Security consultants - Help! I need somebody

clock

Who can you trust with your company's security? Are external experts, even hackers, a viable option? Sally Whittle finds out.

GIVING outsiders access to your systems and confidential data requires a huge leap of faith - and a lot of trust. It's like opening your doors and rolling out the welcome mat. But to quote Laurence...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Cloud and Infrastructure

The trade-offs of data sovereignty 

The trade-offs of data sovereignty 

The increasingly common requirement for data not to leave a country or bloc has some important implications for cloud and data centre providers

David Friend
clock 15 August 2022 • 4 min read
Heneghan has a mandate to look after technology across KPMG, but the role could be very different at another company - definitions are sorely lacking

Don't rely on the CIO to transform a company, says KPMG's Lisa Heneghan

The KPMG CDO speaks about blending business and tech; the importance of delegation; and why your current CTO might be your next CEO

Tom Allen
clock 12 August 2022 • 4 min read
Entrants on the list earned their spot for a variety of reasons

Computing announces the UK's most influential IT leaders

Whether a CIO, CTO, director, head or lead, these people are going above and beyond the call of duty

Tom Allen
clock 11 August 2022 • 2 min read