Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

Author:   Kathleen M. Moriarty (Center for Internet Security, USA)
Publisher:   Emerald Publishing Limited
ISBN:  

9781839099311


Pages:   240
Publication Date:   02 July 2020
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $92.00 Quantity:  
Add to Cart

Share |

Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain


Add your own review!

Overview

"The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, ""zero trust networks"", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space."

Full Product Details

Author:   Kathleen M. Moriarty (Center for Internet Security, USA)
Publisher:   Emerald Publishing Limited
Imprint:   Emerald Publishing Limited
Weight:   0.256kg
ISBN:  

9781839099311


ISBN 10:   1839099313
Pages:   240
Publication Date:   02 July 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

Chapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance Chapter 3. Architect a Secure Network with Less Chapter 4. Encryption Chapter 5. Transport Evolution: The Encrypted Stack Chapter 6. Authentication and Authorization Chapter 7. The End Point Chapter 8. Incident Prevention, Detection, and Response Chapter 9. Looking Forward

Reviews

Author Information

Kathleen Moriarty, Chief Technology Officer at the Center for Internet Security, has over two decades of experience. Named in CyberSecurity Venture’s, “Top 100 Women Fighting Cybercrime”, Kathleen served two recent terms as Internet Engineering Task Force (IETF) Security Area Director and member of the Internet Engineering Steering Group (IESG) from March 2014-2018, during her tenure in the Office of the CTO. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List