00weekly0.5/security-management-magazine/articles/2022/01/january-2022-marketplace/2022-01-01T11:55:51-05:00weekly0.5/security-management-magazine/articles/2022/01/book-review-anti-american-terrorism/2022-01-01T11:56:01-05:00weekly0.5/security-management-magazine/articles/2022/01/certification-profile-julio-marval-cpp-pci-psp/2022-01-01T11:56:13-05:00weekly0.5/security-management-magazine/articles/2022/01/january-2022-legal-report/2022-01-01T11:56:27-05:00weekly0.5/security-management-magazine/articles/2022/01/editors-note-damaging-debris/2024-01-12T16:21:00-05:00weekly0.5/security-management-magazine/articles/2022/01/book-review-strategic-leadership-in-digital-evidence/2022-01-01T11:56:49-05:00weekly0.5/security-management-magazine/articles/2022/01/developing-a-better-student-reunification-process/2022-01-01T11:57:00-05:00weekly0.5/security-management-magazine/articles/2022/01/january-2022-industry-news/2022-02-16T10:40:20-05:00weekly0.5/security-management-magazine/articles/2022/01/infographic-retention-during-the-great-resignation/2022-01-01T11:57:44-05:00weekly0.5/security-management-magazine/articles/2022/01/clarifying-crisis-communications/2022-01-01T11:57:36-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/a-society-of-belonging-an-interview-with-malcolm-smith-cpp/2025-08-27T10:52:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/the-bull-and-millionaire-mike-a-look-at-darknet-and-securities-fraud--summary/2023-02-23T11:26:35-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/leveraging-the-gsoc-during-covid-19/2022-01-31T15:37:13-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/addressing-mail-borne-threats-at-remote-and-traditional-offices/2022-02-03T15:20:23-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/three-security-disconnects-that-fall-through-the-cracks/2022-01-31T15:37:13-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-succeed-when-shifting-from-individual-contributor-to-new-manager/2023-12-14T12:54:47-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/new-cisa-directive-reiterates-need-for-cyber-modernization/2022-01-31T15:37:13-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/five-tools-to-drive-cyber-success/2022-01-31T15:37:13-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/february-2022-industry-news/2022-02-01T10:13:37-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/unraveling-the-osint-oxymoron/2023-10-02T08:54:14-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/targeting-all-lonely-hearts/2024-02-09T15:16:53-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/milestones-in-the-marathon/2022-02-17T07:47:47-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/protection-of-assets-developing-effective-crisis-communications-plans/2023-04-28T11:27:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Meet-the-Latest-Players-in-Industrial-Control-System-Cyber-Intrusions/2022-02-24T15:56:24-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/yp-skill-gaps-yp-pov/2025-08-27T10:55:29-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/yp-skill-gaps-cso-pov/2025-08-27T10:54:41-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-the-payout-problem/2022-03-07T08:17:35-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/in-the-great-resignation-engage-to-retain/2022-06-16T15:49:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/greet-pray-love/2022-03-10T07:00:10-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/building-the-foundation-of-effective-communication-trust/2022-03-11T07:00:11-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/human-trafficking-in-casinos-the-ghost-crime-operating-in-plain-sight/2023-12-14T12:56:06-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/public-access-bleeding-control-and-the-standard-of-care-a-rising-tide-lifts-all-boats/2022-03-17T08:42:12-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/leaders-conduct-risk-assessments-security-and-safety-at-festivals-and-outdoor-events/2024-01-08T09:02:34-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/lessons-from-the-war-in-ukraine-commercial-drones-used-for-combat/2022-07-05T10:43:22-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/inside-the-investigation-the-ntsbs-culture-of-transparency-and-integrity/2022-04-05T14:42:33-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/wearable-solution-helps-security-factory-buffer-against-covid-19/2022-04-13T13:50:29-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/industry-news-back-to-work-with-ai-support/2022-04-06T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-build-and-maintain-a-personal-brand/2025-08-27T11:00:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-a-people-first-hybrid-strategy-is-essential-for-retention-during-the-great-resignation/2022-11-30T12:12:56-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/6-tips-for-employers-on-conducting-background-checks/2022-04-18T07:11:19-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/managing-security-operations-in-regions-outside-the-rule-of-law/2022-04-25T10:26:19-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/war-in-ukraine-heightens-refugee-trafficking-awareness-and-prevention/2022-04-28T15:44:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-the-essential-elements-of-cpted/2024-01-17T17:27:46-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-risks-in-the-great-resignation/2022-05-16T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-security-decision-making-the-value-of-information/2022-05-23T08:32:30-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/when-personal-branding-becomes-personal-risk/2022-05-17T08:56:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/5-steps-to-personal-branding-success/2022-05-19T08:38:21-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/exploit-the-forgotten-fifth-option-of-risk-management/2022-06-16T15:51:48-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-develop-an-effective-succession-plan-in-uncertain-times/2022-07-14T15:10:09-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/6-common-blunders-in-succession-planning/2022-07-14T15:15:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-why-no-succession-plan/2022-05-26T09:24:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/7-tips-to-verify-your-social-media-connections/2022-05-31T09:13:07-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/industry-news-olymbec-upgrades-surveillance-system/2022-06-01T16:25:40-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/could-it-happen-here-assessing-cyber-defenses-after-an-outside-breach/2022-06-06T10:25:48-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/4-stages-to-plot-your-personal-branding-pathway/2022-06-03T09:20:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-build-a-best-in-class-security-culture/2023-02-01T08:32:57-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/timline-increased-violence-in-mexican-tourism-districts/2022-06-21T08:13:12-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/collateral-damage-cartel-activity-spills-over-into-tourist-resorts/2023-12-13T11:31:26-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/crime-prevention-travel-tips-in-mexico/2022-06-21T08:13:06-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/remote-viewing-to-support-lone-workers-and-facilities/2022-07-05T10:27:35-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-the-latest-cyber-target-manufacturing/2022-07-06T09:32:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-get-real-results-with-virtual-training/2022-07-12T09:22:00-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/building-your-personal-brand-through-asis-certification-and-networking/2022-07-11T10:49:03-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/influencers-and-abusers-keeping-online-celebrities-safe/2022-07-05T09:06:41-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/why-zero-trust-must-extend-into-deep-infrastructure/2022-07-15T08:29:46-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/active-threat-attacks-by-lone-actors-a-new-category-of-risk-to-anticipate-for-effective-prevention/2022-08-29T13:28:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/four-smart-cybersecurity-investments-for-cisos-to-bridge-the-talent-shortage/2022-07-26T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/hunting-for-profits-criminal-groups-turn-to-the-environment/2022-08-08T08:45:31-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/meet-gen-z-the-stressed-indebted-and-idealistic-future-of-work/2022-08-04T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-the-u.s.-army-is-changing-its-recruitment-strategy-for-gen-z/2024-01-08T10:06:01-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/ready-stress-go-why-active-shooter-training-fails/2022-08-17T07:00:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/video-how-organized-crime-and-terrorism-leverages-wildlife-trafficking/2022-08-08T08:03:05-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/behind-the-facade-negligent-security-and-premises-liability/2022-12-14T16:45:52-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/consider-special-discretion-for-lgbtq-workplace-romance-disclosures/2022-09-08T08:50:45-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/amid-remote-work-romance-and-risk-persist/2022-09-08T08:49:33-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/in-danger-managing-risks-to-cultural-properties-in-latin-america/2022-08-31T10:25:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/protests-and-paintings-how-museums-can-prepare-for-demonstrations/2022-08-25T15:20:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/establishing-a-good-first-impression-for-healthcare-security/2022-09-02T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/staffing-security-while-restocking-the-talent-pool/2024-01-08T09:30:29-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-educational-institutions-can-help-fill-the-cybersecurity-workforce-gap/2022-09-16T09:15:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/infographic-workplace-dating-data/2022-09-08T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/6-ways-environmental-social-and-governance-principles-influence-security/2022-09-06T15:16:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/video-top-targeted-items-for-retail-crime/2022-11-28T11:19:16-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-alternative-credentials-can-help-you-find-employees/2022-10-04T09:02:40-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/3-benefits-of-alternative-credentials/2022-10-04T11:18:22-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-minimize-harm-in-active-shooter-responses/2023-03-27T16:28:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/the-need-for-a-multidimensional-active-shooter-response/2022-10-06T08:35:18-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-put-multidimensional-active-shooter-response-into-practice/2023-04-05T11:13:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/treating-trauma/2022-12-14T16:44:42-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-a-virginia-city-built-an-effective-volunteer-security-reserve-program/2022-11-02T12:28:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-political-affiliation-bias-heightens-workplace-tensions/2025-08-27T10:57:36-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/healthcare-ngo-partners-for-risk-management-assistance/2022-11-18T06:00:10-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/The-Security-Professionals-Guide-to-the-Brain/2024-01-08T08:43:42-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/the-5-scariest-hacker-groups-of-2022/2023-12-13T10:49:26-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Unravelling-the-Complexities-of-Healthcare-Access-Control/2022-11-10T09:06:38-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-plan-out-your-workplace-investigation-interviews/2022-11-15T09:03:25-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Developing-Training-for-Healthcare-Teams-to-Detect-and-Support-Human-Trafficking-Victims/2022-12-12T14:32:21-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Where-Did-You-Read-That-US-Adults-Turn-to-Social-Media-for-News/2022-12-13T11:17:27-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Nine-Security-Social-Media-Accounts-that-are-Making-a-Mark/2022-12-06T06:00:11-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Serious-Fun-Using-Social-Media-to-Entertainingly-Educate/2022-12-13T11:08:12-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Modern-Day-Slavery/2022-12-12T15:04:11-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Infographic-Trauma-Informed-Approach/2022-12-12T15:18:09-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Video-6-Factors-to-Assess-Before-Leaving-Twitter/2022-12-06T06:00:11-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Phoenix-Childrens-Hospitals-Multi-Disciplined-Approach-to-Pediatric-Protection/2022-12-12T14:46:35-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/diversity-equity-and-inclusion-in-physical-security-why-it-matters2/2022-12-09T15:59:20-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/december-2022-legal-report/2022-12-09T16:43:19-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/video-modern-slavery/2022-12-12T16:28:39-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Hatejacked-How-to-Monitor-for-Co-Opted-Messaging/2022-12-19T11:39:18-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/industry-news-december-2022/2022-12-16T07:47:32-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/our-12-most-read-stories-of-2022/2022-12-19T08:32:46-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/Our-9-Favorite-Illustrations-of-2022/2022-12-21T09:43:30-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/our-11-favorite-stories-from-2022/2022-12-22T09:29:01-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/how-to-identify-forced-labor-in-your-supply-chain/2022-12-20T11:30:00-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2022/tis-the-season-for-cyber-scams-raising-awareness-of-well-timed-phishing-attacks/2023-12-20T11:42:58-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/january/2022-01-01T10:21:09-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/marchapril/2022-03-01T08:04:28-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/mayjune/2022-05-01T08:50:07-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/julyaugust/2022-07-01T07:15:26-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/septemberoctober/2022-09-01T07:44:43-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2022/novemberdecember/2022-11-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2021/03/audio-and-acumen-against-aggression/2021-03-01T08:04:28-05:00weekly0.5/security-management-magazine/articles/2021/03/editors-note-climate-tales/2021-03-01T08:04:29-05:00weekly0.5/security-management-magazine/articles/2021/03/spies-in-the-supply-chain/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/leaning-into-public-private-partnerships-to-create-cultures-of-safety/2021-03-01T08:04:28-05:00weekly0.5/security-management-magazine/articles/2021/03/new-zealand-reassesses-counterterrorism-post-christchurch/2022-06-07T09:57:41-04:00weekly0.5/security-management-magazine/articles/2021/03/march-2021-industry-news/2021-03-01T08:04:28-05:00weekly0.5/security-management-magazine/articles/2021/03/infographic-assailant-awareness-rises/2021-03-01T08:04:29-05:00weekly0.5/security-management-magazine/articles/2021/03/despite-progress-harassment-remains-a-workplace-challenge/2021-03-01T08:04:29-05:00weekly0.5/security-management-magazine/articles/2021/03/mitigating-rising-risks-for-high-rises/2024-01-16T09:39:11-05:00weekly0.5/security-management-magazine/articles/2021/03/why-you-should-be-thinking-about-climate-proofing/2023-05-26T13:23:45-04:00weekly0.5/security-management-magazine/articles/2021/03/timeline-sixty-years-of-tall-building-attacks/2021-03-01T08:04:28-05:00weekly0.5/security-management-magazine/articles/2021/03/securitys-role-in-business-continuity/2022-04-22T13:21:44-04:00weekly0.5/security-management-magazine/articles/2021/03/book-review-cultural-competency-for-emergency-and-crisis-management/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/book-review-chinese-communist-espionage-an-intelligence-primer/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/march-2021-asis-news/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/certification-profile-jim-brown-cpp/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/march-2021-marketplace/2021-04-26T16:07:58-04:00weekly0.5/security-management-magazine/articles/2021/03/legal-report-march-2021/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/03/book-review-scientific-examination-of-documents-methods-and-techniques-fourth-edition/2021-03-01T08:04:27-05:00weekly0.5/security-management-magazine/articles/2021/01/keeping-an-eye-on-travel-security-at-schiphol-airport/2021-01-01T08:33:59-05:00weekly0.5/security-management-magazine/articles/2021/01/the-rise-of-cyber-due-diligence-in-deal-making/2021-01-01T08:33:58-05:00weekly0.5/security-management-magazine/articles/2021/01/stalkerware-fuels-technologically-enabled-abuse/2021-01-01T08:34:12-05:00weekly0.5/security-management-magazine/articles/2021/01/editors-note-network-upgrades/2021-01-01T08:34:13-05:00weekly0.5/security-management-magazine/articles/2021/01/qa-with-john-petruzzi-jr.-cpp-accelerating-change/2021-01-01T08:34:08-05:00weekly0.5/security-management-magazine/articles/2021/01/january-2021-asis-news/2021-01-01T08:34:05-05:00weekly0.5/security-management-magazine/articles/2021/01/european-union-faces-pandemic-induced-crime-wave/2021-01-01T08:34:10-05:00weekly0.5/security-management-magazine/articles/2021/01/certification-profile-alejandro-pulido-cpp/2021-01-01T08:34:09-05:00weekly0.5/security-management-magazine/articles/2021/01/americans-reporting-lowest-victimization-in-decades/2021-01-01T08:34:10-05:00weekly0.5/security-management-magazine/articles/2021/01/restarting-an-economic-engine/2022-11-10T14:36:28-05:00weekly0.5/security-management-magazine/articles/2021/01/legal-report-january-2021/2021-01-01T08:34:01-05:00weekly0.5/security-management-magazine/articles/2021/01/book-review-handbook-of-loss-prevention-and-crime-prevention/2021-02-08T11:53:07-05:00weekly0.5/security-management-magazine/articles/2021/01/book-review-introduction-to-emergency-management-7th-edition/2021-01-01T08:34:06-05:00weekly0.5/security-management-magazine/articles/2021/01/book-review-the-cybersecurity-body-of-knowledge/2021-01-01T08:34:07-05:00weekly0.5/security-management-magazine/articles/2021/01/january-2021-industry-news/2021-01-01T08:34:00-05:00weekly0.5/security-management-magazine/articles/2021/01/municipalities-frown-at-facial-recognition-over-privacy-justice-concerns/2021-01-01T08:33:59-05:00weekly0.5/security-management-magazine/articles/2021/01/january-2021-marketplace/2021-01-01T08:34:03-05:00weekly0.5/security-management-magazine/articles/2021/01/securing-the-future-of-remote-work/2021-01-01T08:33:59-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/january/2021-03-17T16:03:01-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/marchapril/2021-03-17T14:04:18-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/mayjune/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/julyaugust/2021-07-01T07:00:10-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/septemberoctober/2021-09-01T08:40:05-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2021/novemberdecember/2021-11-01T07:01:53-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/tras-los-contratiempos-el-isis-aumenta-sus-ataques/2024-01-08T09:05:53-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/los-delincuentes-buscan-eslabones-debiles-en-las-cadenas-de-suministro-paralizadas/2021-03-12T13:27:05-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/asis-international-manual-de-certificacion/2021-03-22T13:52:16-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/guia-de-recertificacion/2021-03-22T14:22:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/autoevaluation-para-examenes-de-cpp-pci-psp-o-app/2021-03-22T13:51:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/best-of-gsx-2020-latam-special-edition/2021-03-25T09:00:56-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/programas-de-formacion-para-vigilantes-de-seguridad--guia-de-desarrollo/2024-01-08T10:46:45-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/seis-fuentes-de-conflictos-culturales-en-el-lugar-de-trabajo/2023-12-20T09:45:57-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/resiliencia-empresarial-como-anticiparse-a-las-manifestaciones-y-a-los-conflictos/2021-04-07T14:43:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/en-una-pandemia-la-preparacion-depende-de-la-prevencion/2021-04-16T11:27:16-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/evaluacion-de-los-riesgos-ciberneticos-de-su-sistema-de-control-de-acceso/2021-05-11T14:37:16-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/tus-primeros-90-dias-como-nuevo-lider/2021-05-21T16:47:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/el-escenario-mundial-del-fraude/2024-01-16T15:13:46-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/el-auge-de-la-ciber-diligencia-en-la-negociacion-de-acuerdos/2021-07-02T10:53:21-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/el-aumento-de-tecnologia-alimenta-los-acosos/2021-07-28T14:13:13-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/promoviendo-a-los-genios-de-tu-equipo-a-traves-de-la-diversidad-igualdad-e-inclusion/2025-08-27T11:36:42-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/preparacion-para-las-protestas-analizar-la-dinamica-de-las-multitudes-los-actores-de-la-amenaza-y-la-inteligencia/2023-01-19T09:39:02-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/espanol/como-construir-la-mejor-cultura-de-seguridad-de-su-clase/2022-06-15T11:56:13-04:00weekly0.5/security-management-magazine/articles/2021/05/no-clean-break-for-brexit/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/infographic-a-cyber-seat-at-the-table/2021-05-26T14:24:13-04:00weekly0.5/security-management-magazine/articles/2021/05/integrating-lpr-software-into-city-infrastructure/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/editors-note-proof-in-the-parchment/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/securing-the-green-rush/2023-03-17T13:56:47-04:00weekly0.5/security-management-magazine/articles/2021/05/mayjune-2021-asis-news/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/how-memes-and-internet-irony-are-hijacked-for-radicalization/2022-04-07T14:13:25-04:00weekly0.5/security-management-magazine/articles/2021/05/are-you-prepared-to-discuss-race-at-work/2025-08-27T10:53:56-04:00weekly0.5/security-management-magazine/articles/2021/05/remote-learning-heightens-ransomware-threats/2022-04-25T09:53:19-04:00weekly0.5/security-management-magazine/articles/2021/05/certification-profile-joann-ugolini-cpp-psp/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/frankenstein-fraud-how-synthetic-identities-became-the-fastest-growing-fraud-trend/2022-10-26T10:58:54-04:00weekly0.5/security-management-magazine/articles/2021/05/mayjune-2021-marketplace/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/book-review-practicing-forensic-criminology/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/book-review-we-have-root/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/book-review-u.s.-emergency-management-in-the-21st-century/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/may-2021-industry-news/2023-07-28T11:40:51-04:00weekly0.5/security-management-magazine/articles/2021/05/the-global-fraud-landscape/2024-01-08T09:23:55-05:00weekly0.5/security-management-magazine/articles/2021/05/leveraging-tactical-training-as-a-leadership-advantage/2022-04-22T10:48:04-04:00weekly0.5/security-management-magazine/articles/2021/05/may-2021-legal-report/2021-05-01T07:55:58-04:00weekly0.5/security-management-magazine/articles/2021/05/layers-of-defense-in-depth/2023-03-17T13:53:02-04:00weekly0.5/security-management-magazine/articles/2021/07/gaining-insight-into-campus-security-trends/2021-07-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2021/07/editors-note-how-assessments-frame-intelligence/2021-07-01T06:00:17-04:00weekly0.5/security-management-magazine/articles/2021/07/making-the-most-of-mentorship/2021-07-01T06:00:20-04:00weekly0.5/security-management-magazine/articles/2021/07/julyaugust-2021-marketplace/2021-07-01T06:00:21-04:00weekly0.5/security-management-magazine/articles/2021/07/rebuilding-trust-after-misinformation-maladies/2022-05-17T15:54:10-04:00weekly0.5/security-management-magazine/articles/2021/07/u.s.-employees-are-stressed-about-wellness/2021-07-01T06:00:19-04:00weekly0.5/security-management-magazine/articles/2021/07/securing-americas-national-pastime/2022-05-17T13:07:07-04:00weekly0.5/security-management-magazine/articles/2021/07/u.s.-government-plays-cyber-catch-up/2021-07-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2021/07/asis-news-julyaugust-2021/2021-07-01T06:00:13-04:00weekly0.5/security-management-magazine/articles/2021/07/book-review-crisis-negotiations-managing-critical-incidents-and-hostage-situations-in-law-enforcement-and-corrections/2021-07-01T06:00:14-04:00weekly0.5/security-management-magazine/articles/2021/07/book-review-the-professional-protection-officer/2021-07-01T06:00:20-04:00weekly0.5/security-management-magazine/articles/2021/07/book-review-critical-infrastructure-risk-assessment/2021-07-01T06:00:14-04:00weekly0.5/security-management-magazine/articles/2021/07/certification-profile-kevin-smith-cpp-pci-psp/2021-07-01T06:00:14-04:00weekly0.5/security-management-magazine/articles/2021/07/open-intelligence-and-the-evolving-threat/2023-04-10T08:36:08-04:00weekly0.5/security-management-magazine/articles/2021/07/legal-report-july-august-2021/2021-07-01T06:00:15-04:00weekly0.5/security-management-magazine/articles/2021/07/a-pandemic-pivot-organized-crime-finds-a-way-to-thrive-in-the-new-abnormal/2024-01-02T11:26:03-05:00weekly0.5/security-management-magazine/articles/2021/07/july-august-2021-industry-news/2021-07-01T06:00:16-04:00weekly0.5/security-management-magazine/articles/2021/07/hate-crimes-against-AAPI-continue-to-rise/2024-01-08T09:25:29-05:00weekly0.5/security-management-magazine/articles/2021/07/featured-product-showcase/2021-07-13T12:59:50-04:00weekly0.5/security-management-magazine/articles/2021/09/giving-bystanders-options-for-incident-intervention/2021-09-01T08:36:57-04:00weekly0.5/security-management-magazine/articles/2021/09/utility-streamlines-perimeter-monitoring-with-integration/2021-09-01T08:36:45-04:00weekly0.5/security-management-magazine/articles/2021/09/the-risk-of-underwriting-how-ransomware-is-changing-the-cyber-insurance-market/2021-09-01T08:36:50-04:00weekly0.5/security-management-magazine/articles/2021/09/covid-effects-let-trafficking-flourish/2021-09-01T08:36:56-04:00weekly0.5/security-management-magazine/articles/2021/09/insider-threat-the-shift-from-report-to-support/2022-05-05T16:47:02-04:00weekly0.5/security-management-magazine/articles/2021/09/bridging-the-legal-ethical-gap/2021-09-01T08:36:54-04:00weekly0.5/security-management-magazine/articles/2021/09/legal-report-septemberoctober-2021/2021-09-01T08:36:47-04:00weekly0.5/security-management-magazine/articles/2021/09/editors-note-risk-preparation-and-planning/2021-09-01T08:36:56-04:00weekly0.5/security-management-magazine/articles/2021/09/september-2021-marketplace/2021-09-01T08:36:48-04:00weekly0.5/security-management-magazine/articles/2021/09/september-2021-industry-news/2021-09-01T08:36:48-04:00weekly0.5/security-management-magazine/articles/2021/09/certification-profile-pamela-mischo-cpp/2021-09-01T08:36:57-04:00weekly0.5/security-management-magazine/articles/2021/09/gauging-the-jihadist-movement-20-years-after-911/2022-04-07T14:39:19-04:00weekly0.5/security-management-magazine/articles/2021/09/book-review-the-violence-free-workplace-a-blueprint-for-utilizing-professional-security-officers-to-prevent-and-respond-to-workplace-violence/2021-09-01T08:36:57-04:00weekly0.5/security-management-magazine/articles/2021/09/book-review-intermodal-maritime-security-supply-chain-risk-mitigation/2021-09-01T08:36:52-04:00weekly0.5/security-management-magazine/articles/2021/09/september-october-asis-news/2021-09-01T08:36:52-04:00weekly0.5/security-management-magazine/articles/2021/09/Infographic-The-Domino-Effect-of-Food-Shortages-and-Illicit-Trade/2021-09-01T08:36:53-04:00weekly0.5/security-management-magazine/articles/2021/09/global-management-how-security-is-changing-in-latin-america/2022-04-22T13:26:07-04:00weekly0.5/security-management-magazine/articles/2021/09/announcing-the-2021-security-industry-book-of-the-year/2021-09-01T08:36:53-04:00weekly0.5/security-management-magazine/articles/2021/09/GSX_2021_Product_Showcase/2021-08-31T11:43:28-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/add-to-your-security-library-at-gsx/2021-09-27T09:47:22-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/the-asis-foundation-giving-back-while-looking-ahead/2021-09-22T14:20:25-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/john-petruzzi-jr.-cpp-aiming-for-continuous-improvement/2021-12-11T14:59:00-05:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/malcolm-smith-cpp-planning-ahead-for-gsx/2021-09-22T15:34:05-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/a-sneak-peek-at-the-highlight-reel-best-practices-theater-preview/2021-09-22T15:29:44-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/asis-europe-returns-in-person-22-24-may-2022-in-prague/2021-09-27T11:49:43-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/planning-your-monday-at-gsx-2021/2021-09-22T14:43:40-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/asis-recognizes-securitys-best/2021-09-27T14:44:04-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/securing-your-digital-stamp/2021-09-23T14:47:47-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/daniel-pink-to-share-the-science-behind-good-timing/2021-09-23T14:47:29-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/take-me-out-coach-encouraging-balance-amid-crisis-mode/2021-09-23T14:48:00-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/orange-county-the-power-of-partnerships/2021-09-23T14:48:27-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/the-gsx-exhibit-hall-returns/2021-09-22T14:58:49-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/sm-highlights-at-gsx-training-for-large-venue-securityfrom-sports-to-politics/2021-09-27T17:07:28-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/understanding-high-conflict-amanda-ripley-shares-her-insights-at-gsx/2021-09-27T11:43:39-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/asis-recognizes-2021-certification-recipients/2021-09-27T12:08:19-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/security-goes-on-the-offensive/2021-09-28T16:24:03-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/Planning-Your-Tuesday-at-GSX-2021/2021-09-27T16:39:08-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/pink-be-intentional-with-your-timing/2021-09-27T17:05:02-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/Companies-Increasingly-Being-Held-Liable/2021-09-27T16:50:58-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/managing-the-insider-threat-with-defensive-strategies/2021-12-11T14:58:37-05:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/security-goes-on-the-offensive2/2021-12-11T14:58:02-05:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/on-the-front-lines-nadja-west-shares-how-the-u.s.-army-fought-ebola/2021-09-28T16:34:15-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/planning-your-wednesday-at-gsx-2021/2021-09-28T14:49:19-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/Face-Forward-Opportunities-and-Pitfalls/2022-11-11T11:09:22-05:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/were-trapped-in-toxicity.-heres-how-we-get-out/2021-09-28T15:03:49-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/What-Comes-Next-Preparing-for-the-Unknown/2021-09-28T15:06:26-04:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/How-the-Internet-Makes-Human-Hacking-Easier/2021-09-29T11:34:55-04:00weekly0.5/security-management-magazine/articles/2022/05/to-question-your-expertise-join-the-hive/2022-05-01T08:50:17-04:00weekly0.5/security-management-magazine/articles/2022/05/a-colorado-school-district-listens-for-lockdowns/2022-05-01T08:50:16-04:00weekly0.5/security-management-magazine/articles/2022/05/mayjune-2022-marketplace/2022-05-01T08:50:09-04:00weekly0.5/security-management-magazine/articles/2022/05/industry-news-improved-connectivity-at-u.s.-long-john-silvers-restaurants/2022-05-01T08:50:11-04:00weekly0.5/security-management-magazine/articles/2022/05/infographic-rising-temperatures-rising-risks/2022-05-01T08:50:09-04:00weekly0.5/security-management-magazine/articles/2022/05/solving-the-maritime-talent-shortage-introduces-new-challenges/2024-01-08T10:01:46-05:00weekly0.5/security-management-magazine/articles/2022/05/designing-safety-training-that-sticks/2022-05-01T08:50:19-04:00weekly0.5/security-management-magazine/articles/2022/05/how-geopolitical-risk-derails-innovation/2022-05-04T14:00:24-04:00weekly0.5/security-management-magazine/articles/2022/05/how-gender-discrimination-at-work-impacts-confidence/2024-01-08T10:00:29-05:00weekly0.5/security-management-magazine/articles/2022/05/the-aftermath-of-log4shell-fortifying-the-digital-foundation/2022-05-01T08:50:15-04:00weekly0.5/security-management-magazine/articles/2022/05/growing-a-sense-of-ownership-with-cpted/2023-12-20T11:44:54-05:00weekly0.5/security-management-magazine/articles/2022/05/leveraging-dei-to-empower-organizational-competitive-advantage/2025-08-27T11:37:43-04:00weekly0.5/security-management-magazine/articles/2022/05/legal-report-u.s.-nuclear-engineer-pleads-guilty/2022-05-01T08:50:08-04:00weekly0.5/security-management-magazine/articles/2022/05/asis-newsgsx-your-constant-in--a-changing-world/2022-05-01T08:50:11-04:00weekly0.5/security-management-magazine/articles/2022/05/asis-news-mayjune-book-review/2022-05-01T08:50:15-04:00weekly0.5/security-management-magazine/articles/2022/05/uncovering-cognitive-biases-in-security-decision-making/2024-01-12T16:22:14-05:00weekly0.5/security-management-magazine/articles/2022/05/certification-profileshaun-thivierge-cpp-pci-psp/2022-05-01T08:50:08-04:00weekly0.5/security-management-magazine/articles/2022/05/book-review-cyberspace-in-peace-and-war-second-edition/2022-05-01T08:50:18-04:00weekly0.5/security-management-magazine/articles/2022/05/book-review-the-security-risk-assessment-handbook-second-edition/2022-05-01T08:50:18-04:00weekly0.5/security-management-magazine/articles/2022/05/language-lessons-in-k-12-security/2022-05-26T13:49:51-04:00weekly0.5/security-management-magazine/articles/2022/07/book-review-code-black-50-lessons-in-crisis-management-for-effective-leadership/2022-07-05T09:36:09-04:00weekly0.5/security-management-magazine/articles/2022/07/book-review-confessions-of-a-cia-spy-the-art-of-human-hacking/2022-07-14T14:38:11-04:00weekly0.5/security-management-magazine/articles/2022/07/book-review-leadership-safe--secure/2022-07-05T09:35:47-04:00weekly0.5/security-management-magazine/articles/2022/07/certification-profile-mark-cole-cpp-pci-psp/2022-07-01T05:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/asis-news-change-ready-in-ever-changing-times/2022-07-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/infographic-as-covid-19-spread-gun-deaths-spiked/2022-07-20T11:06:30-04:00weekly0.5/security-management-magazine/articles/2022/07/industry-news-australian-bank-installs-turnstiles/2022-07-05T10:31:27-04:00weekly0.5/security-management-magazine/articles/2022/07/editors-note-risk-and-opportunity/2023-08-17T10:24:37-04:00weekly0.5/security-management-magazine/articles/2022/07/julyaugust-marketplace/2022-07-01T05:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/uptime-at-any-cost-why-cyberactors-increasingly-targeted-manufacturing-in-2021/2022-07-01T07:12:56-04:00weekly0.5/security-management-magazine/articles/2022/07/finding-open-source-access-control-for-the-future/2022-07-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/how-to-become-a-communications-chameleon/2022-07-01T07:12:56-04:00weekly0.5/security-management-magazine/articles/2022/07/mapping-out-a-successful-career-switch/2022-08-29T13:29:29-04:00weekly0.5/security-management-magazine/articles/2022/07/building-a-methodology-for-proactive-close-protection/2022-08-29T13:26:14-04:00weekly0.5/security-management-magazine/articles/2022/07/legal-report-activision-blizzards-$18-million-sexual-harassment-settlement/2022-07-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/federal-agencies-leaned-on-open-source-data-for-6-january-intelligence-products/2022-07-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/07/battle-ready-maintaining-operations-in-conflict-zones/2024-01-02T12:01:58-05:00weekly0.5/security-management-magazine/articles/2022/07/remote-work-risk-hits-the-road-with-digital-nomads2/2022-07-01T07:12:56-04:00weekly0.5/security-management-magazine/articles/2022/09/gsx-2022-product-showcase/2022-09-14T09:51:45-04:00weekly0.5/security-management-magazine/articles/2022/09/nation-states-leverage-outside-investigators-for-transnational-repression/2022-09-06T13:54:40-04:00weekly0.5/security-management-magazine/articles/2022/09/the-pernicious-problem-of-passwords/2022-09-06T13:55:31-04:00weekly0.5/security-management-magazine/articles/2022/09/book-review-concealed-carry-and-home-defense-fundamentals-2nd-edition/2022-10-19T10:53:59-04:00weekly0.5/security-management-magazine/articles/2022/09/book-review-the-cisos-next-frontier-ai-post-quantum-cryptography-and-advanced-security-paradigms/2022-08-23T15:00:19-04:00weekly0.5/security-management-magazine/articles/2022/09/asis-news-honoring-member-achievements/2022-09-01T07:00:10-04:00weekly0.5/security-management-magazine/articles/2022/09/septemberoctober-2022-marketplace/2022-09-01T03:00:10-04:00weekly0.5/security-management-magazine/articles/2022/09/keep-ahead-of-crises-by-planning-for-complex-scenarios/2024-01-12T16:23:41-05:00weekly0.5/security-management-magazine/articles/2022/09/solutions-for-hangry-shoplifting/2022-09-06T13:56:56-04:00weekly0.5/security-management-magazine/articles/2022/09/risk-revisited-societal-changes-and-their-impact-on-personnel-risk/2024-01-08T10:41:28-05:00weekly0.5/security-management-magazine/articles/2022/09/how-to-keep-high-performance-security-teams-motivated/2022-09-06T13:58:32-04:00weekly0.5/security-management-magazine/articles/2022/09/certification-profile-scott-ashworth-cpp/2022-09-01T04:00:10-04:00weekly0.5/security-management-magazine/articles/2022/09/training-employees-to-be-better-bystanders/2022-09-01T08:58:21-04:00weekly0.5/security-management-magazine/articles/2022/09/editors-note-why-vigilance-matters/2022-09-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/09/industry-news-university-of-arizona-leverages-license-plate-recognition/2022-09-01T03:00:10-04:00weekly0.5/security-management-magazine/articles/2022/09/bringing-back-the-arts-without-the-friction/2022-09-06T13:59:43-04:00weekly0.5/security-management-magazine/articles/2022/09/legal-report-rideshare-companies-fined-in-u.s.-and-australia/2022-09-06T14:00:00-04:00weekly0.5/security-management-magazine/articles/2022/09/how-to-improve-your-situational-awareness/2023-12-20T11:28:55-05:00weekly0.5/security-management-magazine/articles/2022/09/infographic-finding-intersection-of-engaged-and-thriving/2022-09-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/orange-county-convention-center-security-division-SOARs-above-expectations/2022-09-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/reframing-your-perspective-asteroid-technologies-ceo-to-speak-at-gsx-2022/2024-01-12T11:35:03-05:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/the-2022-asis-book-of-the-year-makes-emergency-management-personal/2022-08-23T14:38:07-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/asis-bookstore-add-to-cart-at-gsx-2022/2022-09-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/ask-an-asis-champion-insights-from-jeroen-van-der-vaart/2022-09-02T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/ask-an-asis-champion-insights-from-rachel-briggs/2022-09-07T10:41:45-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/money-and-morals-tallying-the-true-cost-of-discrimination/2022-09-08T11:29:59-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/gsx-2022-the-show-floor-survival-guide/2022-09-08T11:29:38-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/young-professionals-rebranding-to-nextgen-new-certificate-courses-and-more-updates-from-asis-international/2022-09-12T14:32:06-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/learn-to-work-the-room-with-asis-champion-mike-hurst-cpp/2022-09-08T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/ask-an-asis-champion-insights-from-abraham-desantiago/2022-09-07T10:54:32-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/rotterdam-at-the-ready-for-asis-europe-2023/2022-09-12T16:35:42-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/your-monday-gsx-guide/2022-09-12T15:33:30-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/your-tuesday-gsx-guide/2022-09-12T17:51:22-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/your-wednesday-gsx-guide/2022-09-13T12:48:39-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/beyond-the-call-of-duty-aaron-salter-jr-recognized-with-security-heroism-award/2022-09-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/ask-an-asis-champion-insights-from-suzanna-alsayad/2022-09-06T08:19:04-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/asis-middle-east-2022-strengthening-regional-resilience/2022-09-12T14:37:57-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/us-ospa-award-recipients-to-be-recognized-at-gsx/2022-09-12T14:41:29-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/it-takes-a-network-transitioning-from-public-service-into-the-private-sector/2022-09-14T06:34:15-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/asis-shines-a-light-on-security-stars/2022-09-14T06:34:15-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/the-sm-editors-reading-guide-for-gsx-2022/2022-09-08T11:30:39-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/Security-Controls-Understanding-How-They-Fail-Can-Improve-Your-Security/2022-09-12T17:48:51-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/Whats-Happening-in-the-GSX-2022-Exhibit-Hall/2022-09-12T06:00:10-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/asteriod-technologies-ceo-impacts-great-and-small/2022-09-12T16:07:31-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/what-to-expect-when-youre-hit-with-a-ransomeware-attack/2022-09-12T15:55:15-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/how-to-initiate-a-digital-thansformation-to-manage-your-data/2022-10-25T16:45:33-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/validating-your-security-controls-how-and-why-it-matters/2022-09-14T06:34:15-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/large-scale-evacuations-lessons-learned-from-afghanistan-and-ukraine/2022-09-16T15:22:01-04:00weekly0.5/security-management-magazine/articles/2022/gsx-show-daily-2022/scenario-planning-going-beyond-the-tabletop/2022-09-16T09:14:56-04:00weekly0.5/security-management-magazine/articles/2023/01/Infographic-Whats-Your-Emergency/2023-01-01T07:00:11-05:00weekly0.5/security-management-magazine/articles/2023/01/qa-translating-traditional-crisis-management-practices-to-fintech/2023-01-01T07:00:11-05:00weekly0.5/security-management-magazine/articles/2023/01/how-to-test-your-crisis-preparedness-plan/2024-01-08T09:26:09-05:00weekly0.5/security-management-magazine/articles/2023/01/editors-note-to-improve-your-leadership-style-fix-your-listening-style/2023-01-01T07:00:11-05:00weekly0.5/security-management-magazine/articles/2023/01/measuring-the-hallmarks-of-crisis-leadership/2023-01-01T07:00:10-05:00weekly0.5/security-management-magazine/articles/2023/01/5-keys-to-effective-change-management/2023-12-13T13:59:49-05:00weekly0.5/security-management-magazine/articles/2023/01/cracking-the-c-suite-code-building-executive-enthusiasm-for-your-crisis-planning/2023-01-01T07:00:10-05:00weekly0.5/security-management-magazine/articles/2023/01/taking-the-lead-on-communication-before-during-and-after-a-crisis/2024-01-08T09:00:50-05:00weekly0.5/security-management-magazine/articles/2023/01/new-tech-for-an-age-old-threat/2023-01-25T16:14:38-05:00weekly0.5/security-management-magazine/articles/2023/01/13-steps-organizations-can-take-to-prepare-for-a-bomb-threat/2024-01-02T12:04:33-05:00weekly0.5/security-management-magazine/articles/2023/01/historically-black-historically-targeted-hbcus-experience-more-bomb-threats-violent-rhetoric/2023-01-25T16:14:03-05:00weekly0.5/security-management-magazine/articles/2023/01/sm-minute-changing-language-for-private-sector-crisis-management/2023-01-01T08:00:20-05:00weekly0.5/security-management-magazine/articles/2023/01/book-review-yes-s.i.r.-the-security-influencers-guide-to-success-using-strategy-intelligence-and-relationships/2023-01-05T10:01:36-05:00weekly0.5/security-management-magazine/articles/2023/01/book-review-the-psychology-of-extremism/2023-01-23T13:10:07-05:00weekly0.5/security-management-magazine/articles/2023/01/book-review-say-what-communicate-with-tact-and-impact-what-to-say-to-get-results-at-any-point-in-an-audit/2023-01-19T07:27:39-05:00weekly0.5/security-management-magazine/articles/2023/01/amid-bomb-threats-schools-seek-support-and-resources/2023-01-25T16:13:42-05:00weekly0.5/security-management-magazine/articles/2023/01/an-explosive-situation-strategies-to-prevent-youth-radicalization/2023-01-25T16:13:25-05:00weekly0.5/security-management-magazine/articles/2023/01/legal-report-u.s.-federal-court-finds-saudi-prince-bin-salman-immune-from-assassination-charge/2023-01-06T11:10:13-05:00weekly0.5/security-management-magazine/articles/2023/01/qa-tim-mccreight-cpp-on-mentorship-leadership-and-the-value-of-volunteerism/2023-01-10T07:00:10-05:00weekly0.5/security-management-magazine/articles/2023/01/setting-the-bar-for-strong-governance-in-security-management/2023-01-26T09:12:16-05:00weekly0.5/security-management-magazine/articles/2023/01/certification-profile-steven-rivera-cpp-pci-psp/2023-01-12T08:38:54-05:00weekly0.5/security-management-magazine/articles/2023/01/timeline-a-pattern-of-violence2/2023-01-25T16:13:10-05:00weekly0.5/security-management-magazine/articles/2023/01/pipelines-digital-defense-is-on-the-line/2025-01-27T15:47:59-05:00weekly0.5/security-management-magazine/articles/2023/01/energy-geopolitics-how-the-war-in-ukraine-hit-pipelines/2023-01-25T16:32:43-05:00weekly0.5/security-management-magazine/articles/2023/01/infographic-who-owns-gas-pipeline-development/2023-01-25T16:32:29-05:00weekly0.5/security-management-magazine/articles/2023/01/hot-tapping-protests-and-attacks-protecting-pipelines-from-physical-phenomena/2023-02-02T14:20:50-05:00weekly0.5/security-management-magazine/articles/2023/01/fast-facts-3-key-threat-areas-for-pipelines/2023-01-25T16:31:57-05:00weekly0.5/security-management-magazine/articles/2023/01/marketplace-gunshot-detection-sms-lockdowns-and-more/2023-01-20T07:38:54-05:00weekly0.5/security-management-magazine/articles/2023/01/where-does-dei-stand-in-the-security-industry/2024-01-12T11:08:40-05:00weekly0.5/security-management-magazine/articles/2023/01/industry-news-water-company-invests-in-gas-hazard-notification-devices-for-employees/2023-01-20T07:38:54-05:00weekly0.5/security-management-magazine/articles/2023/01/asis-news-meet-your-2023-leadership/2023-11-01T09:27:03-04:00weekly0.5/security-management-magazine/articles/2022/11/centralizing-video-surveillance-for-california-water-services/2022-11-02T16:31:00-04:00weekly0.5/security-management-magazine/articles/2022/11/convergence-physical-security-and-business-continuity-meet-their-moment/2022-11-02T16:31:13-04:00weekly0.5/security-management-magazine/articles/2022/11/industry-news-finlands-nokia-arena-leverages-new-access-control-solutions-to-safeguard-guests/2022-11-02T16:31:23-04:00weekly0.5/security-management-magazine/articles/2022/11/editors-note-smart-changes-need-strategy/2022-11-02T16:31:42-04:00weekly0.5/security-management-magazine/articles/2022/11/infographic-frameworks-for-workplace-debates-help-to-build-trust/2022-11-02T16:32:00-04:00weekly0.5/security-management-magazine/articles/2022/11/digital-influence-mercenaries-profit-and-power-through-information-warfare/2022-11-02T16:32:09-04:00weekly0.5/security-management-magazine/articles/2022/11/legal-report-instagram-faces-405-million-fine-for-mishandling-underage-users-data/2022-11-02T16:32:19-04:00weekly0.5/security-management-magazine/articles/2022/11/helping-the-herd-denver-zoo-conducts-first-full-scale-active-shooter-drill/2023-10-30T13:37:55-04:00weekly0.5/security-management-magazine/articles/2022/11/novemberdecember-2022-marketplace/2022-11-02T16:32:59-04:00weekly0.5/security-management-magazine/articles/2022/11/Security-Amid-a-Pro-Union-Wave/2022-11-02T16:29:01-04:00weekly0.5/security-management-magazine/articles/2022/11/Book-Review-Principles-of-Emergency-Management-and-Emergency-Operations-Centers-2nd-edition/2022-11-02T16:29:09-04:00weekly0.5/security-management-magazine/articles/2022/11/Translating-Your-Threat-Assessment-Approach/2024-01-08T10:25:58-05:00weekly0.5/security-management-magazine/articles/2022/11/Out-and-at-Risk-Protecting-LGBTQ-plus-and-Other-Minority-Travelers/2022-11-02T16:30:18-04:00weekly0.5/security-management-magazine/articles/2022/11/ASIS-News-2022-in-Review/2022-11-02T16:29:39-04:00weekly0.5/security-management-magazine/articles/2022/11/Book-Review-The-Safety-Trap/2022-11-02T16:30:35-04:00weekly0.5/security-management-magazine/articles/2022/11/Certification-Profile-Bill-Edwards-CPP-PCI-PSP/2022-11-02T16:30:44-04:00weekly0.5/security-management-magazine/articles/2019/10/house-of-worship-security-funding-extends-beyond-grants/2020-06-23T19:50:52-04:00weekly0.5/security-management-magazine/articles/2019/10/book-review-no-off-season/2020-06-23T19:50:53-04:00weekly0.5/security-management-magazine/articles/2019/10/intelligent-surveillance-insights-protect-museums-art-collection/2020-06-23T19:50:53-04:00weekly0.5/security-management-magazine/articles/2019/10/eu-watchdog-reports-complacency-in-combating-corruption/2020-06-23T19:50:54-04:00weekly0.5/security-management-magazine/articles/2019/10/is-pipeline-security-adequate/2023-02-14T08:50:33-05:00weekly0.5/security-management-magazine/articles/2019/10/how-to-use-scenario-analysis-to-manage-in-uncertain-times/2023-12-15T16:29:52-05:00weekly0.5/security-management-magazine/articles/2019/10/putting-multi-option-active-assailant-response-to-the-test/2020-06-23T19:50:56-04:00weekly0.5/security-management-magazine/articles/2019/10/securing-marijuana-dispensaries/2020-06-23T19:50:56-04:00weekly0.5/security-management-magazine/articles/2019/10/editors-note/2020-06-23T19:50:57-04:00weekly0.5/security-management-magazine/articles/2019/10/october-2019-asis-news/2020-06-23T19:50:57-04:00weekly0.5/security-management-magazine/articles/2019/10/legal-report-october-2019/2020-06-23T20:54:49-04:00weekly0.5/security-management-magazine/articles/2019/10/entertainment-security-managing-third-parties/2020-06-23T19:50:57-04:00weekly0.5/security-management-magazine/articles/2019/10/flashback-to-asis-in-1993/2020-06-23T19:50:58-04:00weekly0.5/security-management-magazine/articles/2019/10/certification-profile-pamela-hosein-cpp/2020-06-23T19:50:58-04:00weekly0.5/security-management-magazine/articles/2019/10/improving-accessibility-and-security-through-cpted/2024-01-08T09:53:22-05:00weekly0.5/security-management-magazine/articles/2019/10/october-2019-industry-news/2020-06-23T19:50:59-04:00weekly0.5/security-management-magazine/articles/2019/10/book-review-some-people-are-no-damn-good-on-crime-crooks-and-cops/2020-06-23T19:51:00-04:00weekly0.5/security-management-magazine/articles/2019/10/book-review-internet-of-things-for-things-and-by-things/2020-06-23T19:51:00-04:00weekly0.5/security-management-magazine/articles/2019/10/the-port-of-montreal-buys-into-a-culture-of-safety/2020-06-23T19:51:00-04:00weekly0.5/security-management-magazine/articles/2019/10/october-2019-sm-online/2020-06-23T19:51:01-04:00weekly0.5/security-management-magazine/articles/2019/10/marketplace/2020-06-23T19:51:03-04:00weekly0.5/security-management-magazine/articles/2019/10/book-review-crime-and-intelligence-analysis/2020-06-23T19:51:05-04:00weekly0.5/security-management-magazine/articles/2019/10/october-legal-report/2020-06-23T19:51:23-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2016/what-the-pulse-nightclub-attack-means-for-soft-target-security/2019-09-24T15:17:36-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/october/2019-10-07T14:32:54-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/november/2020-08-05T16:53:16-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/december/2019-10-07T14:32:54-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/september/2019-10-18T10:44:37-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/august/2019-10-18T15:11:22-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/july/2019-10-21T10:08:53-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/june/2019-10-21T10:32:43-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/may/2019-10-23T13:08:29-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/april/2019-10-24T10:23:04-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/march/2019-10-31T11:54:31-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/february/2019-11-04T13:13:19-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2017/january/2019-11-04T13:14:03-05:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/hey-chicago/2020-06-23T19:50:23-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/security-cares/2020-06-23T19:50:24-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/asis-advances/2020-06-23T19:50:25-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/enhancing-education/2020-06-23T19:50:26-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/esrm-effort/2020-06-23T19:50:27-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/general-sessions/2020-06-23T19:50:27-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/grant-funds-security-upgrades-at-chicago-school/2020-06-23T19:50:28-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/members-engage-leaders-in-town-hall/2020-06-23T19:50:43-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/Bremmer-Warns-of-Geopolitical-Recession/2020-06-23T19:50:44-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/OSullivan-Shares-Secrets-to-Her-Success/2020-06-23T19:50:45-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/The-GSX-2019-Exhibit-Hall-An-Interactive-Learning-Lab/2020-06-23T19:50:45-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/Propel-Your-Career-with-ASIS-Career-HQ/2020-06-23T19:50:46-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/GSX-Attendees-Get-Head-Start-on-Education-in-Chicago/2020-06-23T19:50:46-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/Security-Positive/2020-06-23T19:50:47-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/deaths-fall-but-the-right-wing-rises/2020-06-23T19:50:48-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/Great-Managers-Trump-All/2020-06-23T19:50:49-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/Securitys-take-on-privacy-protections/2020-06-23T19:50:49-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/education-sessions-focus-on-explosives-and-management-best-practices/2020-06-23T19:50:49-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/save-the-date-for-gsx-2020/2020-06-23T19:50:50-04:00weekly0.5/security-management-magazine/articles/2019/gsx-show-daily/urbanization-poses-security-challenges/2020-06-23T19:50:51-04:00weekly0.5/security-management-magazine/articles/2015/02/the-fundamental-principles-of-strategy/2020-06-23T19:50:28-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/lessons-learned-from-the-notre-dame-fire/2019-09-01T16:08:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/book-review-the-pinks/2020-06-23T19:50:30-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/book-review-killers-of-the-flower-moon/2023-12-20T11:30:33-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/protecting-soft-targets-without-hindering-culture/2020-06-23T19:51:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/data-privacy-information-management-and-security-adjusting-to-a-new-normal/2020-06-23T19:51:45-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/qa-john-kelly/2020-06-23T19:51:58-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/security-risk-management-of-world-youth-day/2020-06-23T19:52:19-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2019/the-rising-cost-to-insure-security/2020-06-23T19:52:22-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/happy-holidays-from-the-sm-team/2019-08-30T15:25:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/new-survey-on-video-surveillance-trends-launches/2019-08-30T15:25:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/new-survey-on-crisis-management-opens/2019-08-30T15:25:52-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/survey-to-explore-use-of-mobile-forensics-technology/2019-08-30T15:26:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/tomando-vuelo/2020-02-11T13:28:15-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/new-survey-on-active-shooter-preparation-opens/2019-08-30T15:33:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/survey-to-analyze-trends-in-executive-protection/2019-08-30T15:34:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/newsroom-shooting-highlights-challenges-of-securing-open-offices/2024-01-02T11:13:21-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/video-charleston-international-airport-modernizes-security-with-pivot3/2019-08-30T15:39:05-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/how-the-artificial-intelligence-of-things-is-transforming-video-security/2019-08-30T15:40:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/cuatro-desafios-para-la-seguridad-de-la-aviacion/2019-08-30T15:41:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/on-premise-vs-the-cloud/2019-08-30T15:50:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/bully-bosses-can-inflict-more-damage-with-negative-references/2019-08-30T15:53:42-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/the-science-of-organizing-security/2019-08-30T15:57:48-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/response-to-article-evolving-biothreats/2019-08-30T16:01:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/access-control-for-healthcare-and-nursing-facilities/2019-08-30T16:03:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/asis-physical-security-council-reacts-to-youtube-shooting/2020-06-23T19:18:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/book-review-practical-aviation-security-third-edition/2019-09-01T17:24:01-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/four-trends-that-will-shape-recruiting-in-2018/2019-09-01T17:25:09-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/starting-from-the-end-creating-a-master-security-plan/2019-08-30T16:17:14-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/estrategias-de-contencion/2019-08-30T16:24:31-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/securing-special-events/2024-01-02T12:10:55-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/florida-governor-unveils-major-school-security-plan-in-wake-of-shooting/2020-06-23T19:18:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/expert-students-impressive-behavior-in-tragic-shooting-shows-importance-of-training/2020-06-23T19:18:06-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/cybersecurity-for-remote-workers/2019-08-30T16:36:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2018/encuentra-el-incendio/2019-08-30T16:39:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/happy-holidays-from-security-management/2019-08-30T17:52:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/evacuaciones-en-embajadas/2019-08-30T17:51:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/european-salary-survey-2017/2019-08-30T17:48:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/sesion-de-preguntas-y-respuestas-robo-interno/2023-12-13T11:25:03-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/former-u.s.