Transforming information security optimizing five concurrent trends to reduce resource drain

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between thes...

Full description

Bibliographic Details
Main Author: Moriarty, Kathleen M.
Format: eBook
Language:English
Published: Bingley, U.K. Emerald Publishing Limited 2020
Subjects:
Online Access:
Collection: Emerald Business, Management and Economics eBook Collection Archive - Collection details see MPG.ReNa
LEADER 02565nmm a2200313 u 4500
001 EB002139346
003 EBX01000000000000001277473
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230120 ||| eng
020 |a 9781839099304 
050 4 |a QA76.9.A25 
100 1 |a Moriarty, Kathleen M. 
245 0 0 |a Transforming information security  |h Elektronische Ressource  |b optimizing five concurrent trends to reduce resource drain  |c Kathleen M. Moriarty (Dell Technologies, USA) 
260 |a Bingley, U.K.  |b Emerald Publishing Limited  |c 2020 
300 |a 256 pages  |c cm 
505 0 |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward 
505 0 |a Includes bibliographical references 
653 |a Computer security 
653 |a Data encryption / bicssc 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Computers, Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b EMBAR  |a Emerald Business, Management and Economics eBook Collection Archive 
500 |a Includes index 
856 4 0 |u https://doi.org/10.1108/9781839099281  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space