Transforming information security : optimizing five concurrent trends to reduce resource drain
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between thes...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Bingley, U.K. :
Emerald Publishing Limited,
2020.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781839099304 9781839099281 |
| DOI | 10.1108/9781839099281 |
| Physical Description | 1 online resource (256 pages) ; cm |
Cover
Table of Contents:
- Chapter 1. Interconnected trends
- Chapter 2. Board level program evaluation and guidance
- Chapter 3. Architect a secure network with less
- Chapter 4. Encryption
- Chapter 5. Transport evolution: The encrypted stack
- Chapter 6. Authentication and authorization
- Chapter 7. The end point
- Chapter 8. Incident prevention, detection, and response
- Chapter 9. Looking forward.