This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
    • Video Security You Can Trust
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Coronavirus Coverage » Coronavirus Blogs

Coronavirus Blogs
Coronavirus Blogs RSS Feed RSS

SEC0521-Cover_FEAT-MAIN-slide1_1170x878px

Ensuring the security of arts, museums and cultural heritage facilities during lockdown and beyond

A coordinated response effort from museums and cultural heritage institutions enable security directors to continue to ensure the security of their collections and facilities.
Maria Henriquez
May 5, 2021

To maintain a unified security and safety operation during closure, many museums and cultural heritage institutions have relied on tried-and-true security and risk management practices, and repurposed their time and energy to reassess, monitor and explore additional risk-mitigation measures to safely reopen and welcome the public back through their doors.


Read More
stadium

NCS4 announces 2021 National Sports Safety and Security Conference & Exhibition

April 29, 2021
The National Center for Sports Safety and Security (NCS4) team has announced that the 12th Annual National Sports Safety and Security Conference & Exhibition will be held on Nov. 9-10 at the JW Marriott Desert Ridge Resort & Spa in Phoenix. The 2021 conference theme is Reconnect. Reflect. Inspire.
Read More
5 minutes with

5 minutes with Hugh Dunleavy - Duty of care is more critical than ever

Maria Henriquez
April 20, 2021
As we continue into 2021, it's no secret we are still reeling from the aftermath and impacts that 2020 unleashed across the globe. That's why—now more than ever—it is critical that companies prioritize their duty of care plans, or risk falling behind for good. Below, we speak to Hugh Dunleavy, Senior Vice President, U.S. Operations and Chief Security Officer of Crisis24, a GardaWorld company, about crafting a robust duty of care program.
Read More
NECO Main Building

New England College of Optometry implements contact-tracing wearables to boost COVID-response and enable in-person learning

The New England College of Optometry (NECO) formed a COVID-19 Task Force and began exploring ideas to enable in-person learning at the school in a safe, effective and well-planned manner. One of the solutions that NECO implemented is a contact-tracing tool that allows the school to respond immediately to report of an infection, accurately and effectively, without relying on a sign-in sheet or a person’s recollection of their previous contacts.
Maggie Shein
Maggie Shein
April 13, 2021
The New England College of Optometry (NECO) formed a COVID-19 Task Force and began exploring ideas to enable in-person learning at the school in a safe, effective and well-planned manner. One of the solutions that NECO implemented is a contact-tracing tool that allows the school to respond immediately to report of an infection, accurately and effectively, without relying on a sign-in sheet or a person’s recollection of their previous contacts.
Read More
boon edam

The process of future-proofing a secured entrance post-pandemic

kurt measom
Kurt J. Measom
April 13, 2021

From the initial secured entrance to the overarching access control system, the emphasis is currently on contactless access control and door entry solutions. A myriad of technologies from NFC and smart mobile devices to facial biometrics will help play a vital role in what are now COVID-driven essentials. An integrated strategy for access control, along with tailgating mitigation options including turnstiles, revolving doors and mantrap portals enables building security to implement even more comprehensive control and prioritized security while making use of touchless credentials.


Read More
5 mins with Jane Lee

5 minutes with Jane Lee - The fraud supply chain, cyberattacks and more

Maria Henriquez
March 31, 2021
How can consumers and retailers protect themselves against fraud in the coming months? Here, Jane Lee, Trust and Safety Architect at Sift, speaks to Security magazine about this critical issue.
Read More
manufacturing coronavirus

Moving manufacturing back to North America

 Nelson Balido
Nelson Balido
March 30, 2021
China has had a tough 2020. Intellectual property rights infringement, stealing university and U.S. government-funded research, spys routed out in public, Hong-Kong takeover, Human-right abuses, Coronavirus cover-ups, supply-chain bog downs, and the list goes on. The conclusion is that China has lost its luster with businesses in the United States and abroad. These issues are not new; instead, they have reached a boiling point where the international business community is getting leary of putting too many eggs in China’s basket. The U.S. government has certainly done its share to bring many of these things to light. And while this is happening, and companies look elsewhere to move, the possibilities of increasing North America manufacturing has become more attractive than ever.
Read More
5 mins with Coleman

5 minutes with Kelvin Coleman - Remote learning and data privacy issues

Maria Henriquez
March 18, 2021
The education space has become a major target for cybercriminals. In fact, CISA and the FBI recently issued a joint statement warning K-12 schools of worsening dangers in 2021 after a recent 57% spike ransomware attacks in the sector. So, how can teachers and students stay safe? Here, we speak with Kelvin Coleman, Executive Director, National Cyber Security Alliance (NCSA) about how educators and K-12 cybersecurity leaders can better protect students’ privacy during distance learning sessions. 
Read More
video conference

Making videoconferences more secure

The surge in their use has also led to a surge in their abuse. But there are steps you can take to better secure your videoconferences.
Ryan Von Ess
March 17, 2021
Videoconferencing has been around for a surprisingly long time.  In fact, the first call involving both audio and video links has been traced all the way back to 1927 in a call that took place between officials in Washington, DC and the president of AT&T in New York. Although it was laughably primitive by current standards, electronic conferencing technology has never stopped growing in either refinement or use. 
Read More
Coronavirus

Key considerations for contact tracing applications

Janet Jones
Janet Jones
March 12, 2021
While the jury’s out on whether these applications will be an effective tool for contact tracers, or if the majority of citizens will fully embrace these applications, it’s clear that contact tracing will likely become a part of our daily lives. To keep these technologies on the right track, developers, policymakers and stakeholders must ask questions to measure effectiveness, while addressing key issues to prevent abuse and secure consumer data. 
Read More
Previous 1 2 3 4 5 6 7 8 9 … 23 24 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security
    Sponsored byAMAROK LLC

    How an Investment in Security Can Prevent Unplanned Expenses

  • solar enews
    Sponsored byAxis

    Sustainably meeting the security and operational needs of solar farms

  • clouds in sky
    Sponsored byMilestone Systems

    Smaller School Districts are Facing Infrastructure Growing Pains

Popular Stories

Cybersecurity-lock.jpg

47% of all internet traffic came from bots in 2022

criminal-on-laptop.jpg

T-Mobile confirms second data breach in 2023

multicolored text on black screen

ScanSource suffers ransomware attack

globe

Understanding cybersecurity trends and regulations in a global world

drone flies over landscape

Technology hones physical security threat assessments

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 6, 2023

Measure What Matters: The Top 10 Reports Every Security Leader Should Have

Are you ready to elevate your security game and take charge of your data-driven decision-making? As today's industry leaders know, data is key to driving impact and success.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
May 2023 Webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing