Applications open for 2024 Elliot A. Boxerbaum Award

Applications open for 2024 Elliot A. Boxerbaum Award

Applications are now open for the 2024 Elliot A. Boxerbaum Award for the Security Design Project of the Year. This award given each year for excellence in security design.  This award is given in honor of the late Elliot A. Boxerbaum, MA, CPP, CSC. Boxerbaum was the founder and president of Security Risk Management Consultants, Inc. His professional background involved more than 25 years in security management and nearly 20 years of additional hands-on security consulting. He passed…

Read More

Holistic security design

Holistic security design

Safety and security of people and assets are among the highest priorities for many organizations today. With the prevalence of violent events throughout the United States — active shooter events, assaults, civil unrest, etc. — building owners must plan for the safety of their building and its occupants. To create a safe environment, the security design of a new facility or campus must go beyond basic camera and access control devices to a holistic approach…

Read More

Applications open for 2023 Elliot A. Boxerbaum Award

Applications open for 2023 Elliot A. Boxerbaum Award

Applications open for 2023 Elliot A. Boxerbaum Award | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How security technology can support prison systems

How security technology can support prison systems

How security technology can support prison systems | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

ADRM receives 2022 Elliot A. Boxerbaum Award for security design

ADRM receives 2022 Elliot A. Boxerbaum Award for security design

ADRM receives 2022 Elliot A. Boxerbaum Award for security design | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

AMA: Security Architect Edition — Joel Dunning

AMA: Security Architect Edition — Joel Dunning

AMA: Security Architect Edition — Joel Dunning | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Can technology alone enhance school security programs?

Can technology alone enhance school security programs?

<!– Can technology alone enhance school security programs? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Pamela Perini: The process of risk assessment

5 minutes with Pamela Perini: The process of risk assessment

5 minutes with Pamela Perini: The process of risk assessment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More