-national-security-advisor-pleads-guilty-to-lying-to-the-fbi/2019-08-30T11:24:23-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/how-to-minimize-cybersecurity-vulnerabilities/2019-08-30T17:39:53-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/endurece-blancos-suaves-con-psim/2019-08-30T17:37:56-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/whats-new-in-access-control/2019-08-30T17:34:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/gridex-iv-tests-the-north-american-power-grid/2019-08-30T17:32:12-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/school-lockdown-procedure-prevented-tragedy-in-rancho-tehama/2019-08-30T17:25:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/securing-service-how-security-is-helping-camden-countys-children/2019-08-30T17:21:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/officials-say-new-york-attacker-acted-in-the-name-of-isis/2019-08-30T17:18:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/houston-takes-measures-to-secure-world-series/2019-08-30T17:16:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/harden-soft-targets-with-psim/2019-09-24T15:18:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/why-companies-should-hire-people-not-resumes/2019-08-30T17:11:05-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/building-a-professional-guard-force/2019-08-30T17:06:12-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/bag-checks-at-hotels-unlikely-to-become-new-normal-expert-says/2019-08-30T16:58:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/las-vegas-shootings-what-it-means-for-security/2020-06-23T19:18:13-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2017/soft-targets-what-security-professionals-can-learn-from-the-manchester-attack/2020-06-23T19:19:54-04:00weekly0.5/security-management-magazine/articles/2001/01/intelligence-2001/2020-10-07T16:01:11-04:00weekly0.5/security-management-magazine/articles/2001/01/tips-for-tracking-the-e-mail-trail/2020-10-07T16:01:40-04:00weekly0.5/security-management-magazine/articles/2001/01/what-do-changes-in-how-security-information-is-used-portend-for-the-future-of-security-managers-/2020-10-07T16:07:34-04:00weekly0.5/security-management-magazine/articles/1999/04/viewpoint-can-a-determined-assassin-be-stopped/2020-06-23T19:49:38-04:00weekly0.5/security-management-magazine/articles/1998/01/supersize-security/2020-06-23T19:49:38-04:00weekly0.5/security-management-magazine/articles/2019/09/womens-war/2020-06-23T19:49:49-04:00weekly0.5/security-management-magazine/articles/2019/09/distracted-driving-puts-first-responders-at-risk/2020-06-23T19:49:51-04:00weekly0.5/security-management-magazine/articles/2019/09/gsx-2019-product-showcase/2020-06-23T19:49:57-04:00weekly0.5/security-management-magazine/articles/2019/09/how-to-use-the-attacker-mentality-for-good/2024-01-02T11:50:08-05:00weekly0.5/security-management-magazine/articles/2019/09/the-emotional-traps-of-soft-target-security/2020-06-23T19:49:59-04:00weekly0.5/security-management-magazine/articles/2019/09/legal-challenges-limit-security-officers-authority/2024-01-02T11:30:22-05:00weekly0.5/security-management-magazine/articles/2019/09/the-threat-comes-home/2020-06-23T19:49:59-04:00weekly0.5/security-management-magazine/articles/2019/09/editors-note-gather/2020-06-23T19:49:59-04:00weekly0.5/security-management-magazine/articles/2019/09/september-2019-asis-news/2023-12-19T10:24:07-05:00weekly0.5/security-management-magazine/articles/2019/09/book-review-cpted-and-traditional-security-countermeasures/2020-06-23T19:50:05-04:00weekly0.5/security-management-magazine/articles/2019/09/book-review-media-relations/2020-06-23T19:50:06-04:00weekly0.5/security-management-magazine/articles/2019/09/book-review-social-engineering/2020-06-23T19:50:07-04:00weekly0.5/security-management-magazine/articles/2019/09/book-review-critical-infrastructure/2020-06-23T19:50:08-04:00weekly0.5/security-management-magazine/articles/2019/09/certification-profile-mark-joseph-vinculado/2020-07-02T11:39:30-04:00weekly0.5/security-management-magazine/articles/2019/09/september-2019-industry-news/2020-06-23T19:50:09-04:00weekly0.5/security-management-magazine/articles/2019/09/eyes-on-the-sky/2020-06-23T19:50:10-04:00weekly0.5/security-management-magazine/articles/2019/09/cities-are-the-new-ransomware-target/2020-06-23T19:50:15-04:00weekly0.5/security-management-magazine/articles/2019/09/mastercard-increases-perimeter-protection/2020-06-23T19:50:16-04:00weekly0.5/security-management-magazine/articles/2019/09/three-sources-for-new-security-talent/2020-06-23T19:50:17-04:00weekly0.5/security-management-magazine/articles/2019/09/september-2019-marketplace/2020-06-23T19:50:18-04:00weekly0.5/security-management-magazine/articles/2019/09/september-2019-sm-online/2020-06-23T19:50:18-04:00weekly0.5/security-management-magazine/articles/2019/09/legal-report-september-2019/2020-06-23T19:50:18-04:00weekly0.5/security-management-magazine/articles/2019/09/the-adaptable-leader/2020-06-23T19:50:24-04:00weekly0.5/security-management-magazine/articles/2019/09/shoplifting-inc/2020-06-23T19:50:27-04:00weekly0.5/security-management-magazine/articles/2019/05/body-camera-complications/2022-06-13T11:14:10-04:00weekly0.5/security-management-magazine/articles/2019/05/infrastructure-issues/2019-08-24T16:00:54-04:00weekly0.5/security-management-magazine/articles/2019/05/book-review-why-they-do-it/2019-08-12T16:07:27-04:00weekly0.5/security-management-magazine/articles/2019/05/the-six-year-reset-for-security-in-mexico/2020-06-23T19:17:28-04:00weekly0.5/security-management-magazine/articles/2019/05/french-regulator-issues-first-major-gdpr-violation-fine/2019-08-24T10:06:59-04:00weekly0.5/security-management-magazine/articles/2019/05/starting-from-scratch/2019-08-12T16:05:02-04:00weekly0.5/security-management-magazine/articles/2019/05/public-private-partnership-addresses-supply-chain-security/2019-08-24T10:18:37-04:00weekly0.5/security-management-magazine/articles/2019/05/may-2019-asis-news/2019-08-12T16:03:15-04:00weekly0.5/security-management-magazine/articles/2019/05/certification-profile-myron-love-cpp-pci-psp/2019-08-12T16:01:56-04:00weekly0.5/security-management-magazine/articles/2019/05/may-2019-industry-news/2019-08-24T09:45:02-04:00weekly0.5/security-management-magazine/articles/2019/05/book-review-reducing-turnover-in-the-services-sector/2019-08-12T15:55:49-04:00weekly0.5/security-management-magazine/articles/2019/05/book-review-cyber-research/2020-06-23T19:17:30-04:00weekly0.5/security-management-magazine/articles/2019/05/may-2019-sm-online/2020-06-23T19:17:31-04:00weekly0.5/security-management-magazine/articles/2019/05/securing-the-sum-of-many-parts-with-endpoint-management/2020-06-23T19:17:32-04:00weekly0.5/security-management-magazine/articles/2019/05/may-2019-editors-note-definitions/2020-06-23T19:17:33-04:00weekly0.5/security-management-magazine/articles/2019/05/a-day-in-the-life-of-elizabeth-moslander-cpp/2020-06-23T19:17:34-04:00weekly0.5/security-management-magazine/articles/2019/05/may-2019-legal-report/2020-06-23T19:17:36-04:00weekly0.5/security-management-magazine/articles/2019/05/getting-to-know-jaime-p.-owens-cpp/2020-06-23T19:17:38-04:00weekly0.5/security-management-magazine/articles/2019/05/qa-security-and-the-gig-economy/2020-06-23T19:17:38-04:00weekly0.5/security-management-magazine/articles/2019/04/the-power-of-awareness/2019-08-12T15:39:54-04:00weekly0.5/security-management-magazine/articles/2019/04/partnerships-and-potential-in-chicago/2019-08-12T15:38:44-04:00weekly0.5/security-management-magazine/articles/2019/04/should-you-be-watching/2019-08-12T15:37:38-04:00weekly0.5/security-management-magazine/articles/2019/04/editors-note-fundamentals/2019-08-24T15:37:40-04:00weekly0.5/security-management-magazine/articles/2019/04/april-2019-sm-online/2019-08-12T15:35:45-04:00weekly0.5/security-management-magazine/articles/2019/04/april-2019-legal-report/2019-08-24T09:35:10-04:00weekly0.5/security-management-magazine/articles/2019/04/april-2019-flashback-september-1978/2019-08-12T15:34:01-04:00weekly0.5/security-management-magazine/articles/2019/04/how-to-bridge-the-gap/2019-08-24T10:09:02-04:00weekly0.5/security-management-magazine/articles/2019/04/book-review-beirut-rules/2020-06-23T19:17:39-04:00weekly0.5/security-management-magazine/articles/2019/04/book-review-lone-wolf-terrorism/2020-06-23T19:17:39-04:00weekly0.5/security-management-magazine/articles/2019/04/book-review-casino-security/2019-08-12T15:29:08-04:00weekly0.5/security-management-magazine/articles/2019/04/book-review-cissp-exam-guide/2019-08-12T15:28:04-04:00weekly0.5/security-management-magazine/articles/2019/04/solutions-post-parkland/2020-06-23T19:17:40-04:00weekly0.5/security-management-magazine/articles/2019/04/securitys-digital-shift/2019-08-24T16:05:26-04:00weekly0.5/security-management-magazine/articles/2019/04/accessing-federal-facilities/2019-08-12T15:25:36-04:00weekly0.5/security-management-magazine/articles/2019/04/when-the-moneys-gone/2020-06-23T19:17:41-04:00weekly0.5/security-management-magazine/articles/2019/04/april-2019-asis-news/2019-08-12T15:24:02-04:00weekly0.5/security-management-magazine/articles/2019/04/certification-profile-rose-miller-cpp/2019-08-12T15:22:53-04:00weekly0.5/security-management-magazine/articles/2019/04/guard-force-trends-multipliers-and-the-market/2019-08-12T15:22:02-04:00weekly0.5/security-management-magazine/articles/2019/04/april-2019-industry-news/2019-08-24T09:34:35-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-asis-news/2019-08-12T15:14:51-04:00weekly0.5/security-management-magazine/articles/2019/03/caring-for-personal-data/2019-08-12T15:14:02-04:00weekly0.5/security-management-magazine/articles/2019/03/on-duty-and-vulnerable/2019-08-12T15:13:14-04:00weekly0.5/security-management-magazine/articles/2019/03/safety-and-security-building-relationships-for-effective-management/2019-08-12T15:11:59-04:00weekly0.5/security-management-magazine/articles/2019/03/pushing-buttons/2020-06-23T19:17:42-04:00weekly0.5/security-management-magazine/articles/2019/03/five-steps-for-optimizing-crisis-notification/2019-08-12T15:10:08-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-legal-report/2019-08-24T10:14:29-04:00weekly0.5/security-management-magazine/articles/2019/03/barnyard-biosecurity/2019-08-24T15:49:43-04:00weekly0.5/security-management-magazine/articles/2019/03/good-with-faces/2019-08-24T15:59:11-04:00weekly0.5/security-management-magazine/articles/2019/03/book-review-security-management/2019-08-12T15:06:40-04:00weekly0.5/security-management-magazine/articles/2019/03/less-lethal-more-universal/2019-08-12T15:05:54-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-member-book-review/2019-08-12T15:04:58-04:00weekly0.5/security-management-magazine/articles/2019/03/book-review-theories-of-terrorism/2020-06-23T19:17:42-04:00weekly0.5/security-management-magazine/articles/2019/03/book-review-hacking-for-dummies/2020-06-23T19:17:43-04:00weekly0.5/security-management-magazine/articles/2019/03/a-warm-up-election/2020-06-23T19:17:43-04:00weekly0.5/security-management-magazine/articles/2019/03/a-return-on-your-educational-investment/2019-08-23T16:31:18-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-industry-news/2019-08-24T10:30:43-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-sm-online/2020-06-23T19:17:44-04:00weekly0.5/security-management-magazine/articles/2019/03/alone-together-and-angry-an-incel-revolution/2023-12-14T13:02:58-05:00weekly0.5/security-management-magazine/articles/2019/03/certification-profile-james-morris-cpp/2019-08-12T14:52:49-04:00weekly0.5/security-management-magazine/articles/2019/03/march-2019-letters-to-the-editor/2019-08-12T14:51:08-04:00weekly0.5/security-management-magazine/articles/2019/02/book-review-a-practitioners-guide-to-effective-maritime-and-port-security/2019-08-12T14:00:44-04:00weekly0.5/security-management-magazine/articles/2019/02/an-amenity-of-necessity/2019-08-24T15:47:10-04:00weekly0.5/security-management-magazine/articles/2019/02/weapon-weaknesses/2019-08-24T16:12:40-04:00weekly0.5/security-management-magazine/articles/2019/02/book-review-corporate-security/2020-06-23T19:17:45-04:00weekly0.5/security-management-magazine/articles/2019/02/top-angst-cyber-and-travel/2023-08-17T14:04:45-04:00weekly0.5/security-management-magazine/articles/2019/02/book-review-disaster-science/2019-08-12T13:56:45-04:00weekly0.5/security-management-magazine/articles/2019/02/the-cost-of-a-connection/2022-05-17T15:39:58-04:00weekly0.5/security-management-magazine/articles/2019/02/book-review-digital-investigations/2020-06-23T19:17:46-04:00weekly0.5/security-management-magazine/articles/2019/02/book-review-serial-killers-and-the-aftermath/2019-08-12T13:54:01-04:00weekly0.5/security-management-magazine/articles/2019/02/certification-profile-courtney-klein-psp/2019-08-12T13:52:34-04:00weekly0.5/security-management-magazine/articles/2019/02/february-2019-asis-news/2019-08-12T13:51:36-04:00weekly0.5/security-management-magazine/articles/2019/02/february-2019-industry-news/2019-08-24T10:28:09-04:00weekly0.5/security-management-magazine/articles/2019/02/the-hard-truth-about-soft-skills/2019-08-24T16:09:58-04:00weekly0.5/security-management-magazine/articles/2019/02/sm-online/2019-08-12T13:48:35-04:00weekly0.5/security-management-magazine/articles/2019/02/smarter-access-at-the-state/2019-08-12T13:47:39-04:00weekly0.5/security-management-magazine/articles/2019/02/editors-note-communicate/2019-08-23T16:29:29-04:00weekly0.5/security-management-magazine/articles/2019/02/the-intoxication-issue/2019-10-22T17:24:13-04:00weekly0.5/security-management-magazine/articles/2019/02/getting-to-know/2019-08-12T13:44:35-04:00weekly0.5/security-management-magazine/articles/2019/02/february-2019-legal-report/2019-08-23T16:28:06-04:00weekly0.5/security-management-magazine/articles/2019/02/out-in-the-open-the-security-challenges-of-new-office-spaces/2019-08-12T13:41:19-04:00weekly0.5/security-management-magazine/articles/2019/01/haunting-after-heroism/2022-10-19T08:42:15-04:00weekly0.5/security-management-magazine/articles/2019/01/strategic-risk/2022-08-31T10:46:34-04:00weekly0.5/security-management-magazine/articles/2019/01/the-privacy-problem/2019-08-23T16:25:36-04:00weekly0.5/security-management-magazine/articles/2019/01/book-review-one-false-click/2020-06-23T19:17:47-04:00weekly0.5/security-management-magazine/articles/2019/01/book-review-security-economics/2019-08-12T13:32:06-04:00weekly0.5/security-management-magazine/articles/2019/01/book-review-personal-security/2020-06-23T19:17:48-04:00weekly0.5/security-management-magazine/articles/2019/01/battlefield-in-the-mind/2020-06-23T19:17:48-04:00weekly0.5/security-management-magazine/articles/2019/01/a-global-safety-plan-protects-corporate-travelers/2019-08-12T13:29:14-04:00weekly0.5/security-management-magazine/articles/2019/01/january-2019-industry-news/2019-08-23T16:24:00-04:00weekly0.5/security-management-magazine/articles/2019/01/wellspring-of-safety/2022-09-22T11:03:20-04:00weekly0.5/security-management-magazine/articles/2019/01/january-2019-asis-news/2019-08-12T13:26:42-04:00weekly0.5/security-management-magazine/articles/2019/01/certification-profile-nikhilesh-sharma-cpp-pci-psp/2019-08-12T13:25:48-04:00weekly0.5/security-management-magazine/articles/2019/01/book-review-electronic-access-control/2019-08-12T13:24:47-04:00weekly0.5/security-management-magazine/articles/2019/01/christina-duffey-serving-the-new-generation/2019-08-20T15:19:16-04:00weekly0.5/security-management-magazine/articles/2019/01/seek-joy/2019-08-23T16:21:57-04:00weekly0.5/security-management-magazine/articles/2019/01/resourceful-relationships/2019-08-12T13:21:38-04:00weekly0.5/security-management-magazine/articles/2019/01/guidance-on-threat-assessment-teams/2022-06-14T12:48:14-04:00weekly0.5/security-management-magazine/articles/2019/01/how-to-investigate-metoo/2019-08-12T13:19:22-04:00weekly0.5/security-management-magazine/articles/2019/01/flashback/2019-08-23T16:20:39-04:00weekly0.5/security-management-magazine/articles/2019/01/sm-online/2019-08-12T13:15:59-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/january/2019-12-20T15:03:52-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/february/2019-12-20T14:38:23-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/march/2019-12-20T14:04:44-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/april/2019-12-20T13:44:21-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/may/2019-12-20T13:17:55-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/june/2019-12-20T13:02:50-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/july/2019-11-22T09:12:50-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/august/2019-11-21T15:26:36-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/september/2019-11-21T15:01:14-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/october/2019-11-21T15:00:57-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/november/2019-11-04T13:45:54-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2016/december/2019-11-04T13:26:28-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/december/2019-12-20T16:14:17-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/november/2019-12-20T17:23:20-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/october/2020-01-14T13:56:30-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/september/2020-01-14T14:27:25-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/august/2020-01-14T15:48:04-05:00weekly0.5/security-management-magazine/monthly-issues/archive/2015/july/2020-01-14T16:28:31-05:00weekly0.5/security-management-magazine/articles/2019/11/protecting-students-by-verifying-visitors/2020-06-23T19:51:14-04:00weekly0.5/security-management-magazine/articles/2019/11/converging-event-security/2020-06-23T19:51:15-04:00weekly0.5/security-management-magazine/articles/2019/11/-russias-geopolitical-campaign-hybrid-warfare-in-the-gray-zone/2020-06-23T19:51:16-04:00weekly0.5/security-management-magazine/articles/2019/11/employee-activists-speak-out/2020-06-23T19:51:17-04:00weekly0.5/security-management-magazine/articles/2019/11/book-review-terrorism-and-counterterrorism/2020-06-23T19:51:17-04:00weekly0.5/security-management-magazine/articles/2019/11/equifax-settles-data-breach-charges/2020-06-23T19:51:18-04:00weekly0.5/security-management-magazine/articles/2019/11/rebuilding-trust-after-the-2016-election/2020-06-23T19:51:18-04:00weekly0.5/security-management-magazine/articles/2019/11/november-2019-legal-report/2020-06-23T19:51:18-04:00weekly0.5/security-management-magazine/articles/2019/11/november-2019-industry-news/2020-06-23T19:51:19-04:00weekly0.5/security-management-magazine/articles/2019/11/editors-note-forgetting/2020-06-23T19:51:19-04:00weekly0.5/security-management-magazine/articles/2019/11/a-brief-guide-to-esrm-implementation/2023-12-15T16:17:27-05:00weekly0.5/security-management-magazine/articles/2019/11/getting-to-know-darren-t-nielsen-cpp-psp-pci/2020-06-23T19:51:20-04:00weekly0.5/security-management-magazine/articles/2019/11/science-and-experience-produce-measured-security-strategies/2020-06-23T19:51:20-04:00weekly0.5/security-management-magazine/articles/2019/11/november-2019-asis-news/2020-06-23T19:51:22-04:00weekly0.5/security-management-magazine/articles/2019/11/book-review-digital-image-watermarking/2020-06-23T19:51:22-04:00weekly0.5/security-management-magazine/articles/2019/11/certification-profile-mike-hurst-cpp/2020-06-23T19:51:23-04:00weekly0.5/security-management-magazine/articles/2019/11/book-review-an-introduction-to-operational-security-risk-management/2020-06-23T19:51:24-04:00weekly0.5/security-management-magazine/articles/2019/11/book-review-women-leading-justice/2020-06-23T19:51:24-04:00weekly0.5/security-management-magazine/articles/2019/11/opioids-in-the-workplace-impairment-illicit-substances-and-insider-threat/2024-07-12T16:14:04-04:00weekly0.5/security-management-magazine/articles/2019/11/november-2019-sm-online/2020-06-23T19:51:26-04:00weekly0.5/security-management-magazine/articles/2019/11/marketplace/2020-06-23T19:51:27-04:00weekly0.5/security-management-magazine/articles/2019/11/convergence-infographic/2020-06-23T19:51:28-04:00weekly0.5/security-management-magazine/articles/2019/12/online-bullying-risks-build-up/2020-06-23T19:51:38-04:00weekly0.5/security-management-magazine/articles/2019/12/tsa-tests-new-mass-transit-security-technology/2020-06-23T19:51:39-04:00weekly0.5/security-management-magazine/articles/2019/12/december-2019-asis-news/2024-10-22T17:11:45-04:00weekly0.5/security-management-magazine/articles/2019/12/book-review-security-management-for-healthcare-proactive-event-prevention-and-effective-resolution/2020-06-23T19:51:40-04:00weekly0.5/security-management-magazine/articles/2019/12/a-washington-airport-boxes-out-security-breaches/2020-06-23T19:51:40-04:00weekly0.5/security-management-magazine/articles/2019/12/dhs-releases-a-new-framework-for-countering-changing-threats/2020-06-23T19:51:41-04:00weekly0.5/security-management-magazine/articles/2019/12/the-new-security-individual-community-and-cultural-experiences/2020-06-23T19:51:42-04:00weekly0.5/security-management-magazine/articles/2019/12/certification-profile-jose-barone-psp/2020-06-23T19:51:43-04:00weekly0.5/security-management-magazine/articles/2019/12/asis-president-christina-duffey-looks-back/2023-12-19T10:23:15-05:00weekly0.5/security-management-magazine/articles/2019/12/marketplace/2020-06-23T19:51:46-04:00weekly0.5/security-management-magazine/articles/2019/12/five-new-trends-for-workplace-violence-prevention/2020-06-23T19:51:48-04:00weekly0.5/security-management-magazine/articles/2019/12/december-2019-legal-report/2020-06-23T19:51:48-04:00weekly0.5/security-management-magazine/articles/2019/12/editors-note-the-heart-of-hospitality/2020-06-23T19:51:49-04:00weekly0.5/security-management-magazine/articles/2019/12/book-review-sittigs-handbook-of-toxic-and-hazardous-chemicals-and-carcinogens/2020-06-23T19:51:55-04:00weekly0.5/security-management-magazine/articles/2019/12/stakeholders-assess-aftereffects-of-ai/2020-06-23T19:51:55-04:00weekly0.5/security-management-magazine/articles/2019/12/book-review-surveillance-treachery-and-trust-online/2020-06-23T19:51:56-04:00weekly0.5/security-management-magazine/articles/2019/12/industry-news-december-2019/2020-06-23T19:51:57-04:00weekly0.5/security-management-magazine/articles/2019/12/researchers-probe-marijuana-testing-methods/2020-06-23T19:51:57-04:00weekly0.5/security-management-magazine/articles/2019/12/jacobs-ceo-steve-demetriou-on-the-cruciality-of-culture/2020-06-23T19:51:59-04:00weekly0.5/security-management-magazine/articles/2019/12/what-poker-taught-one-expert-about-cybersecurity/2020-06-23T19:51:59-04:00weekly0.5/security-management-magazine/articles/2019/12/bremmer-talks-geopolitics-and-strategy-at-gsx-2019/2020-06-23T19:51:59-04:00weekly0.5/security-management-magazine/articles/2019/12/global-management-how-security-is-changing-in-west-africa/2020-06-23T19:52:00-04:00weekly0.5/security-management-magazine/articles/2019/12/how-hotels-stay-welcoming-in-the-age-of-social-media-confrontations/2020-06-23T19:52:01-04:00weekly0.5/security-management-magazine/articles/2019/12/december-2019-sm-online/2020-06-23T19:52:03-04:00weekly0.5/security-management-magazine/articles/2020/01/museum-adopts-boon-edam-door-solution/2020-06-23T19:52:19-04:00weekly0.5/security-management-magazine/articles/2020/01/editors-note-human-touch/2020-06-23T19:52:20-04:00weekly0.5/security-management-magazine/articles/2020/01/flashback-to-asis-in-2000/2020-06-23T19:52:20-04:00weekly0.5/security-management-magazine/articles/2020/01/qa-godfried-hendriks-cpp-on-the-asis-global-community/2020-06-23T19:52:20-04:00weekly0.5/security-management-magazine/articles/2020/01/marketplace/2020-06-23T19:52:21-04:00weekly0.5/security-management-magazine/articles/2020/01/after-hurricanes-tested-capabilities-mass-care-organizations-regroup/2020-06-23T19:52:23-04:00weekly0.5/security-management-magazine/articles/2020/01/murders-of-journalists-go-unsolved/2020-06-23T19:52:24-04:00weekly0.5/security-management-magazine/articles/2020/01/january-2020-industry-news/2020-06-23T19:52:25-04:00weekly0.5/security-management-magazine/articles/2020/01/january-2020-legal-report/2020-06-23T19:52:26-04:00weekly0.5/security-management-magazine/articles/2020/01/the-effectiveness-of-economic-sanctions-as-a-security-tool/2022-05-05T16:09:40-04:00weekly0.5/security-management-magazine/articles/2020/01/january-2020-sm-online/2020-06-23T19:52:28-04:00weekly0.5/security-management-magazine/articles/2020/01/food-defense-and-the-insider-threat/2024-01-08T09:46:51-05:00weekly0.5/security-management-magazine/articles/2020/01/january-2020-asis-news/2020-06-23T19:52:29-04:00weekly0.5/security-management-magazine/articles/2020/01/certification-profile-nicholas-porter-cpp/2020-06-23T19:52:30-04:00weekly0.5/security-management-magazine/articles/2020/01/book-review-organised-crime-groups-involved-in-fraud/2020-06-23T19:52:30-04:00weekly0.5/security-management-magazine/articles/2020/01/book-review-countering-newest-terrorism/2020-06-23T19:52:31-04:00weekly0.5/security-management-magazine/articles/2020/01/is-security-converging/2022-04-22T10:43:45-04:00weekly0.5/security-management-magazine/articles/2020/01/seeking-sms-authentication-alternatives/2020-06-23T19:52:33-04:00weekly0.5/security-management-magazine/articles/2020/01/getting-the-most-out-of-your-contract-security-officers-through-training/2022-04-22T11:13:44-04:00weekly0.5/security-management-magazine/articles/2020/01/book-review-collaborative-cyber-threat-intelligence/2020-06-23T19:52:35-04:00weekly0.5/security-management-magazine/articles/2020/01/adapting-to-the-future-of-utility-security2/2023-10-31T14:02:16-04:00weekly0.5/security-management-magazine/articles/2020/02/global-civil-unrest-challenges-security-professionals/2020-06-23T19:52:43-04:00weekly0.5/security-management-magazine/articles/2020/02/editors-note-word-power/2020-06-23T19:52:44-04:00weekly0.5/security-management-magazine/articles/2020/02/a-record-of-violence-protecting-healthcare-staff-with-data/2023-05-05T16:11:09-04:00weekly0.5/security-management-magazine/articles/2020/02/business-continuity-ablaze/2020-06-23T19:52:48-04:00weekly0.5/security-management-magazine/articles/2020/02/violent-hate-crimes-reach-16-year-high-in-united-states/2022-04-07T15:16:50-04:00weekly0.5/security-management-magazine/articles/2020/02/european-unauthorized-immigrant-population-levels-off/2020-06-23T19:52:49-04:00weekly0.5/security-management-magazine/articles/2020/02/creating-a-more-transparent-partnership/2020-06-23T19:52:50-04:00weekly0.5/security-management-magazine/articles/2020/02/conducting-a-trade-secret-theft-initiative/2020-06-23T19:52:50-04:00weekly0.5/security-management-magazine/articles/2020/02/february-2020-industry-news/2020-06-23T19:52:51-04:00weekly0.5/security-management-magazine/articles/2020/02/february-2020-legal-report/2020-06-23T19:52:53-04:00weekly0.5/security-management-magazine/articles/2020/02/certification--profile-jamie-ridenhour-app/2020-06-23T19:52:56-04:00weekly0.5/security-management-magazine/articles/2020/02/book-review-strategic-security-forward-thinking-for-successful-executives/2020-06-23T19:52:56-04:00weekly0.5/security-management-magazine/articles/2020/02/book-review-blueprint-for-business-safety-and-security/2020-06-23T19:52:56-04:00weekly0.5/security-management-magazine/articles/2020/02/book-review-genius-weapons/2020-06-23T19:52:57-04:00weekly0.5/security-management-magazine/articles/2020/02/book-review-gray-hat-hacking/2020-06-23T19:52:57-04:00weekly0.5/security-management-magazine/articles/2020/02/february-2020-sm-online/2020-06-23T19:52:58-04:00weekly0.5/security-management-magazine/articles/2020/02/conducting-a-gdpr-compliant-investigation/2022-04-22T10:11:49-04:00weekly0.5/security-management-magazine/articles/2020/02/better-drone-detection-needed-for-threat-assessments/2020-06-23T19:52:58-04:00weekly0.5/security-management-magazine/articles/2020/02/february-2020-marketplace/2020-06-23T19:52:59-04:00weekly0.5/security-management-magazine/articles/2020/02/magnificent-manager-compelling-coach-leaderships-two-crowns/2020-06-23T19:52:59-04:00weekly0.5/security-management-magazine/articles/2020/02/getting-to-know-brian-harrell/2020-06-23T19:53:00-04:00weekly0.5/security-management-magazine/articles/2020/02/how-to-design-a-security-centric-lobby/2024-01-12T16:18:24-05:00weekly0.5/security-management-magazine/articles/2020/03/editors-note-the-world-prepares/2020-06-23T19:53:27-04:00weekly0.5/security-management-magazine/articles/2020/03/a-look-into-campus-life/2020-06-23T19:53:29-04:00weekly0.5/security-management-magazine/articles/2020/03/four-tenets-of-fire-and-life-safety/2020-06-23T19:53:29-04:00weekly0.5/security-management-magazine/articles/2020/03/enhancing-in-flight-cybersecurity/2020-06-23T19:53:29-04:00weekly0.5/security-management-magazine/articles/2020/03/in-a-pandemic-preparation-hinges-on-prevention/2023-03-17T16:26:34-04:00weekly0.5/security-management-magazine/articles/2020/03/march-2020-sm-online/2020-06-23T19:53:31-04:00weekly0.5/security-management-magazine/articles/2020/03/march-2020-asis-news/2020-06-23T19:53:31-04:00weekly0.5/security-management-magazine/articles/2020/03/march-2020-industry-news/2020-06-23T19:53:32-04:00weekly0.5/security-management-magazine/articles/2020/03/how-to-address-shift-stress-in-security-operations-centers/2020-06-23T19:53:33-04:00weekly0.5/security-management-magazine/articles/2020/03/workplace-deaths-reach-highest-point-since-2007/2020-06-23T19:53:35-04:00weekly0.5/security-management-magazine/articles/2020/03/book-review-the-chief-security-officers-handbook/2020-06-23T19:53:36-04:00weekly0.5/security-management-magazine/articles/2020/03/book-review-the-cios-guide-to-information-security-incident-management/2020-06-23T19:53:37-04:00weekly0.5/security-management-magazine/articles/2020/03/certification-profile-elizabeth-dumbaugh-cpp/2020-06-23T19:53:37-04:00weekly0.5/security-management-magazine/articles/2020/03/fatalities-from-terror-attacks-continue-to-decrease/2020-06-23T19:53:38-04:00weekly0.5/security-management-magazine/articles/2020/03/march-2020-legal-report/2020-06-23T19:53:38-04:00weekly0.5/security-management-magazine/articles/2020/03/assessing-cyber-risks-to-your-access-control-system/2020-06-23T19:53:38-04:00weekly0.5/security-management-magazine/articles/2020/03/book-review-bank-of-the-future/2020-06-23T19:53:39-04:00weekly0.5/security-management-magazine/articles/2020/03/book-review-hateland/2020-06-23T19:53:40-04:00weekly0.5/security-management-magazine/articles/2020/03/marketplace/2020-06-23T19:53:40-04:00weekly0.5/security-management-magazine/articles/2020/03/multi-crisis-management/2020-06-23T19:53:41-04:00weekly0.5/security-management-magazine/articles/2020/03/how-managers-can-sustain-diverse-and-inclusive-workplaces/2023-12-15T16:13:40-05:00weekly0.5/security-management-magazine/articles/2020/04/featured-product-showcase/2020-06-23T19:53:56-04:00weekly0.5/security-management-magazine/articles/2020/04/how-calgary-upgraded-transit-surveillance/2020-06-23T19:53:56-04:00weekly0.5/security-management-magazine/articles/2020/04/travel-security-bleisure-on-the-horizon/2020-06-23T19:53:57-04:00weekly0.5/security-management-magazine/articles/2020/04/adapting-to-evolving-kidnapping-trends/2024-01-08T10:40:04-05:00weekly0.5/security-management-magazine/articles/2020/04/u.s.