Integrated security solutions, combining human expertise with technology, not only enhance security operations but also yield significant (and surprising) business value.
Read MoreSince digital payments and cash have similar environmental impacts, supporting one or the other is an unwise strategy to make payment systems more environmentally friendly. Indeed, tilting in one direction or the other can create an infrastructure imbalance that makes things worse.
Read MoreThe need to ensure that cash is maintained as a viable payment method is being advocated by civil society organizations, ordinary citizens, and—increasingly—by legislative bodies.
Read MoreWhen crafting innovative approaches to social challenges from urbanization, public officials should consider research that proves private security is an effective supplement to public police, including for deterring crime, helping individuals in need, and controlling disorder.
Read MoreEvidenced by communication failures that nearly ended in Trump’s assassination, joint security arrangements require specific attention to coordinating activities, including development of a common vision, process standardization, joint training initiatives, and internal and external communication.
Read MoreThe Ligue’s review of Government Transparency Institute data suggests that public tendering for guard services must substantially improve, as practices in those tenders are worse than in tenders for comparable services.
Read MoreFinancial analysts say they are encouraged by what they see regarding business opportunities and financial activity in the physical security industry. This article examines financial activity in the security industry and highlights key trends to look for moving forward. (This article was originally published in 2023 and has been updated.)
Read MoreWhen asked to identify the most significant global risks facing the world in the next two years, experts rank cyber insecurity fourth—more worrisome than interstate armed conflict and inflation. But while most of the focus on cyber risks is on digital tools and technological one upmanship, people remain a consistent threat to government and business information and intellectual property. Because malicious insiders often act within a normal range of their duties, prevention requires a holistic security approach.
Read MoreAll the old reasons for employee deviance still exist today. But there are new reasons for it, too, including less loyalty being exchanged between workers and their employers, a growing mindset of entitlement among younger workers, and greater opportunities to profit from dishonesty.
Read MoreEvolving international issues are impacting the security of supply lines, requiring organizations to integrate security throughout supply chain activities. But which solutions yield business value beyond protection?
Read MoreCompany security leaders—as a group—do an insufficient job promoting the value of their function, according to research. Security’s full range of benefits are still largely unrecognized. What should security leaders do to change that?
Read MoreSome service providers count on consumers to skip due diligence when contracting for services, which results in lower quality work and more consumer complaints. Here is how that plays out in the security sector and what organizations should do to be more informed security consumers.
Read MoreA new study on the scope and breadth of the global physical security sector indicates the industry is vibrant market, has regional variations, and includes a few surprises.
Read MoreFrom Melbourne to Hyderabad, citizens are voicing objections to curtailing the freedom to pay in cash
Read MoreA 40-year-old man went on a stabbing rampage April 13 at a crowded shopping mall in the suburbs of Sydney, Australia, underscoring the challenge of predicting and preventing random attacks in spaces open to the public. What can “soft targets” do?
Read MoreSecurity officer quality takes center stage at the most critical of times, from disruptions at shareholder meetings to campus protests. Managed correctly, such events may be quickly forgotten. Handled poorly, and they can gain media attention and do lingering damage to an organization’s reputation.
Read More