Feature

Security zone: opinions and insights from experienced professionals

Information security has become a mainstream concern with well-established governance and compliance, increasing public awareness and more business processes going online. Security is an integral part of every business process. It must be built into the systems, applications and networks and further protected by physical and managerial controls. Issues of management, accountability and operational strategy are evolving quickly.

To help IT departments navigate some of the challenges, Computer Weekly invited (ISC)2 certified members to share their experience and opinions of current issues. Experienced professionals specialising in the management and or practice of information security, this group has tackled a number of interesting topics. These range from evaluating the business case for standards, assessing metrics, and setting priorities for PCI compliance, to more technical concerns such as securing the database, testing malware products and patching Macs.

IT has a significant consultative as well as administrative role to play in the management of information security. These articles have been developed to help you think through the challenges and influence decision makers. Appearing regularly in Computer Weekly, they are now archived here for your reference.

 

Business and IT security

 

Eavesdropping, hacking and malware

 

Outsourcing and IT security

 

Regulation, legislation and compliance

 

Security strategies

 

Web 2.0 and social networking

 

(ISC)2 links

 

Other links


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in October 2010

 

COMMENTS powered by Disqus  //  Commenting policy