Автор: Kathleen M. Moriarty
Издательство: Emerald Publishing Limited
Год: 2020
Страниц: 136
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.
Let's face it, information security is much more difficult than it needs to be, and this transformational period for protocols should be seen as an opportunity to fix these issues. The focus on this forward-looking strategic view is primarily considering the tremendous deficit in information security professionals will never be filled through training. The current set of security solution architectures involving middleboxes are geared toward the top 1% of organizations that can afford to hire multiple information security professionals. The other aspect of this strategic vision includes the goal of a truly improved and intrinsically more secure network environment. Envision a fully encrypted and authenticated network with functions better performed at scale where collective knowledge is strategically and carefully applied. As it has come to be an acceptable outcome in the Internet of Things (IoT) space, envision elemental services from end point vendors to prevent, detect, and thwart threat actors leveraging collective knowledge on patterns and behaviors through the use of artificial intelligence and machine learning applied back to your systems to better scale incident detection and response.
Скачать Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain