The Federal government announced nearly 100 million cloth facial coverings will be sent to the aviation, transit and passenger rail transportation sectors for passenger use.
A new report, COVID-19, Conspiracy and Contagious Sedition: A Case Study on the Militia-Sphere, details how the Militia-sphere’s messaging has grown increasingly extreme as the pandemic has progressed, to the point of threatening and enacting violent attacks.
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?
As a future of remote work comes into focus, IT and security professionals are becoming increasingly aware that employees could unknowingly leave a door open to fraud, cybercrime and more.
A new report by researchers at the Massachusetts Institute of Technology (MIT) and University of Michigan discusses the cybersecurity vulnerabilities associated with OmniBallot, a web-based system for blank ballot delivery, ballot marking and (optionally) online voting.
As the public increases its use of mobile banking apps, partially due to increased time at home due to COVID-19, the FBI anticipates cyber actors will exploit these platforms.
Singapore is reportedly developing a wearable device that may be issued to every resident as a way to facilitate contact tracing during the COVID-19 pandemic. The move, however, has elicited concerns from the public about the lack of privacy associated with contact tracing devices.
Convincing C-suite executives to approve budgets for security system upgrades may be difficult in the best of times. However, the COVID-19 pandemic and resulting financial upheaval it caused may make selling new projects more challenging for security directors. While security may not be a daily topic of discussion among C-suite members, they understand the need to provide and maintain a safe and secure environment for corporate employees and visitors. But they don’t see security in terms of a camera brand or access card technology. They view security in terms of risk management and mitigation strategies. Addressing those concerns in any project plan will increase its chances of it winning approval.