As evidenced in this year’s Security 500 report, today’s leading organizations have understood that they cannot operate without Security’s participation. They see the security program as a value advantage. And security leaders, in turn, are creating value across the entire organization and “taming their risk tiger.”
Researchers are urging Maryland voters to check the accuracy of their online voter registration files after warning that the data had been left vulnerable to tampering.
Concerns about voter disenfranchisement and the logistics of providing adequate numbers of photo IDs before the November 6 election were the top reasons Judge Simpson cited for blocking the law.
Attention enterprise security leaders: Biometrics, including face and voice recognition, are not only getting better but better integrated with other security technologies and mobile devices to provide higher security, more convenience or both.
Proper credentialing is a critical element of identity management. In some organizations, however, credentialing may not be automated or integrated into an enterprise-wide identity management system.
In August 2010, the International Association for Healthcare Security & Safety (IAHSS) published a survey of healthcare security executives which revealed an increase in violent crimes within the reporting hospitals.