A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.
Even with security information and event management systems, organizations labor to separate normal log data from actionable events, according to the latest Log and Event Management Survey from the SANS Institute.
The web-services protocol developed by the National Institute of Standards and Technology allows desktops, laptops, e-tablets and smartphones to access sensors that capture biometric data such as fingerprints, iris and face images.
Voluntary national standards, including privacy and security guidelines, for health information exchanges are inching forward. Federal authorities soon will seek comments on plans for a Nationwide Health Information Network Governance Rule.