Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

Security has been designed for well resourced organizations, and thus falls short for 90% of organizations who lack the necessary resources to manage security at scale. Security built-in by design and by default provides a leap for these organizations. However, we must also use architectural patterns that scale to better meet the needs of these organizations. Learn more on why we are at a. critical junction to make this shift and how to consider architectural patterns that scale in product design and selection.

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.

In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

1136770253
Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

Security has been designed for well resourced organizations, and thus falls short for 90% of organizations who lack the necessary resources to manage security at scale. Security built-in by design and by default provides a leap for these organizations. However, we must also use architectural patterns that scale to better meet the needs of these organizations. Learn more on why we are at a. critical junction to make this shift and how to consider architectural patterns that scale in product design and selection.

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.

In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

19.95 In Stock
Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

by Kathleen M. Moriarty

Narrated by Kathleen M. Moriarty

Unabridged — 7 hours, 24 minutes

Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain

by Kathleen M. Moriarty

Narrated by Kathleen M. Moriarty

Unabridged — 7 hours, 24 minutes

Audiobook (Digital)

$19.95
FREE With a B&N Audiobooks Subscription | Cancel Anytime
$0.00

Free with a B&N Audiobooks Subscription | Cancel Anytime

START FREE TRIAL

Already Subscribed? 

Sign in to Your BN.com Account


Listen on the free Barnes & Noble NOOK app


Related collections and offers

FREE

with a B&N Audiobooks Subscription

Or Pay $19.95

Overview

Security has been designed for well resourced organizations, and thus falls short for 90% of organizations who lack the necessary resources to manage security at scale. Security built-in by design and by default provides a leap for these organizations. However, we must also use architectural patterns that scale to better meet the needs of these organizations. Learn more on why we are at a. critical junction to make this shift and how to consider architectural patterns that scale in product design and selection.

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.

In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.


Product Details

BN ID: 2940195386023
Publisher: Emerald Publishing Ltd.
Publication date: 07/04/2025
Edition description: Unabridged
From the B&N Reads Blog

Customer Reviews