-dot-announces-grants-to-address-human-trafficking/2020-06-23T19:53:57-04:00weekly0.5/security-management-magazine/articles/2020/04/editors-note-emotion/2020-06-23T19:53:57-04:00weekly0.5/security-management-magazine/articles/2020/04/how-to-create-a-culture-to-prevent-harassment/2022-04-22T11:03:11-04:00weekly0.5/security-management-magazine/articles/2020/04/is-iran-playing-the-long-game/2020-06-23T19:53:58-04:00weekly0.5/security-management-magazine/articles/2020/04/marketplace/2020-06-23T19:53:58-04:00weekly0.5/security-management-magazine/articles/2020/04/april-2020-legal-report/2020-06-23T19:53:59-04:00weekly0.5/security-management-magazine/articles/2020/04/april-2020-industry-news/2020-06-23T19:53:59-04:00weekly0.5/security-management-magazine/articles/2020/04/april-2020-asis-news/2024-10-22T17:19:05-04:00weekly0.5/security-management-magazine/articles/2020/04/certification--profile-david-goetz-cpp-psp/2020-06-23T19:54:00-04:00weekly0.5/security-management-magazine/articles/2020/04/book-review-strategic-security-forward-thinking-for-successful-executives/2021-02-23T16:57:25-05:00weekly0.5/security-management-magazine/articles/2020/04/book-review-retail-crime-international-evidence-and-prevention/2020-06-23T19:54:00-04:00weekly0.5/security-management-magazine/articles/2020/04/book-review-the-militarization-of-the-police-ideology-versus-reality/2020-06-23T19:54:01-04:00weekly0.5/security-management-magazine/articles/2020/04/leading-through-language-and-listening/2024-07-18T10:16:07-04:00weekly0.5/security-management-magazine/articles/2020/04/flashback-to-security-management-in-1985/2020-06-23T19:54:04-04:00weekly0.5/security-management-magazine/articles/2020/04/parsing-the-first-impressions-of-a-security-operation/2020-06-23T19:54:05-04:00weekly0.5/security-management-magazine/articles/2020/04/prioritizing-a-patch-how-the-nsa-pushed-microsoft-to-address-a-major-flaw/2020-06-23T19:54:07-04:00weekly0.5/security-management-magazine/articles/2020/04/book-review-rootkits-and-bootkits-reversing-modern-malware-and-next-generation-threats/2020-06-23T19:54:07-04:00weekly0.5/security-management-magazine/articles/2020/04/april-2020-sm-online/2020-06-23T19:54:07-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/january/2021-03-17T16:06:23-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/february/2021-03-17T16:06:14-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/march/2021-03-17T16:05:58-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/april/2021-03-17T16:05:48-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/may/2021-03-17T16:05:40-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/june/2021-03-17T16:04:47-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/july/2021-03-17T16:04:13-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/august/2021-03-17T16:04:01-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/september/2021-03-17T16:03:39-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/october/2021-03-17T16:03:30-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/november/2021-03-17T16:03:22-04:00weekly0.5/security-management-magazine/monthly-issues/archive/2020/december/2021-03-17T16:03:13-04:00weekly0.5/security-management-magazine/articles/2015/01/legal-report-resources-january-2015/2020-06-23T19:52:07-04:00weekly0.5/security-management-magazine/articles/2015/01/beyond-the-active-shooter/2020-06-23T19:52:09-04:00weekly0.5/security-management-magazine/articles/2015/01/building-executive-alliances/2020-06-23T19:52:10-04:00weekly0.5/security-management-magazine/articles/2015/01/chain-reaction/2020-06-23T19:52:10-04:00weekly0.5/security-management-magazine/articles/2015/01/editors-note-celebrate/2020-06-23T19:52:11-04:00weekly0.5/security-management-magazine/articles/2015/01/here-comes-the-sun/2020-06-23T19:52:11-04:00weekly0.5/security-management-magazine/articles/2015/01/january-2015-industry-news/2020-06-23T19:52:12-04:00weekly0.5/security-management-magazine/articles/2015/01/january-2015-legal-report/2020-06-23T19:52:13-04:00weekly0.5/security-management-magazine/articles/2015/01/linking-crime-and-terrorism/2020-06-23T19:52:13-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/book-review-the-birth-of-the-fbi/2020-06-23T19:52:40-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/the-rise-of-ecommerce-fraud/2020-06-23T19:53:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/k9-teams-press-paws-on-healthcare-violence-and-crime/2024-01-08T09:41:04-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/key-elements-of-pandemic-readiness/2020-06-23T19:53:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/casino-resort-tactical-response-teams/2024-01-16T09:46:14-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/pandemic-hr-issues/2022-04-22T11:08:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/pandemic-influenza-continuity-of-operations-template-instructions-from-fema/2020-06-23T19:53:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/global-demand-puts-pressure-on-healthcare-supply-chains/2020-06-23T19:53:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/securitys-role-during-pandemic-response/2020-06-23T19:54:09-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Report-on-COVID-19-Response-from-Asia-Pacific/2020-06-23T19:54:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/coronavirus-impacting-security-services/2022-04-22T11:06:38-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/qa-maintaining-business-continuity-for-critical-infrastructure-organizations/2022-04-25T09:50:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/global-covid19-resources-by-region/2020-06-23T19:54:15-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/BCI-Study-State-of-Organizational-Business-Continuity-Plan-Implementation/2020-06-23T19:54:17-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/How-to-Add-Pandemic-Response-to-Business-Continuity-Plans/2020-06-23T19:54:18-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/In-Crisis-Communication-Start-With-Empathy/2024-01-02T11:44:07-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/remote-work-considerations-in-the-covid19-age/2020-06-23T19:54:23-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/crisis-in-the-red-zone/2020-06-23T19:54:24-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/japan-declares-state-of-emergency/2020-06-23T19:54:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/ESRM-and-the-COVID-19-Pandemic/2020-06-23T19:54:29-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/pandemic-based-risk-mitigation/2020-06-23T19:54:29-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/covid-in-west-africa/2020-06-23T19:54:39-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/qa-cso-perspective-covid19-response/2020-06-23T19:54:49-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/How-Security-Teams-are-Adapting-to-Closures/2020-06-23T19:54:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Organizations-Make-Key-Standards-Freely-Available/2020-06-23T19:54:52-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Q-A-What-Employers-Need-to-Know-About-Essential-Workers-and-PPE/2020-06-23T19:54:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Travel-Risk-Through-the-Lens-of-the-COVID-19-Pandemic/2020-06-23T19:54:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/coronavirus-and-conflict/2020-06-23T19:54:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Leadership-in-the-covid-crisis/2020-06-23T19:54:58-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Securitys-Role-when-Buildings-are-Repurposed-as-Temporary-Medical-Facilities/2020-06-23T20:53:59-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/book-review-art-of-resistance/2020-06-23T20:54:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Resetting-the-Business-After-the-COVID-19-Pandemic/2020-06-23T20:54:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/managing-perceptions-expectations-information-fatigue/2020-06-23T20:54:05-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/hiring-blitz/2020-06-23T20:54:08-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/How-to-Anticipate-Pandemic-Influenced-Risk-Developments/2020-06-23T20:54:14-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/reopening-mail-centers/2020-06-23T20:54:17-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/guide-employee-temperature-checks/2020-06-23T20:54:24-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/agility-planning-multinational-pandemic-response/2020-06-23T20:54:25-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/conducting-covid19-in-flight-incident-reviews/2020-06-23T20:54:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Adaptability-Helps-University-Deal-with-Pandemic-Uncertainties/2020-06-23T20:54:46-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/remote-worker-layoffs/2020-06-23T20:54:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Implementing-Split-Operations-to-Improve-Resilience-During-a-Disease-Outbreak/2024-01-02T11:00:15-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/ready-for-reentry/2020-06-23T20:54:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/microsoft-vsoc-covid19/2020-06-23T20:54:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/remote-terminations-special-considerations-during-covid-19/2020-07-09T11:42:18-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/hiring-assessments-could-get-you-in-trouble/2020-07-21T17:01:44-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/covid19-rise-in-domestic-violence/2020-07-27T13:53:38-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/covid-mexico-manufacturing-sector/2020-07-27T14:25:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/organizations-face-supercharged-activism/2020-08-06T16:24:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/four-principles-leadership-new-normal/2020-08-19T09:07:42-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/three-steps-to-avoid-security-theater/2020-09-03T11:31:01-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/book-review-hunting-whitey/2020-09-15T13:00:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/monitoring-remote-workers/2020-09-18T08:52:02-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/how-to-avoid-eight-diversity-recruiting-mistakes/2020-10-20T13:33:23-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/rethinking-soc-functionality-and-cost/2020-11-13T10:10:12-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/leading-with-empathy-fostering-engaged-workforces/2020-11-12T08:22:27-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/protecting-shops-from-looting/2020-11-24T15:29:22-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/Emerging-from-the-Ashes/2020-11-30T13:27:32-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/managing-stress-leading-and-serving-through-crises/2020-12-09T08:25:28-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/surging-gun-sales-could-soon-become-a-workplace-concern/2020-12-10T14:51:44-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/softening-the-impact-hard-insurance-market/2020-12-14T11:22:52-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/covid-spurs-interest-in-smoother-security-lines/2020-12-15T14:30:56-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/travel-safety-elearning/2020-12-18T09:14:36-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/biggest-threats-business-productivity-2021/2022-05-05T16:51:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2020/The-Vaccine-Is-Here-Are-You-Ready/2021-01-04T14:28:54-05:00weekly0.5/security-management-magazine/articles/2020/06/as-the-pandemic-spreads-an-infodemic-rages/2020-06-23T20:54:08-04:00weekly0.5/security-management-magazine/articles/2020/06/editors-note-assessments/2020-06-23T20:54:09-04:00weekly0.5/security-management-magazine/articles/2020/06/contracting-for-adaptable-healthcare-support/2020-06-23T20:54:10-04:00weekly0.5/security-management-magazine/articles/2020/06/four-travel-safety-tips/2020-06-23T20:54:10-04:00weekly0.5/security-management-magazine/articles/2020/06/june-2020-industry-news/2020-06-23T20:54:11-04:00weekly0.5/security-management-magazine/articles/2020/06/six-sources-of-workplace-cultural-conflicts/2022-04-26T16:09:17-04:00weekly0.5/security-management-magazine/articles/2020/06/u.s.-drug-misuse-rates-continue-to-climb/2020-06-23T20:54:13-04:00weekly0.5/security-management-magazine/articles/2020/06/how-cyber-criminals-use-coronavirus-scams-to-target-victims/2023-03-17T16:27:00-04:00weekly0.5/security-management-magazine/articles/2020/06/marketplace/2020-06-23T20:54:16-04:00weekly0.5/security-management-magazine/articles/2020/06/qa-how-to-build-a-better-business-case/2020-06-23T20:54:16-04:00weekly0.5/security-management-magazine/articles/2020/06/june-2020-sm-online/2022-01-11T08:04:29-05:00weekly0.5/security-management-magazine/articles/2020/06/june-2020-asis-news/2024-10-04T16:37:03-04:00weekly0.5/security-management-magazine/articles/2020/06/book-review-inside-the-dark-web/2020-06-23T20:54:19-04:00weekly0.5/security-management-magazine/articles/2020/06/book-review-critical-infrastructures-resilience-policy-and-engineering-principles/2020-06-23T20:54:19-04:00weekly0.5/security-management-magazine/articles/2020/06/book-review-preventing-and-managing-violence-in-organizations/2020-06-23T20:54:20-04:00weekly0.5/security-management-magazine/articles/2020/06/security-career-paths-preparing-for-personality-assessments/2023-03-27T10:11:29-04:00weekly0.5/security-management-magazine/articles/2020/06/certification-profile-josefina-borghi-pci/2020-06-23T20:54:20-04:00weekly0.5/security-management-magazine/articles/2020/06/how-to-help-prevent-employee-burnout/2020-06-23T20:54:21-04:00weekly0.5/security-management-magazine/articles/2020/06/book-review-historical-dictionary-of-american-criminal-justice/2020-06-23T20:54:21-04:00weekly0.5/security-management-magazine/articles/2020/06/safeguarding-your-stay-hospitality-security-risk-management-in-unique-situations/2020-06-23T20:54:21-04:00weekly0.5/security-management-magazine/articles/2020/06/june-2020-legal-report/2020-08-17T16:30:25-04:00weekly0.5/security-management-magazine/articles/2020/05/getting-to-know-dennis-quiles-cpp/2020-06-23T19:54:30-04:00weekly0.5/security-management-magazine/articles/2020/05/how-an-oklahoma-school-district-is-reducing-emergency-response-times/2020-06-23T19:54:31-04:00weekly0.5/security-management-magazine/articles/2020/05/editors-note-connected/2020-06-23T19:54:34-04:00weekly0.5/security-management-magazine/articles/2020/05/may-2020-sm-online/2020-06-23T19:54:35-04:00weekly0.5/security-management-magazine/articles/2020/05/u.s.-intel-community-we-want-you/2020-06-23T19:54:36-04:00weekly0.5/security-management-magazine/articles/2020/05/facial-recognition-error-rates-vary-by-demographic/2022-04-07T15:07:42-04:00weekly0.5/security-management-magazine/articles/2020/05/may-2020-industry-news/2020-06-23T19:54:37-04:00weekly0.5/security-management-magazine/articles/2020/05/automation-poised-to-change-it-staffing-models/2020-06-23T19:54:38-04:00weekly0.5/security-management-magazine/articles/2020/05/How-AI-Could-Escalate-Global-Conflicts/2022-09-08T11:52:53-04:00weekly0.5/security-management-magazine/articles/2020/05/may-2020-asis-news/2020-06-23T19:54:38-04:00weekly0.5/security-management-magazine/articles/2020/05/may-2020-legal-report/2020-06-23T19:54:39-04:00weekly0.5/security-management-magazine/articles/2020/05/marketplace/2020-06-23T19:54:39-04:00weekly0.5/security-management-magazine/articles/2020/05/book-review-youre-it-crisis-change-and-how-to-lead-when-it-matters-most/2020-06-23T19:54:40-04:00weekly0.5/security-management-magazine/articles/2020/05/book-review-private-policing-second-edition/2020-06-23T19:54:40-04:00weekly0.5/security-management-magazine/articles/2020/05/book-review-public-figures-private-lives-an-introduction-to-protective-security-for-high-net-worth-individuals-and-family-offices/2020-06-23T19:54:40-04:00weekly0.5/security-management-magazine/articles/2020/05/certification-profile-bedros-ohanian-cpp/2020-06-23T19:54:41-04:00weekly0.5/security-management-magazine/articles/2020/05/on-the-trail-of-stolen-artwork/2020-06-23T19:54:43-04:00weekly0.5/security-management-magazine/articles/2020/05/breaking-the-silence-encouraging-domestic-abuse-reporting/2020-06-23T19:54:43-04:00weekly0.5/security-management-magazine/articles/2020/05/global-management-how-security-is-changing-in-the-middle-east/2020-06-23T19:54:44-04:00weekly0.5/security-management-magazine/articles/2020/05/how-to-create-an-insider-threat-early-warning-system-for-a-remote-workforce/2022-11-30T12:09:55-05:00weekly0.5/security-management-magazine/articles/2020/08/-a-centralized-perspective-for-modern-banking/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/editors-note-appearances/2020-08-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/08/getting-to-know-lisa-oliveri-cpp/2020-08-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/08/hasty-covid-19-responses-open-windows-for-corruption/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/europol-cracks-down-on-art-trafficking-ring/2020-08-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/08/the-problem-with-patrolling/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/august-2020-industry-news/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/qa-the-intersection-of-sustainability-and-security/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/marketplace/2020-08-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/08/august-2020-asis-news/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/certification--profile-alexander-choren-cpp-psp/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/book-review-effective-interviewing-and-interrogation-techniques-fourth-edition/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/announcing-the-2020-asis-book-of-the-year/2020-08-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/08/august-2020-legal-report/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/ook-review-the-use-of-force-in-criminal-justice/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/book-review-introduction-forensic-science/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/security-in-context-applying-contextual-intelligence-to-improve-security-practices/2023-08-14T15:36:49-04:00weekly0.5/security-management-magazine/articles/2020/08/after-setbacks-isis-ramps-up-attacks/2021-03-04T14:51:49-05:00weekly0.5/security-management-magazine/articles/2020/08/book-review-from-sheepdog-to-the-c-suite-a-practical-guide-for-the-transitioning-cop-or-vet/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/new-standards-seek-to-illuminate-power-grid-cyber-risks/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/classrooms-in-crisis-helping-students-and-school-staff-readjust/2020-08-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/08/august-2020-sm-online/2020-08-02T19:06:42-04:00weekly0.5/security-management-magazine/articles/2020/07/waterlogged-data-widespread-flooding-expected-by-2030/2020-07-01T07:45:49-04:00weekly0.5/security-management-magazine/articles/2020/07/editors-note-lost/2020-07-01T07:45:29-04:00weekly0.5/security-management-magazine/articles/2020/07/unusual-suspects-how-yale-is-using-analytics-to-monitor-campus-access/2020-07-01T07:45:14-04:00weekly0.5/security-management-magazine/articles/2020/07/venezuela-crisis-straining-regional-stability/2020-07-01T07:44:54-04:00weekly0.5/security-management-magazine/articles/2020/07/early-warning-based-multihazard-and-disaster-management-systems/2020-07-01T07:44:26-04:00weekly0.5/security-management-magazine/articles/2020/07/flashback-to-security-management-in-1992/2020-07-01T07:44:05-04:00weekly0.5/security-management-magazine/articles/2020/07/digital-forensics-basics-a-practical-guide-using-windows-os/2020-07-01T07:43:47-04:00weekly0.5/security-management-magazine/articles/2020/07/july-2020-sm-online/2020-07-01T07:43:33-04:00weekly0.5/security-management-magazine/articles/2020/07/qa-an-unusual-season/2020-07-01T07:43:19-04:00weekly0.5/security-management-magazine/articles/2020/07/Marketplace/2020-07-01T07:42:57-04:00weekly0.5/security-management-magazine/articles/2020/07/designing-better-school-lockdown-drills/2020-07-01T07:42:40-04:00weekly0.5/security-management-magazine/articles/2020/07/certification--profile-paul-case-cpp-pci-psp/2020-07-01T07:41:55-04:00weekly0.5/security-management-magazine/articles/2020/07/book-review-an-introduction-to-celebrity-protection-and-touring/2020-07-01T07:41:33-04:00weekly0.5/security-management-magazine/articles/2020/07/july-2020-asis-news/2020-07-01T07:41:12-04:00weekly0.5/security-management-magazine/articles/2020/07/book-review-watch-my-sheep/2020-07-01T07:51:43-04:00weekly0.5/security-management-magazine/articles/2020/07/july-2020-legal-report/2020-07-01T07:40:36-04:00weekly0.5/security-management-magazine/articles/2020/07/an-unfair-advantage-confronting-organized-intellectual-property-theft/2022-05-05T16:16:39-04:00weekly0.5/security-management-magazine/articles/2020/07/july-2020-industry-news/2020-07-01T07:39:43-04:00weekly0.5/security-management-magazine/articles/2020/07/flight-risks/2020-07-01T07:39:22-04:00weekly0.5/security-management-magazine/articles/2020/07/guard-training-programs-a-development-guide/2023-01-30T15:38:14-05:00weekly0.5/security-management-magazine/articles/2020/07/guard-training-programs-eight-recommendations/2020-07-01T07:31:40-04:00weekly0.5/security-management-magazine/articles/2020/07/security-on-the-witness-stand/2022-04-22T11:04:49-04:00weekly0.5/security-management-magazine/articles/2020/07/security-experts-in-the-courtroom/2020-07-01T07:31:40-04:00weekly0.5/security-management-magazine/articles/2020/11/iot-apps-streamline-parking-analytics/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/getting-to-know-ahamed-mohammed-cpp-pci-psp/2020-11-01T06:42:56-05:00weekly0.5/security-management-magazine/articles/2020/11/november-2020-industry-news/2020-11-01T06:42:54-05:00weekly0.5/security-management-magazine/articles/2020/11/connectivity-complicates-vehicle-cybersecurity/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/warning-signs-of-violence-require-multidisciplinary-assessment/2022-06-14T12:45:37-04:00weekly0.5/security-management-magazine/articles/2020/11/editors-note-context/2023-08-17T09:54:37-04:00weekly0.5/security-management-magazine/articles/2020/11/november-2020-marketplace/2020-11-01T06:42:57-05:00weekly0.5/security-management-magazine/articles/2020/11/asis-news-for-november-2020/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/certification-profile-terry-culver-cpp/2020-11-01T06:42:57-05:00weekly0.5/security-management-magazine/articles/2020/11/book-review-violence-assessment-and-intervention-third-edition/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/research-tests-face-masks-effect-on-analytics-accuracy/2020-11-01T06:42:57-05:00weekly0.5/security-management-magazine/articles/2020/11/remote-work-changes-generational-expectations-for-leaders/2020-11-01T06:42:56-05:00weekly0.5/security-management-magazine/articles/2020/11/november-2020-sm-online/2020-11-01T06:42:54-05:00weekly0.5/security-management-magazine/articles/2020/11/securing-the-lost-city-of-machu-picchu/2023-12-14T13:00:54-05:00weekly0.5/security-management-magazine/articles/2020/11/the-art-of-radicalization-resistance/2022-06-14T12:50:41-04:00weekly0.5/security-management-magazine/articles/2020/11/how-to-safeguard-children-in-houses-of-worship/2023-03-27T11:11:44-04:00weekly0.5/security-management-magazine/articles/2020/11/global-management-how-security-is-changing-in-asia/2020-11-01T06:42:56-05:00weekly0.5/security-management-magazine/articles/2020/11/november-2020-legal-report/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/rethinking-retail/2020-11-01T07:17:16-05:00weekly0.5/security-management-magazine/articles/2020/11/book-review-challenging-organized-crime-in-the-western-hemisphere/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/book-review-boko-haram-security-considerations-and-the-rise-of-an-insurgency/2020-11-01T06:42:55-05:00weekly0.5/security-management-magazine/articles/2020/11/book-review-data-breaches-crisis-and-opportunity/2020-11-01T06:42:56-05:00weekly0.5/security-management-magazine/articles/2020/09/2020-gsx-product-showcase/2020-08-20T11:45:44-04:00weekly0.5/security-management-magazine/articles/2020/09/during-remote-work-security-training-brings-teams-together/2020-09-03T14:39:05-04:00weekly0.5/security-management-magazine/articles/2020/09/sexual-harassment-discrimination-block-gender-equality/2022-04-07T15:17:36-04:00weekly0.5/security-management-magazine/articles/2020/09/how-to-better-initiate-a-lockdown/2020-09-01T13:06:51-04:00weekly0.5/security-management-magazine/articles/2020/09/transparent-security-policies-can-bolster-trust/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/force-of-the-future-frustrated/2020-09-01T07:09:55-04:00weekly0.5/security-management-magazine/articles/2020/09/mastercard-takes-a-unified-approach-to-security/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/editors-note-how-to-connect/2020-09-01T07:09:55-04:00weekly0.5/security-management-magazine/articles/2020/09/september-2020-sm-online/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/corporate-resilience-how-to-anticipate-mass-protest-and-disruption/2023-03-17T16:20:11-04:00weekly0.5/security-management-magazine/articles/2020/09/five-rules-for-crisis-leadership/2024-01-08T09:11:51-05:00weekly0.5/security-management-magazine/articles/2020/09/marketplace/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/articles/2020/09/september-2020-industry-news/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/september-2020-asis-news/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/articles/2020/09/september-2020-legal-report/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/book-review-legal-liabilities-in-safety-and-loss-prevention-a-practical-guide-third-edition/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/book-review-cybersecurity-law-standards-and-regulations-second-edition/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/certification-profile-kevin-doss-cpp-psp/2020-09-01T07:09:53-04:00weekly0.5/security-management-magazine/articles/2020/09/book-review-lead-follow-or-get-out-of-the-way/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/articles/2020/09/book-review-understanding-homeland-security-foundations-of-security-policy/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/articles/2020/09/drug-diversion-and-loss-prevention-a-changing-landscape/2022-04-07T14:44:11-04:00weekly0.5/security-management-magazine/articles/2020/09/how-to-hire-from-a-distance/2020-09-01T07:09:54-04:00weekly0.5/security-management-magazine/articles/2020/10/comprehensive-care/2020-10-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2020/10/how-to-protect-an-election/2020-10-01T06:00:10-04:00weekly0.5/security-management-magazine/articles/2020/10/flashback-to-security-management-in-1973/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/october-2020-industry-news/2020-09-23T12:31:37-04:00weekly0.5/security-management-magazine/articles/2020/10/october-2020-marketplace/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/bonded-labor-threatens-supply-chains/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/october-2020-sm-online/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/safety-on-the-line/2020-10-01T06:00:13-04:00weekly0.5/security-management-magazine/articles/2020/10/dissolution-privacy-shield-sows-doubt/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/career-moves-security-leaders-need-law-enforcement-background/2024-01-16T15:00:31-05:00weekly0.5/security-management-magazine/articles/2020/10/endangered-and-in-demand-global-wildlife-crime-spikes/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/eu-targets-money-laundering-and-terror-financing/2020-10-01T06:00:13-04:00weekly0.5/security-management-magazine/articles/2020/10/october-2020-asis-news/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/certification-profile-mclean-essiene-cpp-pci-psp/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/book-review-interminable-stories-and-steps-to-overcoming-lifes-obstacles/2020-10-01T06:00:11-04:00weekly0.5/security-management-magazine/articles/2020/10/book-review-introduction-to-security-consulting/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/book-review-principles-of-risk-analysis-2nd-edition/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/book-review-global-ciso-strategy-tactics-and-leadership/2020-10-01T11:49:05-04:00weekly0.5/security-management-magazine/articles/2020/10/october-2020-legal-report/2020-10-01T06:00:13-04:00weekly0.5/security-management-magazine/articles/2020/10/editors-note-decisions/2020-10-01T06:00:12-04:00weekly0.5/security-management-magazine/articles/2020/10/criminals-eye-stalled-supply-chains-for-weak-links/2022-04-22T13:44:19-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/urbanization-poses-security-challenges/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/save-the-date-for-gsx-2020/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Securitys-take-on-privacy-protections/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Great-Managers-Trump-All/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/deaths-fall-but-the-right-wing-rises/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Security-Positive/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-Attendees-Get-Head-Start-on-Education-in-Chicago/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/The-GSX-2019-Exhibit-Hall-An-Interactive-Learning-Lab/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/OSullivan-Shares-Secrets-to-Her-Success/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Bremmer-Warns-of-Geopolitical-Recession/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Planning-Your-Monday-At-GSX/2020-09-18T17:20:17-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/education-sessions-focus-on-explosives-and-management-best-practices/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Propel-Your-Career-with-ASIS-Career-HQ/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/members-engage-leaders-in-town-hall/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/grant-funds-security-upgrades-at-chicago-school/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/general-sessions/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/esrm-effort/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/enhancing-education/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/asis-advances/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/security-cares/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/hey-chicago/2020-09-18T11:23:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Godfried-Hendriks-CPP-Forging-Community-During-Crisis/2020-09-18T17:19:47-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Expecting-the-Unexpected-Scenario-Planning-for-Major-Events/2020-09-18T17:19:20-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Visit-the-ASIS-Store-and-Save-During-GSX/2020-09-18T17:18:33-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-Opens-with-a-Focus-on-Global-Leadership-and-Security/2020-09-18T17:17:50-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/From-Conflict-to-Peace-Former-Colombian-President-to-Address-GSX/2020-09-18T17:17:08-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Planning-Your-Tuesday-at-GSX/2020-09-21T15:50:13-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Security-Alignment-A-CEO-And-Security-Partnership/2020-09-21T16:01:13-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/COVID-19-and-Travel-Where-To-Next/2020-09-21T16:08:05-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/The-Cyber-Threat-Landscape-Becomes-More-Complex/2020-09-21T17:20:03-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-Focuses-on-Securitys-Role-in-Addressing-Future-Threats/2020-09-21T16:21:49-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/A-Familiar-Scenario-Leading-Through-Turbulent-Times/2020-09-22T15:22:57-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/A-Security-Transformation/2020-09-25T09:14:57-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Planning-Your-Wednesday-at-GSX/2020-09-22T15:19:31-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Reimagining-Resilience-at-Solvay/2020-09-25T09:14:38-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Remote-Leadership-Lessons-from-the-Battlefield/2020-09-25T09:14:14-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Meeting-Global-Security-Challenges-in-a-Post-COVID-World/2020-09-25T09:13:54-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Masterful-Manipulation-Deepfakes-and-Social-Engineering/2020-09-25T09:13:30-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/The-Threat-Landscape-Cybersecurity-and-Emerging-Tech-Change-the-Playing-Field/2020-09-23T17:31:03-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/hackers-and-the-future-of-cybersecurity/2020-09-25T09:13:09-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/McChrystal-focus-on-Empowering-Frontline-Decision-Makers/2020-09-25T09:12:40-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Planning-Your-Thursday-at-GSX/2020-09-23T18:07:06-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-Career-Coaches-Offer-Guidance-and-Support-to-Attendees/2020-09-23T17:32:36-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/ASIS-Recognizes-Volunteers-for-Contributions-to-the-Security-Profession/2020-09-24T16:11:45-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Planning-Your-Friday-at-GSX/2020-09-24T16:03:03-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Young-Professionals-Rising-A-Triple-Crown-at-GSX/2020-09-24T16:10:40-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Friday-at-GSX-Focuses-on-Achieving-Personal-Success/2020-09-24T16:04:45-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Q-A-Reprioritizing-Connection-During-COVID-19/2020-09-24T16:09:51-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Do-Your-Job-What-Zombies-Can-Teach-Us-About-Crisis-Response/2020-09-25T09:41:39-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Artwork-as-Security-Enhancement/2020-09-25T09:11:50-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-2020-A-Look-Back-at-the-Week/2020-09-25T09:11:27-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/Empowering-Employees-to-be-the-First-Line-of-Defense/2020-09-25T09:11:07-04:00weekly0.5/security-management-magazine/articles/2020/gsx-show-daily-2020/GSX-Game-Changer-Security-and-Supporting-Creativity/2020-09-28T10:32:49-04:00weekly0.5/security-management-magazine/articles/2020/12/eyes-on-the-uss-midway-museum/2020-12-01T08:11:26-05:00weekly0.5/security-management-magazine/articles/2020/12/editors-note-storytelling/2020-12-01T08:11:29-05:00weekly0.5/security-management-magazine/articles/2020/12/five-elements-of-brand-reputation-during-major-events/2022-05-17T15:50:48-04:00weekly0.5/security-management-magazine/articles/2020/12/walls-cannot-contain-mexicos-security-challenges/2020-12-01T08:11:29-05:00weekly0.5/security-management-magazine/articles/2020/12/the-realities-of-launching-a-security-startup/2022-10-26T13:32:20-04:00weekly0.5/security-management-magazine/articles/2020/12/do-organizations-rely-on-background-checks-too-much/2022-10-27T14:58:42-04:00weekly0.5/security-management-magazine/articles/2020/12/book-review-the-decency-code-the-leaders-path-to-building-integrity-and-trust/2020-12-01T08:11:30-05:00weekly0.5/security-management-magazine/articles/2020/12/december-2020-marketplace/2020-12-01T08:11:30-05:00weekly0.5/security-management-magazine/articles/2020/12/book-review-red-team-how-to-succeed-by-thinking-like-the-enemy/2020-12-01T08:11:27-05:00weekly0.5/security-management-magazine/articles/2020/12/book-review-cyber-strategy-risk-driven-security-and-resiliency/2020-12-01T08:11:29-05:00weekly0.5/security-management-magazine/articles/2020/12/security-awaits-digital-transformation/2020-12-01T08:11:30-05:00weekly0.5/security-management-magazine/articles/2020/12/road-traffic-fatality-rates-spike-in-2020/2020-12-01T08:11:30-05:00weekly0.5/security-management-magazine/articles/2020/12/resources-released-for-first-responder-health-hazard-mitigation/2020-12-01T08:11:30-05:00weekly0.5/security-management-magazine/articles/2020/12/december-2020-industry-news/2020-12-01T08:11:28-05:00weekly0.5/security-management-magazine/articles/2020/12/december-2020-legal-report/2020-12-01T08:11:26-05:00weekly0.5/security-management-magazine/articles/2020/12/december-2020-asis-news/2025-05-06T15:29:36-04:00weekly0.5/security-management-magazine/articles/2020/12/the-evolving-nature-of-travel/2022-06-16T15:54:23-04:00weekly0.5/security-management-magazine/articles/2020/12/certification-profile-jason-hamm-cpp/2020-12-01T08:11:31-05:00weekly0.5/security-management-magazine/articles/2020/12/book-review-executing-crisis-a-c-suite-crisis-leadership-survival-guide/2020-12-01T08:11:27-05:00weekly0.5/security-management-magazine/articles/2020/12/australia-makes-a-record-investment-in-cybersecurity/2020-12-01T08:11:28-05:00weekly0.5/security-management-magazine/articles/2020/12/covid-19-and-background-screening/2020-12-01T08:11:29-05:00weekly0.5/security-management-magazine/articles/2020/12/ccpa-deep-dive-how-california-is-enforcing-its-major-privacy-law/2022-04-22T10:56:37-04:00weekly0.5/security-management-magazine/articles/2020/12/december-2020-sm-online/2020-12-01T08:11:28-05:00weekly0.5/security-management-magazine/articles/2002/11/turning-over-a-new-leaf-the-formula-for-fixing-turnover/2020-11-30T16:35:34-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/leading-from-afar-remote-management-lessons-from-csos/2021-01-01T08:34:04-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-review-handbook-of-loss-prevention/2021-01-01T08:34:07-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/developing-a-layered-defense/2024-01-12T10:54:51-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/conspiracy-and-consequences-when-mass-delusions-come-to-work/2024-01-16T09:48:35-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/q-speak-the-language-of-qanon/2023-12-15T16:21:02-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/essential-takeaways-from-january-riot-at-us-capitol/2021-01-13T12:11:40-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/accelerationists-rising-the-state-of-u.s.-hate-crimes/2022-10-19T10:45:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-review-liberation-of-marguerite-harrison/2021-01-25T08:00:20-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/measuring-employee-engagement-during-a-crisis/2021-02-04T16:55:36-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/lessons-learned-from-uber/2021-02-08T08:53:01-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/training-security-guards-to-identify-sex-trafficking-victims/2021-02-04T16:56:33-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/embracing-true-diversity-in-times-of-crisis/2025-08-27T10:56:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/public-private-partnership-case-study-OSAC/2021-02-27T12:22:48-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-chief-security-strategist-in-an-age-of-uncertainty/2021-02-17T09:54:47-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/shared-successes-building-collaborative-professional-networks/2021-02-12T16:54:29-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/answering-to-abuse/2021-02-19T16:43:40-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/shifts-in-training-needed-for-security-guard-use-of-force/2022-04-22T14:22:12-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/adjusting-security-awareness-for-remote-work-hygiene/2021-02-26T08:00:20-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/controlling-stress-responses-for-better-de-escalation/2024-01-08T10:30:21-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/getting-proactive-with-protective-intelligence/2022-04-07T14:56:06-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-preparedness-puzzle/2021-03-03T13:14:41-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/fbi-art-crime-team/2021-03-15T09:02:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-review-gray-day/2021-03-11T17:00:43-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/know-before-you-hire/2021-03-19T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/four-steps-for-getting-started-with-cmmc-compliance/2021-03-17T07:00:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-case-for-access-control-for-cannabis-businesses/2021-03-23T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/protest-preparedness-analyzing-crowd-dynamics-threat-actors-and-intelligence/2023-03-17T16:19:42-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/risk-assessment-approaches-for-the-reopening-of-cultural-and-heritage-venues/2021-03-30T09:04:53-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/controlling-unclassified-information/2023-06-23T11:47:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/ancient-art-illicit-revenue/2021-04-08T06:00:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/april-2021-industry-news/2021-04-08T10:29:46-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/how-toxic-masculinity-ruins-workplace-culture/2025-08-27T11:35:31-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/time-to-pivot-applying-ESRM-after-covid19/2021-04-20T15:21:38-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/a-portrait-of-fire-prevention/2021-05-04T10:26:00-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/fostering-the-geniuses-in-your-backyard-through-dei-efforts/2025-08-27T10:57:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/a-cut-above-the-rest-using-puns-to-promote-security-awareness/2022-04-22T10:38:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/protection-of-assets-leveraging-investigative-results/2021-05-11T14:38:43-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/updating-business-continuity-basics-after-covid-19/2022-04-22T13:00:46-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/enabling-agile-decisions-in-a-rapidly-evolving-risk-environment/2021-05-20T08:53:59-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/poa-online-information-sources-for-investigations/2022-04-22T14:00:54-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/how-to-avoid-pandemic-related-litigation-risks/2021-05-24T12:08:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/june-2021-industry-news/2021-06-04T18:06:15-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-review-active-shooter-response-training/2021-06-03T16:47:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-review-extreme-violence/2021-06-07T08:40:47-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/combating-complacency-lessons-learned-from-the-1994-amia-bombing-in-argentina/2021-06-04T08:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-insider-threat-and-extremist-rhetoric/2023-04-28T11:52:30-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-growing-mental-health-crisis/2024-01-16T09:57:16-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/an-organizational-approach-to-mental-health/2021-06-28T15:45:45-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/learning-the-red-flag-indicators-of-human-trafficking-in-multitenant-spaces/2022-04-22T10:36:17-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/returning-to-work-the-esrm-way/2022-06-16T15:53:15-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/leveraging-public-data-to-mitigate-threats/2021-06-10T08:45:07-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/six-steps-for-incident-prevention-amid-growing-physical-threats/2022-04-07T15:00:26-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/june-2021-marketplace/2021-06-16T11:35:48-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/global-management-how-security-in-changing-in-western-europe/2021-06-30T12:38:18-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-changed-nature-of-civil-unrest-lessons-from-2020-in-philadelphia/2023-03-17T16:20:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/Engaging-Employees-on-Their-Mental-Health/2022-04-25T09:12:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/extremism-in-plain-sight-recognizing-and-responding-to-symbols-and-threats/2023-04-28T11:49:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/job-candidates-hunting-for-workplace-safety-flexibility-and-diversity/2025-08-27T11:36:08-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/balancing-tolerance-of-diverse-views-and-workplace-violence-prevention-when-extreme-views-lead-to-extreme-acts/2021-07-30T13:21:01-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/employee-activism-as-a-risk-management-opportunity/2021-07-30T17:07:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/dont-play-so-close-to-me/2021-08-04T09:33:25-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/reimagining-security-in-a-post-2020-world/2023-03-17T16:19:00-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/managing-risk-as-demand-for-private-security-grows/2021-08-06T07:00:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/august-2021-industry-news/2021-08-13T10:55:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-portfolio-administration/2021-08-20T08:56:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-technology-and-systems/2021-08-27T08:28:32-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-finance-and-funding/2021-09-03T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/global-management-how-security-is-changing-in-jamaica/2021-08-25T06:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/balancing-needs-and-wants-against-situational-realities-in-campus-security/2022-04-22T11:15:24-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/qa-where-to-start/2021-09-07T08:56:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/qa-gathering-data/2021-09-07T08:39:57-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/qa-using-data/2021-09-07T08:39:56-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/qa-building-cross-functional-teams/2021-09-07T08:39:55-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/challenges-in-higher-education-security-open-environments/2021-09-10T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/The-Background-Check-Dilemma-in-a-Shrinking-Labor-Pool/2021-09-02T10:37:37-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/assigning-roles-for-campus-security-awareness/2021-09-15T07:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/executive-risks-intensified-throughout-pandemic-study-finds/2021-09-08T15:10:34-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/cyber-101-for-physical-security-practitioners/2022-04-21T16:48:25-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/book-excerpt-the-science-and-art-of-security-risk-assessment/2021-09-17T08:00:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/onboarding-beyond-zoom/2022-05-26T15:37:20-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/trust-has-never-been-more-important/2022-05-17T15:59:51-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/industry-news-october-2021/2021-10-12T10:47:04-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/research-review-measuring-security-culture/2021-10-22T16:22:11-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/research-review-quality-of-work-life-for-bank-guards/2021-10-29T09:39:27-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/the-tao-of-taleb-learning-from-covid-19/2022-04-07T14:15:10-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/turning-bad-apples-good-using-soft-skills-for-threat-assessment/2022-04-22T14:15:15-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/cloud-in-the-crosshairs/2021-11-17T13:24:48-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/restructuring-school-security-planning-and-awareness/2021-11-18T16:32:41-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/best-practices-for-dealing-with-aging-power-infrastructure/2021-11-22T12:31:58-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/overcoming-five-preventive-intelligence-hurdles/2021-12-01T08:22:13-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/assessing-the-use-of-edged-weapons-in-terrorist-attacks/2022-06-14T12:44:22-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/robbed-in-a-flash-assessing-risk-for-mass-smash-and-grab-incidents/2022-04-07T15:09:50-04:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/how-retail-security-professionals-can-mitigate-brazen-burglary-risks/2021-12-14T09:55:16-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/industry-news-december-2021/2021-12-15T10:37:56-05:00weekly0.5/security-management-magazine/latest-news/online-exclusives/2021/in-case-of-crisis-build-community/2021-12-20T12:36:19-05:00weekly0.5/security-management-magazine/articles/2021/gsx-show-daily-2021/2021-09-29T07:01:15-04:00weekly0.6/security-management-magazine/resources/advertise/editorial-calendar/2025-12-04T10:21:16-05:00weekly0.6/security-management-magazine/resources/advertise/awards/2025-09-25T14:43:05-04:00weekly0.6/security-management-magazine/resources/advertise/print-publications/2025-09-25T14:31:04-04:00weekly0.6/security-management-magazine/resources/advertise/security-technology/2025-09-25T15:26:23-04:00weekly0.6/security-management-magazine/resources/advertise/events/2025-12-04T09:14:00-05:00weekly0.6/security-management-magazine/resources/advertise/websites/2025-10-22T14:00:51-04:00weekly0.6/security-management-magazine/resources/advertise/2023_GSX_Sponsorships/2025-09-25T15:38:17-04:00weekly0.6/security-management-magazine/resources/advertise/podcasts/2025-10-22T14:54:53-04:00weekly0.6/security-management-magazine/resources/advertise/custom-marketing/2025-09-25T15:30:44-04:00weekly0.6/security-management-magazine/resources/advertise/article-development/2025-09-25T08:52:34-04:00weekly0.6/security-management-magazine/resources/advertise/fine-print/2025-09-25T15:40:56-04:00weekly0.6/security-management-magazine/resources/advertise/demographics/2025-09-25T15:40:53-04:00weekly0.6/security-management-magazine/resources/advertise/contact-us/2025-09-17T12:01:18-04:00weekly0.6/security-management-magazine/resources/advertise/newsletters/2025-10-06T15:56:04-04:00weekly0.6/security-management-magazine/resources/advertise/Power-Packages/2025-10-07T16:09:00-04:00weekly0.6/security-management-magazine/resources/advertise/research/2025-12-02T11:30:52-05:00weekly0.6/security-management-magazine/articles/2020/gsx-show-daily-2020/2020-09-28T11:17:05-04:00weekly0.6/security-management-magazine/articles/2019/06/2020-06-23T19:16:58-04:00weekly0.6/security-management-magazine/articles/2019/gsx-show-daily/2020-06-23T19:50:22-04:00weekly0.6/security-management-magazine/management/2023/leading-through-crisis--change/2023-01-01T08:48:28-05:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-ralph-day-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-james-healey/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-eugene-suto-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam---donie-ocallaghan/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam---richard-cross-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-michael-bucci/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam---luis-enrique-la-rotta-bautista/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-col.-sameer-anukul-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam---mike-alexander/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-ona-ekhomu-cpp-pci/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-robert-lechow/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-ron-guymer/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-wayne-hall/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-gordon-w-kettler/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-don-w-walker-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-christian-kopacsi/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-ernest-cris-j-criscuoli-jr-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-gary-miville/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-chris-walker/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-adam-t-koch/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-jeffrey-mark-spivey/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-guennadi-guermanovitch/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-a-joseph-besendorf/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-keith-a-dunn-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-raymond-r-stommel-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-sloane-newton-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-david-nicastro-cpp/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-lael-allen/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-terry-jones/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-peter-okoloh/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-keith-oringer/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-cesar-guzman/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-michael-stack/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-tom-leo/2025-10-21T10:53:12-04:00weekly0.6/security-news/blog/in-memoriam/in-memoriam-anthony-roman/2025-10-21T10:54:31-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-11-12-2022/2024-10-04T15:10:21-04:00weekly0.6/security-news/blog/2023/security-trends-top-22-trends-in-2022/2023-03-01T16:30:33-05:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-mclean-essiene-cpp-pci-psp/2023-03-01T16:30:06-05:00weekly0.6/security-news/blog/2023/security-trends-access-control/2023-03-01T16:29:32-05:00weekly0.6/security-news/blog/2023/security-trends-four-surveillance-trends/2023-03-01T16:29:01-05:00weekly0.6/security-news/blog/2023/security-leadher-call-for-proposals/2023-03-01T16:28:14-05:00weekly0.6/security-news/blog/2023/2022-annual-report-in-spanish/2023-03-01T16:27:38-05:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-01-2023/2024-10-04T15:10:00-04:00weekly0.6/security-news/blog/2023/inclusive-conversations-black-history-month/2023-05-31T16:55:12-04:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-mirza-sheraz-altaf-cpp/2023-03-01T16:24:52-05:00weekly0.6/security-news/blog/2023/security-trends-innovations-to-complement-guarding/2023-03-01T16:23:48-05:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-02-2023/2024-10-04T15:09:40-04:00weekly0.6/security-news/blog/2023/schachnovksy-intergenerational-asis-membership-story/2023-03-08T10:48:42-05:00weekly0.6/security-news/blog/2023/leadership-lessons-the-legacy-lives-on/2023-03-15T09:40:41-04:00weekly0.6/security-news/blog/2023/upcoming-mental-health-webinar/2023-03-22T09:00:20-04:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-mark-joeseph-vinculado-cpp-pci-psp/2023-03-29T09:07:29-04:00weekly0.6/security-news/blog/2023/sacs-update-sensitive-information-protection-community-and-emerging-technology-community/2023-04-03T09:37:52-04:00weekly0.6/security-news/blog/2023/asis-awards-of-excellence-nominations-open/2023-04-25T16:34:10-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-03-2023/2024-10-04T15:09:23-04:00weekly0.6/security-news/blog/2023/international-womens-day-at-the-kenya-high-school/2023-04-12T10:32:50-04:00weekly0.6/security-news/blog/2023/five-elements-for-a-winning-crisis-management-program-value-proposition/2023-04-19T11:44:50-04:00weekly0.6/security-news/blog/2023/european-regional-board-announces-new-committees/2023-04-21T12:00:10-04:00weekly0.6/security-news/blog/2023/why-asis-abhijeet-kumar-sinha-cpp/2023-04-26T09:00:20-04:00weekly0.6/security-news/blog/2023/leadership-lessons-unlocking-your-inner-maestro/2023-05-03T09:00:21-04:00weekly0.6/security-news/blog/2023/the-power-of-tvra-kevin-sun-cpp/2023-05-10T09:00:21-04:00weekly0.6/security-news/blog/2023/steps-to-success-cso-development-pyramid-overview/2023-06-13T11:56:41-04:00weekly0.6/security-news/blog/2023/security-management-wins-awards-at-the-azbees/2023-05-25T09:44:51-04:00weekly0.6/security-news/blog/2023/why-security-leadher/2023-05-24T09:55:44-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-04-2023/2024-10-04T15:06:19-04:00weekly0.6/security-news/blog/2023/apply-for-a-nominating-committee-now/2023-06-16T10:42:34-04:00weekly0.6/security-news/blog/2023/three-pillars-of-functional-travel-risk-management-patrick-kane/2023-06-07T09:00:21-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-05-20232/2024-10-04T15:06:48-04:00weekly0.6/security-news/blog/2023/steps-to-success-leadership-and-management/2023-07-11T12:03:33-04:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-keren-amaya-santodomingo/2023-06-21T09:00:20-04:00weekly0.6/security-news/blog/2023/six-tips-for-deescalating-violence-brian-ishikawa/2023-06-28T09:00:20-04:00weekly0.6/security-news/blog/2023/the-best-parts-of-gsx/2023-07-11T12:09:03-04:00weekly0.6/security-news/blog/2023/steps-to-success-analyzing-the-business/2023-07-12T09:47:50-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-06-2023/2024-10-04T15:07:12-04:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-ashley-hatker/2023-07-19T09:13:33-04:00weekly0.6/security-news/blog/2023/analysis-of-the-use-of-armed-guarding-personnel/2023-07-26T09:00:21-04:00weekly0.6/security-news/blog/2023/mental-health-issues-and-the-security-industry-mike-hurst-cpp/2023-08-02T09:00:20-04:00weekly0.6/security-news/blog/2023/join-the-2023-fitness-challenge/2023-08-09T09:00:20-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-07-2023/2024-10-04T15:07:38-04:00weekly0.6/security-news/blog/2023/steps-to-success-risk-management/2023-08-16T09:00:20-04:00weekly0.6/security-news/blog/2023/myasis-story-sergiy-pogrebnoy-vice-chair-asis-ukraine-chapter/2023-08-18T09:00:21-04:00weekly0.6/security-news/blog/2023/featured-nextgen-qa-oleg-kachko/2023-08-23T09:00:20-04:00weekly0.6/security-news/blog/2023/2023-book-of-the-year/2023-08-25T10:43:47-04:00weekly0.6/security-news/blog/2023/2023-asis-awards-of-excellence/2023-09-05T15:57:37-04:00weekly0.6/security-news/blog/2023/unveiling-the-gender-gap-in-security/2023-09-06T09:00:20-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-08-2023/2024-10-04T15:07:59-04:00weekly0.6/security-news/blog/2023/steps-to-success-strategy/2023-10-06T10:55:20-04:00weekly0.6/security-news/blog/2023/dei-matters-the-importance-of-fostering-dynamic-and-diverse-workplace-environments/2023-09-27T09:00:20-04:00weekly0.6/security-news/blog/2023/thank-you-to-our-GSX-2023-attendees-and-exhibitors/2023-10-04T09:18:07-04:00weekly0.6/security-news/blog/2023/steps-to-success-future-proofing/2023-10-11T11:26:00-04:00weekly0.6/security-news/blog/2023/building-the-air-domain-into-your-security-prorgram/2023-10-11T09:46:57-04:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-09-2023/2024-10-04T15:08:18-04:00weekly0.6/security-news/blog/2023/asis-statement-on-israel-and-gaza/2024-08-08T10:34:40-04:00weekly0.6/security-news/blog/2023/apply-for-certification-scholarships/2024-10-15T13:43:30-04:00weekly0.6/security-news/blog/2023/join-the-mentoring-program-rose-miller/2023-11-07T13:59:50-05:00weekly0.6/security-news/blog/2023/asis-and-partners-announce-p3-day/2023-11-08T13:34:58-05:00weekly0.6/security-news/blog/2023/security-management-wins-ozzie-award/2023-11-08T13:34:32-05:00weekly0.6/security-news/blog/2023/leading-with-purpose-advancing-dei-in-the-security-industry/2023-11-08T13:50:01-05:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-10-2023/2024-10-04T15:08:35-04:00weekly0.6/security-news/blog/2023/meet-the-2023-cso-center-board/2023-11-14T12:35:27-05:00weekly0.6/security-news/blog/2023/upcoming-webinar-the-path-to-asis-certifications/2023-11-28T11:50:43-05:00weekly0.6/security-news/blog/2023/upcoming-webinar-imposter-syndrome-in-the-workplace/2023-11-28T11:50:59-05:00weekly0.6/security-news/blog/2023/become-a-mentor-janelle-miller/2024-01-09T13:34:33-05:00weekly0.6/security-news/blog/2023/congratulations-to-our-newly-board-certified-security-practitioners-11-2023/2024-10-04T15:08:49-04:00weekly0.6/security-news/blog/2023/the-smart-city-center-of-gravity-bill-edwards-austin-frasco/2023-12-12T15:34:27-05:00weekly0.6/security-news/blog/2023/thank-you-to-our-volunteers-2023/2023-12-19T21:06:47-05:00weekly0.6/security-news/blog/2023/2023-asis-president-farewell/2023-12-20T15:58:54-05:00weekly0.6/security-management-magazine/articles/2023/gsx-daily-2023/2023-09-13T11:26:42-04:00weekly0.6/security-news/blog/2022/2022-asis-awards-of-excellence/2022-10-11T12:34:33-04:00weekly0.6/security-news/blog/2022/getting-to-know-asis-president-malcolm-c.-smith-cpp/2025-08-27T10:50:35-04:00weekly0.6/security-news/blog/2022/what-do-the-asis-regional-boards-of-directors-mean-for-you/2022-02-03T10:57:14-05:00weekly0.6/security-news/blog/2022/tips-for-managers-to-empower-women-security-professionals/2025-08-27T10:51:38-04:00weekly0.6/security-news/blog/2022/ethics-in-biometrics-what-every-security-management--professional-should-know/2022-03-10T10:23:07-05:00weekly0.6/security-news/blog/2022/lessons-learned-when-chapters-join-forces-strongertogether/2022-02-16T11:56:50-05:00weekly0.6/security-news/blog/2022/featured-young-professional-qa-neil-parker/2022-03-30T11:08:53-04:00weekly0.6/security-news/blog/2022/managing-mid-crisis-resources-tools-and-guidance/2022-04-25T11:22:52-04:00weekly0.6/security-news/blog/2022/leadership-series-inclusive-conversations/2022-03-10T10:21:16-05:00weekly0.6/security-news/blog/2022/asis-statement-on-ukraine/2022-03-17T09:18:02-04:00weekly0.6/security-news/blog/2022/legal-challenges-when-extremism-and-social-media-converge/2022-03-10T10:19:16-05:00weekly0.6/security-news/blog/2022/myasis-sicily-gatiti-psp/2022-04-14T09:10:13-04:00weekly0.6/security-news/blog/2022/how-latam-region-mentoring-was-born-stronger-together/2022-04-28T14:43:30-04:00weekly0.6/security-news/blog/2022/featured-young-professional-qa-erwin-van-de-weerd/2022-03-30T11:27:45-04:00weekly0.6/security-news/blog/2022/winning-an-asis-award-of-excellence/2022-04-04T15:40:12-04:00weekly0.6/security-news/blog/2022/myasis-vashita-mehra-cpp-pci-psp/2022-04-15T09:28:46-04:00weekly0.6/security-news/blog/2022/a-model-for-network-activation/2022-04-20T16:34:03-04:00weekly0.6/security-news/blog/2022/featured-young-professional-qa-rya-manners/2022-04-26T11:27:00-04:00weekly0.6/security-news/blog/2022/defining-your-brand-as-a-security-leader/2022-04-29T10:36:34-04:00weekly0.6/security-news/blog/2022/beneficial-uses-of-the-wvpi-aa-2020-standard/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/myasis-francine-staple-psp/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/featured-yp-q-a-abraham-desantiago/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/whats-new-and-now-standards-guidelines-update-by-lisa-dubrock-cpp/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/keynote-speakers-and-education-program-announced-for-gsx-2022/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/asis-wants-to-hear-from-you-share-your-certification-story/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/featured-yp-qa-abhijeet-sinha-cpp/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/a-cso-center-member-reflects-on-pride-month-and-the-security-industry/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/in-case-you-missed-roi-on-women-in-security-leadership-why-female-leaders-are-good-business/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/asis-foundation-launches-de-and-i-research-effort-and-you-are-invited-to-participate/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/featured-yp-qa-christina-pryka/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/gsx-perspectives-atlanta-with-scott-ashworth/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/2022-book-of-the-year/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/asis-foundation-2022-fitness-challenge/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/myasis-meshal-aljohani-cpp-psp-pci/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/featured-yp-qa-codee-ludbey/2022-08-29T13:49:58-04:00weekly0.6/security-news/blog/2022/innovated-security-leadership-aligns-to-the-csuite/2022-10-11T12:34:47-04:00weekly0.6/security-news/blog/2022/congratulations-to-our-newly-board-certified-security-practitioners-08-22/2024-10-04T15:11:48-04:00weekly0.6/security-news/blog/2022/call-for-volunteers-danny-chan-ahamed-mohammed-abdi/2022-10-11T12:35:01-04:00weekly0.6/security-news/blog/2022/call-for-volunteers-steve-sommers-inge-sebyan-black/2022-10-11T12:35:18-04:00weekly0.6/security-news/blog/2022/call-for-volunteers-garth-gray-ing-kerne-yeh/2022-10-11T12:35:44-04:00weekly0.6/security-news/blog/2022/call-for-volunteers-antoinette-king-hari-pratap-singh-shekhawat-ii/2022-10-11T12:36:06-04:00weekly0.6/security-news/blog/2022/natural-disaster-risk-planning-and-response-and-recovery-resources/2022-10-11T12:35:56-04:00weekly0.6/security-news/blog/2022/congratulations-to-our-newly-board-certified-security-practitioners-09-2022/2024-10-04T15:11:31-04:00weekly0.6/security-news/blog/2022/asis-europe-announces-new-leadership/2022-10-18T14:31:21-04:00weekly0.6/security-news/blog/2022/myasis-rajiv-ranjan-prakah-singh-cpp-psp-pci/2022-10-18T14:57:24-04:00weekly0.6/security-news/blog/2022/young-professionals-rebranding-to-nextgen/2022-11-08T11:10:58-05:00weekly0.6/security-news/blog/2022/featured-nextgen-qa-dustin-wilhoit/2022-11-08T11:10:37-05:00weekly0.6/security-news/blog/2022/a-look-at-the-editing-of-the-poa-1/2022-11-08T11:09:09-05:00weekly0.6/security-news/blog/2022/a-look-at-the-editing-of-the-poa-2/2022-11-09T09:00:10-05:00weekly0.6/security-news/blog/2022/congratulations-to-our-newly-board-certified-security-practitioners-10-2022/2024-10-04T15:11:10-04:00weekly0.6/security-news/blog/2022/featured-nextgen-qa-pablo-nicolas-escobar-app-psp/2022-11-22T13:48:25-05:00weekly0.6/security-news/blog/2022/leadership-lessons-what-don-walker-taught-the-security-profession/2023-04-20T10:41:26-04:00weekly0.6/security-news/blog/2022/security-management-is-going-digital/2022-11-23T09:00:10-05:00weekly0.6/security-news/blog/2022/the-best-of-ASIS-connects/2022-11-30T09:00:11-05:00weekly0.6/security-news/blog/2022/smart-cybersecurity-policies-by-antoinette-king/2022-12-07T09:00:10-05:00weekly0.6/security-news/blog/2022/calling-all-presenters-for-gsx-2023/2022-12-16T14:05:36-05:00weekly0.6/security-news/blog/2022/thank-you-to-our-volunteers-2022/2022-12-19T15:54:15-05:00weekly0.6/security-news/blog/2022/featured-nextgen-qa-mal-singer-app/2022-12-21T09:43:30-05:00weekly0.6/security-news/blog/2022/message-from-2022-president-malcolm-smith-cpp/2022-12-29T11:30:59-05:00weekly0.6/security-news/blog/2022/happy-new-year-from-the-2023-ASIS-international-president/2023-01-04T09:00:10-05:00weekly0.6/security-news/publications/protection-of-assets-poa/wpv-sample-content/2024-01-16T14:43:19-05:00weekly0.6/security-management-magazine/articles/2022/gsx-show-daily-2022/2022-12-06T17:17:17-05:00weekly0.6/about-asis/communities/nextgen/sign-up-to-learn-more/2024-09-20T10:32:32-04:00weekly0.6/security-news/blog/2021/a-message-from-sia-and-asis-international/2021-01-07T14:18:19-05:00weekly0.6/security-news/blog/2021/making-a-difference-asis-president-john-petruzzi-cpp/2021-01-28T14:57:09-05:00weekly0.6/security-news/blog/2021/preparing-for-2021/2021-01-21T15:37:40-05:00weekly0.6/security-news/blog/2021/managing-an-in-person-workforce-in-2021/2025-05-07T12:35:38-04:00weekly0.6/security-news/blog/2021/how-the-asis-network-helped-me-in-2020-lynn-de-vries-cpp-pci/2021-01-28T15:53:51-05:00weekly0.6/security-news/blog/2021/how-private-security-and-law-enforcement-work-together/2021-02-12T10:18:34-05:00weekly0.6/security-news/blog/2021/myasis-cleveland-duncombe/2021-02-18T01:00:06-05:00weekly0.6/security-news/blog/2021/state-of-the-association/2022-11-16T10:48:28-05:00weekly0.6/security-news/blog/2021/tips-from-one-asis-member-to-34000-others-meredith-moore-m.ed/2025-05-07T12:34:07-04:00weekly0.6/security-news/blog/2021/one-members-journey/2021-03-03T14:35:41-05:00weekly0.6/security-news/blog/2021/what-security-professionals-can-learn-from-mental-health-professionals-george-l.-vergolias-psyd-ctm/2025-05-07T12:29:45-04:00weekly0.6/security-news/blog/2021/gender-balance-in-security-in-america-the-eu-and-ukraine/2021-06-01T11:56:10-04:00weekly0.6/security-news/blog/2021/global-security-industry-statement-on-cybersecurity-threats/2021-03-17T16:00:11-04:00weekly0.6/security-news/blog/2021/security-industry-groups-find-collaboration-can-boost-both/2021-03-22T15:40:34-04:00weekly0.6/security-news/blog/2021/myasis-story-mirza-sheraz-altaf-cpp-mba-nebosh-igc/2021-03-24T09:00:21-04:00weekly0.6/security-news/blog/2021/we-love-our-members/2021-03-31T15:00:10-04:00weekly0.6/security-news/blog/2021/myasis-brian-tuskan/2021-03-31T10:44:51-04:00weekly0.6/security-news/blog/2021/introducing-the-asis-presidents-challenge/2021-04-09T11:01:11-04:00weekly0.6/security-news/blog/2021/healthcare-security-programs-and-why-they-matter-now-more-than-ever-brian-uridge-mpa-cpp-chpa-ctm/2025-05-07T12:28:31-04:00weekly0.6/security-news/blog/2021/managing-civil-unrest--mangesh-sawant/2021-06-01T11:55:42-04:00weekly0.6/security-news/blog/2021/from-law-enforcement-to-getting-my-cpp-scott-ashworth-cpp/2021-04-28T09:00:21-04:00weekly0.6/security-news/blog/2021/participate-in-the-ifpo-security-officer-survey/2021-05-07T11:12:19-04:00weekly0.6/security-news/blog/2021/frankenstein-fraudand-6-tips-to-combat-it/2021-06-01T11:55:20-04:00weekly0.6/security-news/blog/2021/thanks-for-joining-us-at-asis-europe-2021/2021-05-12T15:08:24-04:00weekly0.6/security-news/blog/2021/security-management-recognized-at-the-azbee-awards/2022-09-01T14:45:21-04:00weekly0.6/security-news/blog/2021/asis-global-governance-2022-update/2021-06-02T14:31:28-04:00weekly0.6/security-news/blog/2021/myasis-matt-cameron-psp/2021-06-23T11:42:46-04:00weekly0.6/security-news/blog/2021/military-veterans-bring-a-lot-to-the-security-industry-what-you-should-know/2021-06-17T11:52:10-04:00weekly0.6/security-news/blog/2021/social-insights-into-security-perspectives/2021-07-19T13:13:10-04:00weekly0.6/security-news/blog/2021/utilizing-data-analytics-in-the-field-of-physical-security-an-exploratory-study/2021-11-04T12:44:25-04:00weekly0.6/security-news/blog/2021/natural-disasters-when-an-organization-is-most-vulnerable/2024-10-22T17:48:30-04:00weekly0.6/security-news/blog/2021/myasis-andrew-bochman/2021-08-18T14:27:37-04:00weekly0.6/security-news/blog/2021/understanding-complex-coordinated-terrorist-attacks/2024-10-22T17:47:48-04:00weekly0.6/security-news/blog/2021/protecting-the-return-to-workplace/2021-09-02T11:59:05-04:00weekly0.6/security-news/blog/2021/september-11th-20-years-later/2021-09-13T14:27:11-04:00weekly0.6/security-news/blog/2021/2021-asis-member-anniversaries/2021-09-27T15:48:10-04:00weekly0.6/security-news/blog/2021/cybersecurity-and-physical-security-convergence/2024-10-22T17:46:16-04:00weekly0.6/security-news/blog/2021/myasis-paulo-grechi-almeida-cpp-pci-psp/2021-10-13T13:51:56-04:00weekly0.6/security-news/blog/2021/asis-2021-in-review/2021-10-19T19:24:11-04:00weekly0.6/security-news/blog/2021/asis-kolkata-chapter-the-beginning-of-a-paradigm-shift/2021-10-20T13:27:43-04:00weekly0.6/security-news/blog/2021/how-security-professionals-become-resilient/2021-10-29T12:55:22-04:00weekly0.6/security-news/blog/2021/asis-international-honored-with-three-marcom-awards/2021-11-03T15:29:09-04:00weekly0.6/security-news/blog/2021/travel-risk-management-the-game-has-changed/2021-11-10T15:10:51-05:00weekly0.6/security-news/blog/2021/five-banking--financial-services-security-strategies-to-consider/2021-11-17T13:41:05-05:00weekly0.6/security-news/blog/2021/smash-and-grab-theft/2022-02-03T10:59:31-05:00weekly0.6/security-news/blog/2021/asis-members-leading-our-profession/2022-02-03T10:59:03-05:00weekly0.6/security-news/blog/2021/thank-you-2021-asis-volunteers/2021-12-15T13:58:57-05:00weekly0.6/security-news/blog/2021/5-tips-to-protect-your-privacy-on-linkedin/2022-02-03T10:58:31-05:00weekly0.6/security-news/blog/2021/why-data-centers-matter/2022-02-03T10:58:00-05:00weekly0.6/security-news/blog/2020/take-asis-on-the-go/2020-03-19T12:52:19-04:00weekly0.6/security-news/blog/2020/stronger-together-asis-response-to-covid-19/2024-10-22T17:18:07-04:00weekly0.6/security-news/blog/2020/summary-of-new-covid-19-stimulus-law-phase-3/2020-03-27T17:35:28-04:00weekly0.6/security-news/blog/2020/summary-of-US-covid-19-stimulus-law-phase-3/2020-04-24T13:44:32-04:00weekly0.6/security-news/blog/2020/gsx-2020-update/2020-05-07T17:03:38-04:00weekly0.6/security-news/blog/2020/securityheroes-profile-sonny-tai/2020-07-21T11:38:52-04:00weekly0.6/security-news/blog/2020/asis-international-statement-re-diversity-and-inclusion/2020-06-03T11:07:44-04:00weekly0.6/security-news/blog/2020/qa-workplace-violence-prevention-and-intervention/2020-11-17T16:32:40-05:00weekly0.6/security-news/blog/2020/thin-purple-line-initiative-unanimously-approved-by-the-asis-global-board-of-directors/2020-07-07T11:16:48-04:00weekly0.6/security-news/blog/2020/cso-center-community-supports-members-during-the-new-normal/2020-07-14T12:38:36-04:00weekly0.6/security-news/blog/2020/asis-now-offering-remotely-proctored-certification-exams/2020-10-16T15:38:13-04:00weekly0.6/security-news/blog/2020/supporting-the-security-professions-talent-pipeline-in-africa/2020-11-17T16:33:15-05:00weekly0.6/security-news/blog/2020/study-tips-for-the-pci-exam/2020-11-17T16:33:27-05:00weekly0.6/security-news/blog/2020/top-tips-from-suzanna-alsayed-mdem/2020-12-16T13:55:46-05:00weekly0.6/security-news/blog/2020/2021-access-control-trends/2020-12-02T10:48:39-05:00weekly0.6/security-news/blog/2020/dei-lessons/2021-12-02T12:21:26-05:00weekly0.6/security-news/blog/2020/stories-of-success-three-board-members/2020-12-17T15:03:26-05:00weekly0.6/security-news/blog/2020/godfried-hendriks-cpp-answers-five-common-questions-among-young-professionals/2021-01-28T14:56:55-05:00weekly0.6/security-news/blog/2019/2019-asis-education-preview/2018-12-03T16:08:52-05:00weekly0.6/security-news/blog/2019/implications-of-transnational-organized-crime-toc/2019-01-02T16:13:29-05:00weekly0.6/security-news/blog/2019/meet-your-2019-board-management-committee/2019-01-18T16:12:11-05:00weekly0.6/security-news/blog/2019/gsx-2019-call-for-presentations-is-now-open/2019-01-30T10:55:50-05:00weekly0.6/security-news/blog/2019/moisant-leads-2019-professional-certification-board/2019-01-09T15:01:52-05:00weekly0.6/security-news/blog/2019/women-in-security-protecting-ceos-private-citizens--vips/2019-01-23T16:38:22-05:00weekly0.6/security-news/blog/2019/members-subscribe-to-security-journal-and-save/2019-02-26T11:06:01-05:00weekly0.6/security-news/blog/2019/asis-europe-2019-going-from-strength-to-strength/2019-03-25T09:50:09-04:00weekly0.6/security-news/blog/2019/asis-releases-new-private-security-officer-pso-guideline/2019-03-28T17:16:48-04:00weekly0.6/security-news/blog/2019/asis-europe-2019-breaks-records-in-rotterdam/2019-04-02T16:57:38-04:00weekly0.6/security-news/blog/2019/asis-recertification-tips/2020-04-15T15:06:05-04:00weekly0.6/security-news/blog/2019/security-convergence-study/2019-05-02T09:38:18-04:00weekly0.6/security-news/blog/2019/cast-your-vote-for-the-2019-nominating-committee/2019-07-01T10:35:40-04:00weekly0.6/security-news/blog/2019/meet-volunteer-engagement-manager-clarence-ford/2019-07-31T15:53:46-04:00weekly0.6/security-news/blog/2019/the-results-are-in-your-2019-nominating-committee-election/2019-08-22T14:54:45-04:00weekly0.6/security-news/blog/2019/gsx-learnings-dhs-on-preparing-for-the-growing-drone-threat/2019-10-08T16:46:46-04:00weekly0.6/security-news/blog/2019/the-fbis-investigative-role-in-intellectual-property-rights-crimes/2019-10-03T10:03:31-04:00weekly0.6/security-news/blog/2019/2019-asis-australia-conference-recap/2019-11-05T13:19:46-05:00weekly0.6/security-news/blog/2018/meet-the-2018-commission-on-standards-and-guidelines/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2018/iwce-2018-is-a-must-attend-event-for-critical-communications-technology-professionals/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2018/welcome-to-the-new-asis-online/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2018/education-at-asis-europe-will-feature-emerging-risks/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2018/introducing-asis-connects/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2018/asis-and-atf-sign-memorandum-of-understanding/2022-02-18T14:48:33-05:00weekly0.6/security-news/blog/2018/new-asis-foundation-crisp-report-outlines-strategies-and-best-practices-for-securing-archaeological-sites/2018-03-05T19:30:06-05:00weekly0.6/security-news/blog/2018/2018-public-private-analytic-exchange-program/2019-10-09T09:29:04-04:00weekly0.6/security-news/blog/2018/could-this-be-the-year-for-a-federal-data-protection-and-breach-notification-bill/2019-10-09T09:32:33-04:00weekly0.6/security-news/blog/2018/asis-international-joins-the-emergency-services-sector-coordinating-council-esscc/2018-03-02T09:40:09-05:00weekly0.6/security-news/blog/2018/council-resources-understanding-iot--hostile-surveillance/2018-03-07T12:08:56-05:00weekly0.6/security-news/blog/2018/dhs-st-next-generation-first-responder/2018-03-22T16:57:18-04:00weekly0.6/security-news/blog/2018/building-a-trusted-relationship-with-the-fbi/2018-04-02T12:35:34-04:00weekly0.6/security-news/blog/2018/karen-marquez-memorial-honor-nominations-are-now-open-for-outstanding-women-in-security/2018-06-19T10:10:14-04:00weekly0.6/security-news/blog/2018/jpmorgan-keynote-nyc-2018/2024-10-22T16:46:17-04:00weekly0.6/security-news/blog/2018/updates-to-asis-privacy-policy/2018-05-02T10:46:22-04:00weekly0.6/security-news/blog/2018/asis-europe-2018-highlights-the-need-for-esrm/2018-05-02T11:21:36-04:00weekly0.6/security-news/blog/2018/the-student-membership-opportunity/2018-05-11T10:40:13-04:00weekly0.6/security-news/blog/2018/latest-version-of-nist-cybersecurity-framework-draws-worthy-praise-from-business-groups/2018-06-07T11:52:11-04:00weekly0.6/security-news/blog/2018/welcome-to-securityxchange/2018-06-07T12:15:22-04:00weekly0.6/security-news/blog/2018/asis-members-named-top-industry-thought-leaders/2018-07-10T09:40:53-04:00weekly0.6/security-news/blog/2018/share-your-esrm-story/2018-10-04T14:53:57-04:00weekly0.6/security-news/blog/2018/early-careerist-certification-beta-test-coming-soon/2018-10-03T16:42:03-04:00weekly0.6/security-news/blog/2018/standards-administrator-earns-astd-certification/2018-08-16T12:10:17-04:00weekly0.6/security-news/blog/2018/revision-of-psc.2-conformity-assessment-standard-beginning-soon/2018-08-17T16:01:13-04:00weekly0.6/security-news/blog/2018/announcing-a-new-level-of-membership/2018-10-03T16:41:39-04:00weekly0.6/security-news/blog/2018/celebrating-national-security-officer-appreciation-week/2018-09-21T16:53:27-04:00weekly0.6/security-news/blog/2018/asis-introduces-the-associate-protection-professional-app-certification-for-new-and-transitioning-practitioners2/2019-05-03T14:09:18-04:00weekly0.6/security-news/blog/2018/new-aviation-law-makes-positive-changes-to-current-rules-for-commercial-drone-use/2018-10-31T16:05:38-04:00weekly0.6/security-news/blog/2018/a-veteran-for-veterans-rowing-the-atlantic-solo/2018-11-08T16:32:47-05:00weekly0.6/security-news/blog/2018/2018-election-analysis-and-preview-of-the-116th-u.s.-congress/2018-11-14T09:16:39-05:00weekly0.6/security-news/blog/2018/27-november---free-protecting-houses-of-worship-webinar/2018-11-20T10:35:44-05:00weekly0.6/security-news/blog/2018/2018-u.s.-election-analysis/2018-11-29T14:39:57-05:00weekly0.6/security-news/blog/2018/2018-a-look-back/2018-12-03T15:56:27-05:00weekly0.6/security-news/blog/2018/esrm-goes-to-south-america/2018-12-19T12:48:22-05:00weekly0.6/security-news/blog/2018/future-of-physical-security/2018-12-19T12:45:47-05:00weekly0.6/security-news/blog/2018/faa-proposes-less-restrictive-rules-for-the-commercial-use-of-drones/2019-10-09T09:27:47-04:00weekly0.6/security-news/blog/2017/asis-international-announces-2018-leadership-team/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/asis-europe-2018-moves-to-rotterdam/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/attendees-of-asis-2017-describe-new-more-modern-event/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/dallas-is-ready-for-asis-20172/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/all-digital-magazine-focuses-on-retail-security-and-loss-prevention-professionals2/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/fema-releases-refreshed-national-incident-management-system2/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/stay-informed-with-asis-council-news2/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/asis-employee-earns-20-under-30-honor2/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/white-house-releases-fentanyl-recommendations-for-first-responders/2018-03-02T09:43:54-05:00weekly0.6/security-news/blog/2017/asis-introduces-virtual-study-group-for-psp-exam2/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/esrm-an-enduring-security-risk-model/2018-08-16T13:46:38-04:00weekly0.6/security-news/blog/2017/new-dhs-science--technology-industry-guide-encourages-public-partnerships-for-rd/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/asis-announces-new-website-and-community/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2017/2017-award-winners/2018-03-23T13:48:39-04:00weekly0.6/security-news/blog/2017/what-is-the-difference-between-certification-and-certificate-programs/2018-03-02T09:20:56-05:00weekly0.6/security-news/blog/2025/happy-new-year-message-from-2025-president/2025-01-10T09:53:50-05:00weekly0.6/security-news/blog/2025/today-in-security-history-the-y2k-bug/2025-01-10T09:53:50-05:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-12-2024/2025-02-12T10:50:12-05:00weekly0.6/security-news/blog/2025/upcoming-webinar-incident-report-writing/2025-01-16T13:46:39-05:00weekly0.6/security-news/blog/2025/risk-outlook-2025-report/2025-01-27T09:32:24-05:00weekly0.6/security-news/blog/2025/upcoming-webinar-protecting-critical-infrastructure-across-evolving-threatscape/2025-01-22T09:00:11-05:00weekly0.6/security-news/blog/2025/engaging-the-csuite-on-executive-protection/2025-01-28T16:55:04-05:00weekly0.6/security-news/blog/2025/cso-center-security-insights-executive-accountability/2025-01-30T15:50:02-05:00weekly0.6/security-news/blog/2025/today-in-security-history-black-security-innovators/2025-02-11T12:05:19-05:00weekly0.6/security-news/blog/2025/a-super-bowl-security-tailgate-blog/2025-02-07T09:00:10-05:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-01-2025/2025-02-28T13:32:14-05:00weekly0.6/security-news/blog/2025/get-to-know-2025-asis-boards/2025-02-12T10:09:40-05:00weekly0.6/security-news/blog/2025/today-in-security-history-the-first-asis-board/2025-02-20T09:26:43-05:00weekly0.6/security-news/blog/2025/sex-trafficking-misinformation-isnt-helping-anyone/2025-02-19T09:00:10-05:00weekly0.6/security-news/blog/2025/cso-center-security-insights-decision-making/2025-02-26T09:00:10-05:00weekly0.6/security-news/blog/2025/how-asis-membership-helps-face-todays-security-threats/2025-03-11T13:33:10-04:00weekly0.6/security-news/blog/2025/how-asis-membership-helps-CSOs/2025-03-12T09:00:20-04:00weekly0.6/security-news/blog/2025/today-in-security-history-the-women-of-asis/2025-07-02T11:28:01-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-preventing-burnout/2025-04-08T12:15:12-04:00weekly0.6/security-news/blog/2025/awards-scholarships-applications-open-now/2025-04-02T09:38:56-04:00weekly0.6/security-news/blog/2025/attend-security-leadher/2025-04-09T09:00:21-04:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-03-20255/2025-04-11T12:00:10-04:00weekly0.6/security-news/blog/2025/upcoming-webinar-from-the-front-lines-to-leadership/2025-04-16T14:40:25-04:00weekly0.6/security-news/blog/2025/upcoming-webinar-executive-protection-2.0/2025-04-22T12:30:11-04:00weekly0.6/security-news/blog/2025/asis-celebrates-p3-day/2025-04-24T09:47:05-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-soft-skills/2025-04-30T09:00:20-04:00weekly0.6/security-news/blog/2025/upcoming-webinar-the-escalating-threat-landscape/2025-05-07T09:00:22-04:00weekly0.6/security-news/blog/2025/advancing-women-in-security-at-security-leadher/2025-05-15T15:34:48-04:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-04-2025/2025-05-16T09:00:23-04:00weekly0.6/security-news/blog/2025/the-missing-link-in-law-enforcement-transitions/2025-05-21T09:00:21-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-covid-reflections/2025-06-19T12:39:29-04:00weekly0.6/security-news/blog/2025/human-firewall-the-role-of-security-culture-and-governance-in-data-centers/2025-07-08T13:05:57-04:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-05-2025/2025-06-06T09:34:07-04:00weekly0.6/security-news/blog/2025/a-conversation-with-a-cso-and-a-security-student/2025-07-08T13:06:17-04:00weekly0.6/security-news/blog/2025/the-wild-women-of-detroit/2025-06-18T09:37:31-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-protests/2025-07-09T15:44:58-04:00weekly0.6/security-news/blog/2025/resource-roundup-asis-certifications/2025-08-05T12:49:01-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-data-backed-proposals-that-resonate/2025-07-10T09:15:56-04:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-06-2025/2025-08-15T12:51:23-04:00weekly0.6/security-news/blog/2025/asis-chile-celebrates-25-years/2025-08-05T12:48:48-04:00weekly0.6/security-news/blog/2025/a-round-of-applause-for-asis/2025-08-05T12:48:40-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-security-governance/2025-07-30T10:17:07-04:00weekly0.6/security-news/blog/2025/from-service-to-security/2025-08-14T13:06:06-04:00weekly0.6/security-news/blog/2025/upcoming-webinar-security-transformed-for-a-changing-world/2025-08-21T11:19:12-04:00weekly0.6/security-news/blog/2025/get-involved-with-asis/2025-08-20T09:00:21-04:00weekly0.6/security-news/blog/2025/congratulations-to-our-newly-board-certified-security-practitioners-07-2025/2025-08-15T12:52:00-04:00weekly0.6/security-news/blog/2025/upcoming-webinar-systems-migration-packing-list/2025-08-22T08:25:34-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-the-risks-of-burnout/2025-08-27T07:23:51-04:00weekly0.6/security-news/blog/2025/5-ways-security-leaders-are-transforming-risk-management-into-strategic-advantage/2025-09-09T15:10:47-04:00weekly0.6/security-news/blog/2025/2025-asis-awards-of-excellence/2025-09-09T15:22:18-04:00weekly0.6/security-news/blog/2025/celebrating-the-commitment-of-25-year-50-year-and-2025-life-member-inductees-to-asis-international/2025-09-18T11:47:06-04:00weekly0.6/security-news/blog/2025/cso-center-insights-ivica-miljak/2025-09-23T13:50:33-04:00weekly0.6/security-news/blog/2025/myasis-tahsin-mohamed-ali-psp/2025-10-01T08:00:10-04:00weekly0.6/security-news/blog/2025/finding-my-next-mission-how-operation-career-change-shaped-my-career-path/2025-10-07T14:42:57-04:00weekly0.6/security-news/blog/2025/unlockinginsightsviewingaccesscontrol-as-astrategicinvestment/2025-10-15T07:46:10-04:00weekly0.6/security-news/blog/2025/the-cso-survey-insights-on-security-in-2025-webinar/2025-10-16T17:20:31-04:00weekly0.6/security-news/blog/2025/beyond-doors-access-control-as-a-cybersecurity-imperative-webinar/2025-10-21T17:12:06-04:00weekly0.6/security-news/blog/2025/cso-center-security-insights-emergency-planning/2025-11-04T16:09:28-05:00weekly0.6/security-news/blog/2025/the-role-of-behavioral-threat-assessment-in-school-security/2025-11-04T16:24:09-05:00weekly0.6/security-news/blog/2025/career-crisis-management-building-resiliency-before-you-need-it/2025-11-12T10:34:33-05:00weekly0.6/security-news/blog/2025/how-i-made-my-first-gsx-count-5-practical-strategies-for-any-attendee/2025-11-18T11:10:58-05:00weekly0.6/security-news/blog/2025/cso-center-security-insights-ai-and-robotics/2025-11-28T11:58:01-05:00weekly0.6/security-news/blog/2025/resource-roundup-making-the-most-of-your-asis-membership/2025-11-28T11:59:16-05:00weekly0.6/security-news/blog/2025/thank-you-volunteers/2025-12-11T09:51:11-05:00weekly0.6/security-news/blog/2025/in-loving-memory-mariah-bartz/2025-12-12T09:49:42-05:00weekly0.6/security-news/blog/2025/cso-center-security-insights-stop-putting-out-fires---strategic-security-leaders-must-reframe-decision-making-to-unlock-influence/2025-12-17T08:24:02-05:00weekly0.6/security-news/blog/2025/risk-outlook-2026-key-predictions-and-strategic-priorities-from-international-sos/2025-12-23T07:29:22-05:00weekly0.6/security-news/blog/2024/response-and-recovery-resources-for-natural-disasters/2024-10-01T10:26:03-04:00weekly0.6/security-news/blog/2024/happy-new-year-message-from-2024-president/2024-01-09T13:28:45-05:00weekly0.6/security-news/blog/2024/mastering-global-leadership-jonatan-hugemark/2024-01-09T13:28:45-05:00weekly0.6/security-news/blog/2024/become-a-mentee-roberto-chavez-rubio/2024-01-10T12:49:25-05:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-12-2023/2024-10-04T15:14:27-04:00weekly0.6/security-news/blog/2024/asis-seeks-new-ceo/2024-01-17T09:10:47-05:00weekly0.6/security-news/blog/2024/risk-outlook-2024-viktor-panchak/2024-01-17T16:36:32-05:00weekly0.6/security-news/blog/2024/top-23-security-trends-of-2023-michael-gips/2024-01-24T09:49:55-05:00weekly0.6/security-news/blog/2024/view-the-2023-asis-annual-report2/2024-01-31T09:13:49-05:00weekly0.6/security-news/blog/2024/tiktok-a-threat-to-national-security-murat-elahi/2024-02-07T09:00:10-05:00weekly0.6/security-news/blog/2024/the-new-cyber-defense-paradigm-jonatan-hugemark/2024-02-14T09:00:11-05:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-01-2024/2024-10-04T15:14:12-04:00weekly0.6/security-news/blog/2024/q-a-cannabis-security-standard/2024-02-21T10:06:16-05:00weekly0.6/security-news/blog/2024/cso-center-security-insights-extremism/2024-02-28T09:46:01-05:00weekly0.6/security-news/blog/2024/upping-your-strategy-game-through-targeted-learning-programs-michael-brzozowski/2025-05-19T10:25:05-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-02-2024/2024-10-04T15:13:59-04:00weekly0.6/security-news/blog/2024/myasis-wendy-ann-bashnan/2024-03-06T09:00:10-05:00weekly0.6/security-news/blog/2024/security-assessment-doing-business-in-ukraine/2024-03-15T10:17:46-04:00weekly0.6/security-news/blog/2024/myasis-tatyana-andrianova/2024-03-13T09:00:20-04:00weekly0.6/security-news/blog/2024/myasis-ali-al-nomais-cpp-psp-pci/2024-03-20T09:00:20-04:00weekly0.6/security-news/blog/2024/public-private-partnerships-a-keystone-for-safer-communities-worldwide/2024-03-22T10:01:33-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-extremism2/2024-03-27T09:00:20-04:00weekly0.6/security-news/blog/2024/asis-awards-of-excellence-open/2024-04-02T09:00:21-04:00weekly0.6/security-news/blog/2024/upcoming-webinar-the-cannabis-industry-from-seed-to-sale/2024-04-03T09:00:20-04:00weekly0.6/security-news/blog/2024/creating-cybersecurity-opportunities-for-the-visually-impaired/2024-04-10T09:00:20-04:00weekly0.6/security-news/blog/2024/upcoming-webinar-protecting-the-mental-wellbeing-of-security-professionals/2024-04-17T09:00:20-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-03-2024/2024-10-04T15:13:37-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-security-risk-management/2024-04-24T09:00:20-04:00weekly0.6/security-news/blog/2024/q-a-security-risk-assessment-standard/2024-05-06T09:32:16-04:00weekly0.6/security-news/blog/2024/what-to-expect-at-security-leadher/2024-05-08T10:03:26-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-04-2024/2024-10-04T15:13:26-04:00weekly0.6/security-news/blog/2024/q-a-autonomous-vehicles-research-report/2024-05-29T15:58:25-04:00weekly0.6/security-news/blog/2024/the-rise-of-dark-drones/2024-05-17T09:00:20-04:00weekly0.6/security-news/blog/2024/what-to-expect-at-security-leadher2/2024-05-22T09:00:20-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-school-security/2024-05-29T09:00:20-04:00weekly0.6/security-news/blog/2024/upcoming-webinar-the-3ps-of-concert-and-special-event-security/2024-06-11T09:13:39-04:00weekly0.6/security-news/blog/2024/upcoming-webinar-safeguarding-your-organization-through-effective-crisis-resolution/2024-06-12T09:00:21-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-05-2024/2024-10-04T15:13:11-04:00weekly0.6/security-news/blog/2024/hear-from-our-security-leadher-sponsors/2024-06-19T09:00:20-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-concierge-guarding/2024-06-26T09:00:20-04:00weekly0.6/security-news/blog/2024/advancing-the-security-profession-in-kenya/2024-07-16T10:15:48-04:00weekly0.6/security-news/blog/2024/stepping-into-your-power-lessons-from-the-security-leadher-conference/2024-07-16T10:16:05-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-06-2024/2024-10-04T15:12:55-04:00weekly0.6/security-news/blog/2024/asis-members-share-insights-after-trump-assassination-attempt/2024-07-16T10:09:26-04:00weekly0.6/security-news/blog/2024/influencers-and-digital-protection/2024-07-17T09:00:20-04:00weekly0.6/security-news/blog/2024/resilience-in-turbulent-times-esrm-solutions-for-businesses-facing-social-upheaval/2024-07-25T16:45:05-04:00weekly0.6/security-news/blog/2024/what-you-need-to-know-about-the-new-school-security-standard-a-necessary-advancement-for-safer-schools/2024-08-06T15:30:55-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-leadership/2024-07-31T09:05:09-04:00weekly0.6/security-news/blog/2024/career-transition-from-the-us-navy-to-security/2024-08-07T14:38:39-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-07-2024/2024-10-04T15:12:39-04:00weekly0.6/security-news/blog/2024/asis-is-golden/2024-08-14T09:23:29-04:00weekly0.6/security-news/blog/2024/volunteer-with-asis/2024-08-21T13:29:47-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-food-defense/2024-09-17T12:40:21-04:00weekly0.6/security-news/blog/2024/awards-of-excellence/2024-09-18T16:49:46-04:00weekly0.6/security-news/blog/2024/press-briefing-school-security-standard/2024-09-24T07:00:11-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-08-2024/2024-10-10T14:25:44-04:00weekly0.6/security-news/blog/2024/today-in-security-history-remembering-9-11/2024-09-11T11:34:38-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-crisis-management/2024-10-28T15:55:35-04:00weekly0.6/security-news/blog/2024/honoring-25-and-50-year-asis-members/2024-09-23T10:23:41-04:00weekly0.6/security-news/blog/2024/another-gsx-in-the-books/2024-10-08T14:56:17-04:00weekly0.6/security-news/blog/2024/v-foro-wis-latam-caribbean-2024/2024-10-09T09:00:20-04:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-09-2024/2024-10-11T12:00:10-04:00weekly0.6/security-news/blog/2024/today-in-security-history-cybersecurity-awareness-month/2024-10-16T09:00:21-04:00weekly0.6/security-news/blog/2024/get-ready-for-asis-asia-pacific-2024/2024-10-23T09:00:20-04:00weekly0.6/security-news/blog/2024/cso-center-security-insights-convergence-of-corporate-security/2024-10-30T09:47:47-04:00weekly0.6/security-news/blog/2024/asis-connects-discussions-civil-unrest/2024-11-05T09:00:10-05:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-10-2024/2024-11-08T12:00:10-05:00weekly0.6/security-news/blog/2024/thank-you-from-asis-president-cy-oatridge/2024-11-14T09:21:28-05:00weekly0.6/security-news/blog/2024/cso-center-security-insights-soc-development-and-deployment/2024-11-20T09:06:59-05:00weekly0.6/security-news/blog/2024/how-99s-women-safety-program-is-transforming-the-rideshare-industry/2024-12-02T09:53:06-05:00weekly0.6/security-news/blog/2024/recap-latam-ca-2024-in-costa-rica/2024-12-06T11:27:10-05:00weekly0.6/security-news/blog/2024/thank-you-volunteers/2024-12-11T09:00:10-05:00weekly0.6/security-news/blog/2024/cso-center-security-insights-bomb-threats/2024-12-18T09:29:11-05:00weekly0.6/security-news/blog/2024/congratulations-to-our-newly-board-certified-security-practitioners-11-2024/2024-12-20T12:00:10-05:00weekly0.6/security-news/blog/2024/2024-president-farewell/2024-12-25T21:46:33-05:00weekly0.6/security-news/security-issues-research/2023-24/2023-access-control-research/2023-11-07T11:21:23-05:00weekly0.6/security-news/security-issues-research/2023-24/2024-security-risk-management-research-project/2024-08-06T10:25:02-04:00weekly0.6/security-news/security-issues-research/2023-24/2024-active-assailant-preparedness-research-project/2024-09-12T15:39:45-04:00weekly0.6/security-management-magazine/articles/2024/08/2024-11-07T11:36:01-05:00weekly0.6/security-management-magazine/articles/2024/09/2024-11-07T11:34:51-05:00weekly0.6/security-management-magazine/articles/2024/gsx-daily/2024-09-25T06:00:10-04:00weekly0.6/security-management-magazine/articles/2024/10/2024-11-07T11:32:40-05:00weekly0.6/security-management-magazine/articles/2024/11/2024-11-07T11:29:19-05:00weekly0.6/security-management-magazine/articles/2024/12/2024-12-12T10:33:59-05:00weekly0.6/security-management-magazine/resources/advertise-archives/advertise2/2024-08-29T13:00:49-04:00weekly0.6/security-management-magazine/resources/advertise-archives/advertise/2024-08-29T13:00:49-04:00weekly0.6/security-management-magazine/resources/advertise-archives/advertise2020/2024-08-29T13:00:49-04:00weekly0.6/about-asis/asis-foundation/asis-foundation-sponsorship-opportunities/virtual-fitness-challenge/2025-06-16T14:06:18-04:00weekly0.6/about-asis/asis-foundation/asis-foundation-sponsorship-opportunities/foundation-five/2025-06-16T14:22:58-04:00weekly0.6/security-management-magazine/articles/2025/01/2025-01-01T09:15:57-05:00weekly0.6/security-management-magazine/articles/2025/02/2025-02-01T07:57:36-05:00weekly0.6/security-management-magazine/articles/2025/03/2025-03-01T08:38:30-05:00weekly0.6/security-management-magazine/articles/2025/04/2025-04-08T09:11:40-04:00weekly0.6/security-management-magazine/articles/2025/05/2025-05-09T17:19:10-04:00weekly0.6/security-management-magazine/articles/2025/06/2025-06-23T12:02:38-04:00weekly0.6/security-management-magazine/articles/2025/07/2025-07-09T10:45:56-04:00weekly0.6/security-management-magazine/articles/2025/08/2025-08-01T11:51:52-04:00weekly0.6/security-management-magazine/articles/2025/09/2025-09-08T08:14:59-04:00weekly0.6/security-management-magazine/articles/2025/10/2025-10-13T09:04:22-04:00weekly0.6/security-management-magazine/articles/2025/11/2025-11-05T11:33:52-05:00weekly0.6/security-management-magazine/articles/2025/12/2025-12-08T16:40:57-05:00weekly0.6/security-management-magazine/articles/2025/gsx-daily/2025-10-01T07:29:55-04:00weekly0.6/about-asis/communities/women-in-security/sign-up-to-learn-more/2024-10-18T17:05:57-04:00weekly0.6/security-management-magazine/monthly-issues/security-technology/archive/2025-12-05T12:14:11-05:00weekly0.6/about-asis/asis-foundation/foundation-scholarships-and-grants/2019-asis-foundation-scholarship--grant-recipients/2024-10-24T14:16:23-04:00weekly0.6/security-news/news/security-experts-asis-tv/security-experts-Jeff-Sieben/2018-02-05T18:06:34-05:00weekly0.6/security-news/news/security-experts-asis-tv/security-experts-tim-mccreight-cpp/2018-02-05T12:48:40-05:00weekly0.6/security-news/news/security-experts-asis-tv/security-experts-brian-harrell/2018-02-05T18:03:19-05:00weekly0.6/security-news/news/security-experts-asis-tv/security-experts-jim-mcguffey-cpp-pci-psp/2018-02-05T18:03:42-05:00weekly0.6/security-news/news/security-experts-asis-tv/security-experts-james-demeo/2018-02-05T18:03:58-05:00weekly0.6/security-news/news/asis-tv/gsx-session-spotlights/2018-06-08T11:42:01-04:00weekly0.6/security-news/news/asis-tv/gsx-exhibitor-profiles/2018-05-31T17:50:51-04:00weekly0.6/security-management-magazine/resources/authors/teresa-anderson/2019-08-26T09:38:28-04:00weekly0.6/security-management-magazine/resources/authors/claire-meyer/2019-08-26T09:38:50-04:00weekly0.6/security-management-magazine/resources/authors/flora-szatkowski/2019-08-26T09:39:07-04:00weekly0.6/security-management-magazine/resources/authors/scott-briscoe/2019-08-26T09:37:42-04:00weekly0.6/security-management-magazine/resources/authors/megan-gates/2025-05-20T14:15:03-04:00weekly0.6/security-management-magazine/resources/authors/mark-tarallo/2019-08-26T09:31:16-04:00weekly0.6/security-management-magazine/resources/authors/sara-mosqueda/2019-08-26T09:29:43-04:00weekly0.6/about-asis/global-and-regional-governance/1core-values-and-competencies/gbod-competencies/2022-07-22T13:41:53-04:00weekly0.6/about-asis/global-and-regional-governance/1core-values-and-competencies/nominating-committee-competencies/2022-05-16T00:00:11-04:00weekly0.6/about-asis/global-and-regional-governance/1core-values-and-competencies/erbod-competencies/2021-09-02T17:45:18-04:00weekly0.6/about-asis/global-and-regional-governance/1core-values-and-competencies/narbod-competencies/2021-09-02T17:45:32-04:00weekly0.6/security-management-magazine/latest-news/today-in-security/rss-feed/2025-12-23T09:24:05-05:00weekly0.6/security-management-magazine/latest-news/online-exclusives/espanol/2022-02-02T14:42:16-05:00weekly0.6/security-management-magazine/resources/writers-guidelines/2020-editorial-calendar/2022-12-06T18:55:31-05:00weekly0.6/security-management-magazine/resources/writers-guidelines/book-review-guidelines/2024-01-23T15:03:42-05:00weekly0.6/security-news/blog/important-changes-to-certification-policies-and-procedures/important-changes-in-spanish/2018-01-31T17:33:57-05:00weekly0.6/security-news/news/in-the-news/itn-7-26-2018/2018-11-20T12:16:48-05:00weekly0.6/security-news/security-topics/active-shooter/2023-11-06T16:44:28-05:00weekly0.7/security-news/security-topics/school-safety/2023-11-06T16:44:57-05:00weekly0.7/security-news/security-topics/cybersecurity/2024-09-19T14:11:29-04:00weekly0.7/security-news/security-topics/management-and-leadership-in-the-security-profession/2023-11-06T16:45:43-05:00weekly0.7/security-news/security-topics/esrm/2023-11-06T16:46:20-05:00weekly0.7/security-news/security-topics/disease-outbreak-all-resources/2021-05-18T15:20:02-04:00weekly0.7/security-news/security-topics/legal-security/2023-11-06T16:46:29-05:00weekly0.7/security-news/security-topics/physical-cyber/2023-11-06T16:46:37-05:00weekly0.7/security-news/security-topics/securing-houses-of-worship/2023-11-06T16:46:44-05:00weekly0.7/security-news/security-topics/managing-covid-19-fear-and-stress/2020-05-19T13:12:41-04:00weekly0.7/security-news/security-topics/disease-outbreak-security-resources/2025-05-07T12:17:12-04:00weekly0.7/security-news/security-topics/jumpstart-your-dei-culture/2023-11-06T16:47:44-05:00weekly0.7/security-news/security-topics/mass-protest-and-civil-unrest/2023-11-06T16:46:06-05:00weekly0.7/certification/why-get-certified/safety-act-designation/2018-06-13T13:29:17-04:00weekly0.7/membership/asis-membership/transitioning-le--mil/2023-06-20T16:57:28-04:00weekly0.7/membership/asis-membership/emerging-markets/2025-07-28T10:46:04-04:00weekly0.7/es/membership/asis-membership/que-es-asis-international/2019-04-02T12:12:26-04:00weekly0.6/es/membership/asis-membership/haste-miembro-de-asis/2021-10-13T13:19:01-04:00weekly0.6/about-asis/communities/introduction/2024-09-19T16:27:00-04:00weekly0.7/about-asis/communities/women-in-security/2025-07-21T13:05:53-04:00weekly0.7/about-asis/communities/nextgen/2025-07-21T13:05:45-04:00weekly0.7/about-asis/asis-foundation/foundation-scholarships-and-grants/2025-01-28T17:26:47-05:00weekly0.7/about-asis/asis-foundation/about-the-foundation/2024-01-29T16:55:00-05:00weekly0.7/about-asis/asis-foundation/covid-19-resiliency-research/2020-04-30T09:58:48-04:00weekly0.7/about-asis/asis-foundation/asis-foundation-research/2025-11-19T16:38:37-05:00weekly0.7/about-asis/asis-foundation/security-convergence-and-business-continuity-reflecting-on-the-pandemic-experience-executive-summary/2022-11-04T14:48:53-04:00weekly0.7/about-asis/asis-foundation/asis-foundation-sponsorship-opportunities/2025-03-21T14:05:00-04:00weekly0.7/about-asis/awards--scholarships/livestream/2025-09-22T16:27:44-04:00weekly0.7/security-news/news/in-the-news/2019-10-09T09:24:39-04:00weekly0.7/security-news/news/security-experts-asis-tv/2018-04-05T12:15:25-04:00weekly0.7/security-news/news/asis-tv/2021-09-24T20:31:57-04:00weekly0.7/security-news/standards-guidelines/international-standards-development/2019-11-18T15:24:02-05:00weekly0.7/security-news/standards-guidelines/security-awareness-standard/2023-09-22T10:25:04-04:00weekly0.7/security-news/standards-guidelines/sa-program-policy-template/2021-04-12T12:50:27-04:00weekly0.7/security-news/standards-guidelines/business-continuity-management-guideline/2023-09-22T10:24:50-04:00weekly0.7/security-news/standards-guidelines/information-asset-protection/2023-06-29T16:42:46-04:00weekly0.7/security-news/standards-guidelines/physical-asset-protection/2023-09-22T10:27:06-04:00weekly0.7/security-news/standards-guidelines/workplace-violence/2023-09-22T10:27:17-04:00weekly0.7/security-news/standards-guidelines/standards-guidelines-toolkit/2022-02-17T10:18:24-05:00weekly0.7/security-news/standards-guidelines/preemployment-background-screening-vetting/2023-09-22T10:26:27-04:00weekly0.7/security-news/standards-guidelines/senior-security-executive/2023-09-22T10:26:40-04:00weekly0.7/security-news/standards-guidelines/management-system-for-quality-private-security-company-operations/2023-09-22T10:26:54-04:00weekly0.7/security-news/standards-guidelines/cannabis-security-standard/2024-04-04T16:25:03-04:00weekly0.7/security-news/standards-guidelines/security-risk-assessment-standard/2024-06-03T15:47:17-04:00weekly0.7/security-news/standards-guidelines/investigations-standard/2025-06-10T15:24:22-04:00weekly0.7/security-news/standards-guidelines/school-security-standard/2025-08-18T10:22:39-04:00weekly0.7/security-news/standards-guidelines/executive-protection-standard/2025-09-23T08:30:20-04:00weekly0.7/membership/member-impact-stories/cso-center/2019-04-19T11:08:20-04:00weekly0.7/membership/member-impact-stories/crisis-management/2018-01-11T21:52:33-05:00weekly0.7/membership/member-impact-stories/Education/2018-01-11T21:02:40-05:00weekly0.7/membership/member-impact-stories/volunteering/2018-03-08T11:57:23-05:00weekly0.7/membership/member-impact-stories/best-practices/2018-03-08T14:19:34-05:00weekly0.7/membership/member-impact-stories/career-transition/2018-03-08T16:05:20-05:00weekly0.7/membership/member-impact-stories/crisis-management-bmichelman/2018-03-08T12:22:16-05:00weekly0.7/membership/member-impact-stories/insider-threats/2018-03-08T12:37:04-05:00weekly0.7/membership/member-impact-stories/mentoring/2018-03-08T12:44:46-05:00weekly0.7/membership/member-impact-stories/networking/2018-03-08T12:59:08-05:00weekly0.7/membership/member-impact-stories/getting-involved/2018-03-08T14:13:49-05:00weekly0.7/security-news/press-room/asis-2017-delivers-a-reinvigorated-more-modern-event-experience-in-dallas/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/top-security-organizations-collaborate-to-bring-comprehensive-cybersecurity-education-to-dallas/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/bonnie-michelman-to-receive-asis-women-in-security-council-award/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/Security-Career-Center-to-Offer-Free-Job-Advice-Programming-and-Opportunities-for-Dallas-area-Professionals.aspx/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-2018-commission-on-standards-and-guidelines/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/ASIS-2018-CFP/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-middle-east-2017-addresses-securing-economic-diversification/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-2018-leadership-team-results-of-board-of-directors-election/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/global-security-expo-to-draw-20000-security-pros-to-dallas-sept.-25-28/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-statement-on-las-vegas-tragedy/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/sap-futurist-tom-raftery-to-keynote-asis-europe-2018/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-launches-new-website-and-online-community/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/registration-open-for-asis-international--28th-new-york-city-security-conference-and-expo/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/Revealing-Global-Security-Exchange/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-report-addresses-archaeological-site-security/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-internationals-annual-event-is-now-the-global-security-exchange/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-commends-stop-school-violence-legislation/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/johnson-controls-and-asis-confirm-their-long-term-relationship/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-reg-open/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-security-guy-radiotv-announce-livestream-agreement/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-and-verticalxchange-announce-event-partnership/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-now-accepting-applications-for-q2-2018-scholarships-and-grants/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/jp-morgan-crisis-management-nyc-2018/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-unveils-record-breaking-education-program-for-global-security-exchange/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/ai-and-machine-learning-focus-of-asis-sponsored-panel-session/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/fareed-zakaria-scott-klososky-to-kick-off-gsx-keynote-lineup/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/global-security-exchange-now-accepting-applications-for-2018-innovative-product-awards/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/GSX-Exhibit-Hall-to-Spotlight-Innovations-Trends-Shaping-Security/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/cyber-security-summit-coming-to-gsx/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-achieves-category-a-liaison-status-to-isotc-292/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/new-research-reveals-intelligent-building-security-risks-vulnerabilities-and-mitigation-strategies/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-webinar-addresses-safety-act-and-the-mgm-lawsuit/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/school-security-the-focus-of-2018-security-cares-program/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/bradley-d.-spacy-and-k.t.-mcfarland-announced-for-global-security-exchange-keynote-lineup/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/global-security-exchange-x-learning-stages-to-address-intersection-of-ai-blockchain-robotics-and-wearables/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/five-technological-forces-disrupting-security-is-asis-security-industry-book-of-the-year/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-kicks-off-rebranded-global-security-exchange-gsx-conference-in-las-vegas-an-event-like-no-other/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-internationals-gsx-takes-the-security-industry-by-storm/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/record-breaking-$2-billion-afwerx-challenge-announcement-made-at-global-security-exchange/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-leads-the-way-in-security-innovation-attracting-20000-global-registrants/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/susan-carioti-appointed-director-at-large-to--american-national-standards-institute-board/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gayle-rosnick-appointed-board-chair-of-certification-network-group/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-publishes-new-guideline-for-selection-and-training-of-private-security-officers/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-adds-245th-global-chapter/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-awards-first-associate-protection-professional-app-certifications/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/general-john-f.