Security zone: opinions and insights from experienced professionals


Security zone: opinions and insights from experienced professionals

Information security has become a mainstream concern with well-established governance and compliance, increasing public awareness and more business processes going online. Security is an integral part of every business process. It must be built into the systems, applications and networks and further protected by physical and managerial controls. Issues of management, accountability and operational strategy are evolving quickly.

To help IT departments navigate some of the challenges, Computer Weekly invited (ISC)2 certified members to share their experience and opinions of current issues. Experienced professionals specialising in the management and or practice of information security, this group has tackled a number of interesting topics. These range from evaluating the business case for standards, assessing metrics, and setting priorities for PCI compliance, to more technical concerns such as securing the database, testing malware products and patching Macs.

IT has a significant consultative as well as administrative role to play in the management of information security. These articles have been developed to help you think through the challenges and influence decision makers. Appearing regularly in Computer Weekly, they are now archived here for your reference.


Business and IT security


Eavesdropping, hacking and malware


Outsourcing and IT security


Regulation, legislation and compliance


Security strategies


Web 2.0 and social networking


(ISC)2 links


Other links

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

This was first published in October 2010


COMMENTS powered by Disqus  //  Commenting policy