Hand over security

Monday, 10 May 2004, 12:48 PM EST

Physical and information security have been converging, often under the control of IT. But companies are increasingly moving the role of policing security out of IT and into the hands of an independent CSO. Here's why you should consider doing the same.

For 40 years there has been little reason for anything computer related to fall outside ITís command. But that era is coming to an end. The evolving and increasingly important role of information security requires the background of a geek and the instincts of a cop. Information security crashes together two functions: traditional corporate security and IT. The ex-cops over in corporate security who watch the doors and suspicious behaviour are using more and more technology to get their jobs done. And the stakes in an IT security breach have risen so high that IT people who know firewalls but canít fathom the motives of a disgruntled employee are no longer able to protect their companies from what could be serious financial losses, extended network downtime and badly damaged relationships with customers.

By Christopher Koch at CIO.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //