Transforming Information Security, Kathleen M. Moriarty
Transforming Information Security, Kathleen M. Moriarty
List: $19.95 | Sale: $13.97
Club: $9.97

Transforming Information Security
Optimizing Five Concurrent Trends to Reduce Resource Drain

Author: Kathleen M. Moriarty

Narrator: Kathleen M. Moriarty

Unabridged: 7 hr 24 min

Format: Digital Audiobook Download

Published: 07/04/2025


Synopsis

Security has been designed for well resourced organizations, and thus falls short for 90% of organizations who lack the necessary resources to manage security at scale. Security built-in by design and by default provides a leap for these organizations. However, we must also use architectural patterns that scale to better meet the needs of these organizations. Learn more on why we are at a. critical junction to make this shift and how to consider architectural patterns that scale in product design and selection.The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Reviews

Goodreads review by Ben on September 30, 2020

Often the answers we need are in front of us. For example, SIM swapping is one of the most common attacks on IoT devices over the past five years. Many things can be done such that SIM swapping is of no use to attackers. If the cell carriers got more serious about removing the SIM from the equation,......more

Goodreads review by Martha on December 27, 2022

Transforming Information Security is one of those stellar works that only arrive rarely in the business world. The technical aspects and future threat trends are described with a level of insight and clarity that facilitates comprehension not only by technical readers, but also by members of the exe......more

Goodreads review by Patty Arcano on March 11, 2023

A Must Read for Executives in INFOSEC Ms. Moriarty brings her vast experience and knowledge of this subject in a manner relevant not just to the IT Specialist but the corporate Executive as well. By breaking this very complex subject into 5 trends Ms. Moriarty provides an extensive education in an en......more