-kelly-to-present-keynote-address-at-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-expansive-education-program-for-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-supporting-organizations-and-media-partners-for-2019-gsx/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-and-the-french-gendarmerie-officers-academy-eogn-forge-new-strategic-partnership-as-part-of-the-security-management-mba-program/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-lineup-of-world-class-keynote-speakers-for-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/soft-target-hardening-named-2019-asis-security-industry-book-of-the-year/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-recipients-of-gsx-2019-innovative-product-awards/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-cares-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-new-keynote-speaker-for-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/new-game-changer-sessions-spotlight-disruptive-technologies-and-topics-at-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/global-access-live-provides-live-streaming-of-education-from-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/dewitt-clinton-school-grant/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-celebrates-its-2019-scholarship-and-grant-recipients/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-publishes-revised-standard-for-private-security-company-conformity-assessment/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-releases-new-enterprise-security-risk-management-esrm-guideline/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-appointments-to-its-2020-global-board-of-directors/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-honors-2019-security-leadership-and-service/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2019-the-worlds-premier-security-conference-opens-in-chicago/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-show-floor-opens-with-more-than-550-exhibitors-and-innovative-disruption-district/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-celebrated-military-and-law-enforcement--appreciation-day-at-gsx-2019/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2019-wrap-up-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/new-asis-foundation-research-explores-the-state-of-security-convergence/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-industry-association-and-asis-international-form-new-partnership/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/global-security-exchange-2020-transitions-to-fully-virtual-gsx/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/general-stan-mcchrystal-to-deliver-keynote-address/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-expansive-education-program-for-gsx/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-remote-proctoring-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-management-named-2020-magazine-of-the-year/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsxplus-opening-day-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2020-ipa-intrusion-shield/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2020-innovative-virtual-forum-proves-to-be-a-success-attracting-thousands-of-global-participants/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/the-loss-prevention-foundation-and-asis-international-join-forces-to-launch-new-certificate-course----essentials-of-retail-asset-protection/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/sia-and-asis-international-to-hold-diversity-equity-and-inclusion-event-for-security-industry/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-2021-global-board-of-directors/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-and-asw-bundesverband-promote-international-networking-in-security/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-awards-more-than-100-covid-19-support-grants/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-update/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-wins-the-first-quarter-2021-communitas-award-for-excellence-in-community-service-organization-community-service/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-registration-launch/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/poa-refresh/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-robust-programming-for-its-hybrid-global-security-exchange-gsx-2021-experience/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/critical-infrastructure-risk-assessment-wins-2021-asis-security-book-of-the-year-award/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-keynotes-and-game-changer-sessions-to-equip-security-professionals-with-strategies-to-address-an-ever-changing-landscape/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-monday-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-tuesday-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-wednesday-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2021-post-show-release/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-2022-board-appointments/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-registration-launch/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-education-launch/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/principles-of-emergency-management-and-emergency-operations-centers-wins-2022-asis-security-book-of-the-year-award/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2022-asis-awards-of-excellence/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-monday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-tuesday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-wednesday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2022-post-show/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2023-board-appointments/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-and-the-clarity-factory-release-dei-research-report/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-sia-security-leadher-event/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/program-announced-for-2023-security-leadher-conference/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-leadher-wraps-groundbreaking-inaugural-conference-for-women-in-security/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/code-black-wins-2023-asis-security-book-of-the-year-award/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2023-asis-awards-of-excellence/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/ASIS-and-SIA-announce-2024-security-leadher/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2023-monday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2023-tuesday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2023-wednesday/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2023-wrap-up/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/annual-international-public-law-enforcement-private-security-partnership-day-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-board-appointments/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-security-leadher-call-for-proposals/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/cannabis-security-standard/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-and-sia-release-complexities-in-the-global-security-market-2024-through-2026/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-in-symphony-in-vienna-at-sell-out-asis-europe-2024/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-security-leadher-conference-lineup/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2024-keynotes-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/security-risk-assessment-standard/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-foundation-releases-autonomous-vehicles-research/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2024-education-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/william-tenney-named-ceo/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-security-leadher-concludes/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-leadership-change-in-editorial-role/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-asis-awards-of-excellence/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2024-opens-in-orlando/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/day-two-at-gsx-2024/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-celebrates-mlead-at-gsx-2024/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2024-wrap-up/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-inaugural-asia-pacific-regional-board/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-and-ipsb-sign-memorandum-of-understanding/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-2025-latin-america-caribbean-regional-board/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-anuncia-la-junta-regional-de-america-latina-y-el-caribe-2025/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2025-call-for-proposals-reviewers/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-announces-2025-leadership/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2024-security-leadher-opens-call-for-speakers-and-registration-2025/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-long-island-chapter-celebrates-public-private-partnerships/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2025-security-leadher-conference-program-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2025-education-programming-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/2025-security-leadher-conference-closes/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-introduces-new-investigations-standard/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2025-keynotes-announced/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-introduces-pioneering-ansi-approved-school-security-standard/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-its-2025-asis-awards-of-excellence-recipients/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-internationals-2025-latam--ca-integral-security-congress-draws-record-attendance-in-mexico-city/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-introduces-groundbreaking-executive-protection-standard/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/gsx-2025-opens-in-new-orleans/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/day-two-at-gsx-artificial-intelligence-school-security-and-more/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-celebrates-military-and-law-enforcement-day-at-gsx-2025/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-celebrates-its-70th-anniversary-and-concludes-gsx-2025-attracting-registrants-from-95-nations/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-launches-call-for-proposals-and-reviewers-for-global-security-exchange-gsx-2026/2025-12-10T12:33:25-05:00weekly0.7/security-news/press-room/asis-international-announces-its-2026-global-regional-boards/2025-12-15T10:31:43-05:00weekly0.7/membership/cso-center/cso-membership-qualifications/2022-09-22T16:32:43-04:00weekly0.7/membership/cso-center/2021-cso-executive-summary/2021-10-12T13:21:25-04:00weekly0.7/membership/cso-center/cso-executive-summary-2021-e-book/2021-10-12T19:58:00-04:00weekly0.7/membership/cso-center/cso-center-recruitment-toolkit/2025-05-13T16:26:21-04:00weekly0.7/membership/cso-center/welcome-cso-member/2024-11-27T11:08:52-05:00weekly0.7/membership/cso-center/cso-ambassador-toolkit/2023-02-07T11:21:42-05:00weekly0.7/membership/cso-center/CSOCenterExecutiveSummary2022/2022-08-04T14:37:23-04:00weekly0.7/membership/cso-center/cso-center-development-pyramid/2023-11-01T11:57:24-04:00weekly0.7/membership/cso-center/cso-center-board/2025-06-03T14:43:55-04:00weekly0.7/membership/cso-center/2023csocenterexecutivesummary/2023-11-30T13:50:24-05:00weekly0.7/membership/cso-center/2024CSOSecureHorizons/2025-01-13T11:16:26-05:00weekly0.7/membership/cso-center/2025csosecurehorizons/2025-11-13T14:45:29-05:00weekly0.7/membership/member-get-a-member/recruitment-tips/2020-02-28T10:28:56-05:00weekly0.7/membership/member-get-a-member/email-template/2020-02-28T10:28:37-05:00weekly0.7/membership/member-get-a-member/social-media/2020-03-04T09:34:26-05:00weekly0.7/membership/member-get-a-member/leaderboard/2019-07-08T14:07:28-04:00weekly0.7/security-news/blog/congratulations-to-our-newly-board-certified-security-practitioners/2025-12-02T16:03:06-05:00weekly0.7/security-news/blog/important-changes-to-certification-policies-and-procedures/2018-03-02T09:20:56-05:00weekly0.7/security-news/blog/blog-rss/2025-12-23T07:31:21-05:00weekly0.7/security-management-magazine/monthly-issues/archive/2025-12-15T08:49:57-05:00weekly0.7/security-management-magazine/monthly-issues/download-issues/2024-07-16T11:45:18-04:00weekly0.7/security-management-magazine/monthly-issues/podcasts/2025-12-01T10:24:22-05:00weekly0.7/security-management-magazine/resources/writers-guidelines/2025-11-20T08:58:03-05:00weekly0.7/security-management-magazine/resources/best-practices/2022-12-06T17:14:01-05:00weekly0.7/security-management-magazine/resources/about-sm/2024-12-19T09:45:53-05:00weekly0.7/security-management-magazine/resources/our-authors/2024-07-17T14:12:52-04:00weekly0.7/security-management-magazine/resources/advertise/2025-09-17T11:38:03-04:00weekly0.7/security-management-magazine/resources/sign-up-for-sm7-newsletter/2025-01-08T14:26:10-05:00weekly0.7/security-management-magazine/resources/advertise-archives/2024-08-29T13:00:49-04:00weekly0.7/security-management-magazine/Topics/cybersecurity/2024-03-05T15:48:16-05:00weekly0.7/security-management-magazine/Topics/leadership-management/2022-12-08T16:30:10-05:00weekly0.7/security-management-magazine/Topics/physical-security/2022-12-08T16:44:39-05:00weekly0.7/security-management-magazine/Topics/strategic-security/2022-12-08T16:42:38-05:00weekly0.7/security-management-magazine/Topics/active-assailant/2023-11-07T15:36:17-05:00weekly0.7/security-management-magazine/latest-news/sm-homepage/2025-12-22T18:47:43-05:00weekly0.7/security-management-magazine/latest-news/today-in-security/2024-01-26T11:08:48-05:00weekly0.7/security-management-magazine/latest-news/sm-daily/2021-11-04T16:17:10-04:00weekly0.7/security-management-magazine/latest-news/online-exclusives/2023-02-21T16:50:54-05:00weekly0.7/security-management-magazine/latest-news/rss-feed---security-management/2025-12-23T09:12:08-05:00weekly0.7/security-management-magazine/latest-news/security-management-features/2023-01-06T14:31:16-05:00weekly0.7/security-management-magazine/latest-news/rss-feed---gsx-daily/2025-10-02T08:05:42-04:00weekly0.7/about-asis/global-and-regional-governance/1core-values-and-competencies/2021-05-26T16:47:17-04:00weekly0.7/about-asis/global-and-regional-governance/4gbod-candidate-interest-info/2025-06-10T16:39:46-04:00weekly0.7/about-asis/global-and-regional-governance/nom-comm-candidate-interest-info/2025-06-10T16:40:02-04:00weekly0.7/about-asis/global-and-regional-governance/asis-international-nominating-committee-candidates/2020-09-16T00:00:10-04:00weekly0.7/security-news/esrm/esrm-survey-complete/2019-03-15T13:07:06-04:00weekly0.7/professional-development/career-hq/career-resources/2024-02-12T12:06:36-05:00weekly0.7/professional-development/career-hq/download-gsx-2024-career-compendium/2024-12-10T14:32:14-05:00weekly0.7/security-news/code-of-ethics-and-code-of-conduct/code-of-ethics/2023-08-02T17:40:21-04:00weekly0.7/security-news/code-of-ethics-and-code-of-conduct/code-of-conduct/2023-08-31T14:52:16-04:00weekly0.7/security-news/publications/sm-workplace-violence-ebook/2024-04-01T14:07:37-04:00weekly0.7/security-news/publications/fostering-a-security-awareness-culture-ebook/2020-10-13T13:43:15-04:00weekly0.7/security-news/publications/security-guidance-for-reopening-facilities/2020-11-04T13:22:06-05:00weekly0.7/security-news/publications/the-state-of-security-convergence/2020-11-04T13:27:24-05:00weekly0.7/security-news/publications/sm-workplace-violence-prevention/2020-11-04T13:33:33-05:00weekly0.7/security-news/publications/top-security-trends/2021-01-11T15:52:18-05:00weekly0.7/security-news/publications/advancing-your-security-career-form/2021-04-13T16:31:56-04:00weekly0.7/security-news/publications/advancing-your-security-career-ebook/2020-12-09T10:27:59-05:00weekly0.7/security-news/publications/special-watch-security-officers-form/2021-01-12T11:11:34-05:00weekly0.7/security-news/publications/fostering-a-security-awareness-culture/2021-02-05T17:04:28-05:00weekly0.7/security-news/publications/protection-of-assets-poa/2023-05-12T16:15:47-04:00weekly0.7/security-news/publications/training-security-guards-to-identify-sex-trafficking-victims/2021-04-16T13:03:26-04:00weekly0.7/security-news/publications/mitigating-rising-risks-for-high-rises/2021-04-16T13:11:18-04:00weekly0.7/security-news/publications/best-practices-transportation-security/2021-04-16T13:17:30-04:00weekly0.7/security-news/publications/risk-assessment-approaches-for-the-reopening-of-cultural-and-heritage-venues/2021-04-16T13:17:17-04:00weekly0.7/security-news/publications/securing-your-organizations-most-vulnerable-asset-information/2021-06-03T12:30:59-04:00weekly0.7/security-news/publications/securing-your-organizations-most-vulnerable-asset-information-ebook.pdf/2021-06-21T10:48:55-04:00weekly0.7/security-news/publications/the-trouble-with-technology/2021-06-29T15:51:53-04:00weekly0.7/security-news/publications/assessing-extremism-and-risk/2021-09-08T12:18:31-04:00weekly0.7/security-news/publications/five-signs-that-your-organization-could-use-esrm/2021-10-06T11:47:36-04:00weekly0.7/security-news/publications/download-five-signs/2021-10-14T11:49:48-04:00weekly0.7/security-news/publications/assessing-extremism-and-risk-e-book/2022-01-31T11:55:07-05:00weekly0.7/security-news/publications/securitys-role-in-finding-and-keeping-a-high-functioning-workforce/2022-01-31T12:08:00-05:00weekly0.7/security-news/publications/cpp-study-manual-landing/2022-02-14T14:23:20-05:00weekly0.7/security-news/publications/a-brief-guide-to-esrm-implementation/2022-03-23T11:14:46-04:00weekly0.7/security-news/publications/making-the-most-of-mentorship/2022-03-23T11:17:49-04:00weekly0.7/security-news/publications/weapons-in-the-workplace/2022-03-23T11:20:01-04:00weekly0.7/security-news/publications/the-state-of-security-management/2022-04-15T12:35:27-04:00weekly0.7/security-news/publications/download-how-to-perform-a-cybersecurity-risk-assessment/2023-01-13T12:54:49-05:00weekly0.7/security-news/publications/how-to-perform-a-cybersecurity-risk-assessment/2023-01-13T12:54:44-05:00weekly0.7/security-news/publications/how-to-use-the-hacker-mentality-for-good/2023-11-01T16:46:04-04:00weekly0.7/security-news/publications/cannabis-security-a-field-of-opportunity/2023-11-01T16:45:55-04:00weekly0.7/security-news/publications/security-trends-for-2023/2023-08-01T11:55:42-04:00weekly0.7/security-news/publications/physical-securitys-tech-revolution/2023-08-01T11:58:28-04:00weekly0.7/security-news/publications/how-ai-is-changing-cybersecurity-jobs/2024-10-25T13:26:25-04:00weekly0.7/membership/member-challenge/contest-rules/2025-01-31T10:10:32-05:00weekly0.7/membership/asis-in-europe/european-chapter-directory/2025-01-13T11:21:33-05:00weekly0.7/x---sm-testing/gsx-show-daily/urbanization-poses-security-challenges/2020-06-23T19:53:07-04:00weekly0.7/x---sm-testing/gsx-show-daily/save-the-date-for-gsx-2020/2020-06-23T19:53:08-04:00weekly0.7/x---sm-testing/gsx-show-daily/Securitys-take-on-privacy-protections/2020-06-23T19:53:08-04:00weekly0.7/x---sm-testing/gsx-show-daily/Great-Managers-Trump-All/2020-06-23T19:53:08-04:00weekly0.7/x---sm-testing/gsx-show-daily/deaths-fall-but-the-right-wing-rises/2020-06-23T19:53:09-04:00weekly0.7/x---sm-testing/gsx-show-daily/Security-Positive/2020-06-23T19:53:09-04:00weekly0.7/x---sm-testing/gsx-show-daily/GSX-Attendees-Get-Head-Start-on-Education-in-Chicago/2020-06-23T19:53:10-04:00weekly0.7/x---sm-testing/gsx-show-daily/The-GSX-2019-Exhibit-Hall-An-Interactive-Learning-Lab/2020-06-23T19:53:10-04:00weekly0.7/x---sm-testing/gsx-show-daily/OSullivan-Shares-Secrets-to-Her-Success/2020-06-23T19:53:10-04:00weekly0.7/x---sm-testing/gsx-show-daily/Bremmer-Warns-of-Geopolitical-Recession/2020-06-23T19:53:11-04:00weekly0.7/x---sm-testing/gsx-show-daily/education-sessions-focus-on-explosives-and-management-best-practices/2020-06-23T19:53:11-04:00weekly0.7/x---sm-testing/gsx-show-daily/Propel-Your-Career-with-ASIS-Career-HQ/2020-06-23T19:53:12-04:00weekly0.7/x---sm-testing/gsx-show-daily/members-engage-leaders-in-town-hall/2020-06-23T19:53:13-04:00weekly0.7/x---sm-testing/gsx-show-daily/grant-funds-security-upgrades-at-chicago-school/2020-06-23T19:53:13-04:00weekly0.7/x---sm-testing/gsx-show-daily/general-sessions/2020-06-23T19:53:14-04:00weekly0.7/x---sm-testing/gsx-show-daily/esrm-effort/2020-06-23T19:53:14-04:00weekly0.7/x---sm-testing/gsx-show-daily/enhancing-education/2020-06-23T19:53:15-04:00weekly0.7/x---sm-testing/gsx-show-daily/asis-advances/2020-06-23T19:53:15-04:00weekly0.7/x---sm-testing/gsx-show-daily/security-cares/2020-06-23T19:53:16-04:00weekly0.7/x---sm-testing/gsx-show-daily/hey-chicago/2020-06-23T19:53:17-04:00weekly0.7/explore-member-benefits/start-here/2025-06-23T13:48:52-04:00weekly0.8/explore-member-benefits/explore-member-benefits/2025-09-19T13:42:43-04:00weekly0.8/global-events/global-events/2025-12-22T13:38:56-05:00weekly0.8/global-events/secure-horizons-an-immersive-experience-for-senior-security-executives/2025-11-03T15:36:33-05:00weekly0.8/security-management-magazine/sm-site-settings/2024-04-09T13:20:24-04:00weekly0.8/login/access-denied/2018-01-23T15:13:42-05:00weekly0.8/membership/join/2025-12-01T14:55:56-05:00weekly0.8/membership/asis-membership/2023-04-12T14:12:58-04:00weekly0.8/membership/member-impact-stories/2019-06-28T11:32:29-04:00weekly0.8/membership/cso-center/2025-06-26T12:36:22-04:00weekly0.8/membership/myasis-feed/2019-05-03T09:40:01-04:00weekly0.8/membership/member-get-a-member/2021-08-27T09:24:06-04:00weekly0.8/membership/student-membership/2025-06-23T13:52:11-04:00weekly0.8/membership/leadership-exchange/2022-12-02T10:14:02-05:00weekly0.8/membership/myasis-stories/2025-06-23T13:52:18-04:00weekly0.8/membership/member-appreciation/2025-04-11T14:03:37-04:00weekly0.8/membership/asis-in-europe/2025-06-23T13:52:23-04:00weekly0.8/membership/branding-guidelines/2024-12-03T15:46:18-05:00weekly0.8/membership/promote-your-involvement/2025-12-08T15:42:37-05:00weekly0.8/membership/shared-successes/2021-02-04T13:28:23-05:00weekly0.8/membership/member-challenge/2025-08-14T18:31:57-04:00weekly0.8/membership/cso-center-leadership-series-2021/2022-02-17T10:43:47-05:00weekly0.8/membership/social-media-toolkit/2021-08-13T12:40:13-04:00weekly0.8/membership/asis-hub-2021/2021-09-16T11:44:32-04:00weekly0.8/membership/cso-center-leadership-series/2022-04-14T11:34:33-04:00weekly0.8/membership/renew/2025-06-23T13:51:59-04:00weekly0.8/membership/chapter-onboarding-toolkit/2025-03-06T13:40:52-05:00weekly0.8/membership/membership-invitation/2025-07-16T10:29:05-04:00weekly0.8/membership/elevate-your-expertise-in-security/2025-03-25T10:47:54-04:00weekly0.8/certification/why-get-certified/2024-03-21T17:54:29-04:00weekly0.8/certification/certified-protection-professional-cpp/2025-07-01T15:20:21-04:00weekly0.8/certification/professional-certified-investigator-pci/2025-07-01T15:20:42-04:00weekly0.8/certification/physical-security-professional/2025-07-01T15:20:59-04:00weekly0.8/certification/recertification/2024-04-10T14:31:55-04:00weekly0.8/certification/professional-code-of-conduct/2024-11-15T15:34:14-05:00weekly0.8/certification/certificant-spotlights/2024-03-21T17:54:29-04:00weekly0.8/certification/associate-protection-professional-app/2025-07-01T15:20:32-04:00weekly0.8/certification/apply-for-certification/2025-07-01T15:22:31-04:00weekly0.8/certification/prepare-for-test-day/2025-07-01T15:22:42-04:00weekly0.8/certification/certification-handbook/2024-03-21T17:54:29-04:00weekly0.8/certification/directory-of-preferred-cpe-providers/2025-12-15T16:45:07-05:00weekly0.8/certification/certify-your-security-team/2025-02-25T16:18:14-05:00weekly0.8/certification/preferred-cpe-provider-program/2025-07-01T15:23:06-04:00weekly0.8/certification/pci-test-specifications/2024-03-21T17:54:29-04:00weekly0.8/certification/certification-month/2025-06-26T16:11:51-04:00weekly0.8/security-news/standards-guidelines/2025-06-24T17:19:00-04:00weekly0.8/security-news/security-topics/2025-06-24T17:42:45-04:00weekly0.8/security-news/blog/2025-11-19T09:47:15-05:00weekly0.8/security-news/press-room/2025-12-10T12:33:25-05:00weekly0.8/security-news/account-management/2018-06-21T15:59:01-04:00weekly0.8/security-news/asis-news-blog/2022-02-15T12:22:39-05:00weekly0.8/security-news/esrm-resources-to-help-you-advance/2022-10-27T15:00:05-04:00weekly0.8/security-news/esrm-maturity-model-self-assessment/2022-09-02T14:36:13-04:00weekly0.8/security-news/esrm-maturity-model-self-assessment-tool/2022-10-26T10:08:41-04:00weekly0.8/security-news/2022-asis-international-annual-report/2024-01-29T16:18:30-05:00weekly0.8/security-news/code-of-ethics-and-code-of-conduct/2024-01-05T16:01:30-05:00weekly0.8/security-news/security-issues-research/2025-11-20T10:13:13-05:00weekly0.8/security-news/2023-asis-international-annual-report/2025-01-28T09:30:33-05:00weekly0.8/security-news/2023-asis-international-reporte-anual/2025-01-28T09:30:38-05:00weekly0.8/security-news/asis-sia-joint-economic-study/2025-11-20T10:12:30-05:00weekly0.8/security-news/GSX-Speaker-Guide/2025-05-12T10:59:47-04:00weekly0.8/security-news/Volunteers-Speaker-Guide/2025-05-12T11:00:02-04:00weekly0.8/security-news/asis-sia-industry-study-nonmembers/2024-07-25T14:02:02-04:00weekly0.8/security-news/2024-asis-annual-report/2025-06-24T17:54:28-04:00weekly0.8/security-news/2024-asis-reporte-anual/2025-06-24T17:54:34-04:00weekly0.8/security-news/security-research/2025-11-20T10:12:38-05:00weekly0.8/professional-development/education/2025-10-24T10:51:19-04:00weekly0.8/professional-development/career-hq/2025-08-11T10:52:43-04:00weekly0.8/professional-development/essentials-of-retail-asset-protection-certificate-course/2024-01-19T16:24:48-05:00weekly0.8/professional-development/security-industry-career-pathways-guide/2024-01-19T16:24:48-05:00weekly0.8/professional-development/certificate-courses/2025-06-23T13:58:24-04:00weekly0.8/professional-development/essentials-of-enterprise-security-risk-management-esrm-certificate-course/2024-01-19T16:24:48-05:00weekly0.8/professional-development/essentials-of-executive-protection-certificate-course/2024-01-19T16:24:48-05:00weekly0.8/professional-development/military-to-civilian-career-mapping-army/2025-09-23T16:56:50-04:00weekly0.8/professional-development/enterprise-security-solutions/2025-07-01T15:26:25-04:00weekly0.8/professional-development/military-to-civilian-career-mapping-usaf/2025-09-23T16:55:14-04:00weekly0.8/professional-development/military-to-civilian-career-mapping-navy/2025-09-23T16:56:21-04:00weekly0.8/professional-development/security-solutions-spotlight-retail-security/2024-10-30T13:08:41-04:00weekly0.8/professional-development/law-enforcement-to-civilian-career-map-federal/2025-09-23T16:56:38-04:00weekly0.8/professional-development/asis-partner-programs/2024-10-30T13:08:05-04:00weekly0.8/professional-development/security-solutions-spotlight-schools-campuses/2025-05-09T10:40:09-04:00weekly0.8/professional-development/operation-career-change/2025-09-23T16:58:41-04:00weekly0.8/professional-development/law-enforcement-to-civilian-career-map-metropolitan/2025-09-23T16:55:50-04:00weekly0.8/professional-development/military-to-civilian-career-map-uscg/2025-09-23T16:55:27-04:00weekly0.8/professional-development/security-solutions-spotlight-healthcare-security/2025-11-07T15:07:48-05:00weekly0.8/professional-development/operation-career-change-partner-toolkit/2025-09-23T17:25:53-04:00weekly0.8/professional-development/operation-career-change-usmc/2025-10-30T12:38:25-04:00weekly0.8/professional-development/operation-career-change-british-army/2025-12-02T11:06:58-05:00weekly0.8/about-asis/get-involved/2025-06-24T10:53:43-04:00weekly0.8/about-asis/chapters/2025-06-24T10:56:18-04:00weekly0.8/about-asis/communities/2025-06-24T10:54:31-04:00weekly0.8/about-asis/asis-foundation/2025-10-08T12:10:28-04:00weekly0.8/about-asis/awards--scholarships/2025-10-09T13:40:45-04:00weekly0.8/about-asis/about-asis-international/2025-08-27T16:59:44-04:00weekly0.8/about-asis/government-relations/2021-01-06T10:22:03-05:00weekly0.8/about-asis/global-and-regional-governance/2025-08-07T14:15:21-04:00weekly0.8/about-asis/strategic-plan/2025-06-24T10:55:34-04:00weekly0.8/about-asis/public-private-partnerships-p3-day/2025-06-24T10:55:23-04:00weekly0.8/about-asis/asis-news-and-updates/2024-08-09T10:21:22-04:00weekly0.8/about-asis/securitas/2025-06-11T16:19:44-04:00weekly0.8/footer-pages/contact-us/2021-02-22T09:54:43-05:00weekly0.8/footer-pages/privacy-policy/2020-07-16T09:34:56-04:00weekly0.8/footer-pages/executive-leadership/2018-02-23T12:41:56-05:00weekly0.8/footer-pages/past-presidents/2025-04-10T13:41:01-04:00weekly0.8/footer-pages/access-denied/2019-01-16T12:18:20-05:00weekly0.8/footer-pages/site-maintenance/2020-02-27T15:11:41-05:00weekly0.8/footer-pages/rasa-test/2020-09-29T11:17:00-04:00weekly0.8/footer-pages/antitrust-compliance/2022-09-07T15:03:13-04:00weekly0.8/x---sm-testing/the-hard-truth-about-soft-skills/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/block-testing/2023-02-27T17:11:51-05:00weekly0.8/x---sm-testing/the-adaptable-leader/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/july-2016-security-management/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/gsx-show-daily/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/test-sm-article/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/rss-test-for-rasa/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/the-effectiveness-of-economic-sanctions-as-a-security-tool/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/milestones-in-the-marathon/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/sm-homepage/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/cyber-landing-page---new/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/CSOCenterExecutiveSummary2022/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/how-to-keep-high-performance-security-teams-motivated/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/mass-events/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/testing-homepage-zyx/2025-02-25T09:47:39-05:00weekly0.8/x---sm-testing/leadership-management/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/resilience-topic-page---testing/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/physical-topic-test/2023-01-18T15:10:34-05:00weekly0.8/x---sm-testing/Career-Transitions-Public-to-Private-Sector/2023-05-12T09:22:50-04:00weekly0.8/x---sm-testing/2024-media-kit/2023-08-17T10:21:51-04:00weekly0.8/x---sm-testing/newsletters/2023-07-28T09:52:37-04:00weekly0.8/adage-testing/featured-content/2022-02-18T14:27:45-05:00weekly0.8/adage-testing/testmarketingpage/2025-03-21T14:02:26-04:00weekly0.8/adage-testing/testmarketingpage2/2021-11-30T14:11:05-05:00weekly0.8/adage-testing/external-link-test/2022-06-07T17:46:44-04:00weekly0.8/adage-testing/external-link---article-test/2022-05-26T15:26:08-04:00weekly0.8/adage-testing/esrm-model-test/2022-08-02T15:41:37-04:00weekly0.8/adage-testing/new-sm-homepage/2023-04-11T18:36:22-04:00weekly0.8/login/2018-01-27T14:37:10-05:00weekly0.9/mainsitesettings/2025-06-26T11:32:47-04:00weekly0.9/search/2023-04-11T17:46:47-04:00weekly0.9/2025-12-23T10:13:08-05:00weekly1