Transforming information security : optimizing five concurrent trends to reduce resource drain

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between thes...

Full description

Saved in:
Bibliographic Details
Main Author Moriarty, Kathleen M. (Author)
Format Electronic eBook
LanguageEnglish
Published Bingley, U.K. : Emerald Publishing Limited, 2020.
Subjects
Online AccessFull text
ISBN9781839099304
9781839099281
DOI10.1108/9781839099281
Physical Description1 online resource (256 pages) ; cm

Cover

Table of Contents:
  • Chapter 1. Interconnected trends
  • Chapter 2. Board level program evaluation and guidance
  • Chapter 3. Architect a secure network with less
  • Chapter 4. Encryption
  • Chapter 5. Transport evolution: The encrypted stack
  • Chapter 6. Authentication and authorization
  • Chapter 7. The end point
  • Chapter 8. Incident prevention, detection, and response
  • Chapter 9. Looking forward.