Premium Content

Access "Ranum Q&A with Aaron Turner: Whitelisting is on enterprise blacklist"

Published: 28 Feb 2014

Why haven't organizations moved away from a "let everything in" model and embraced application whitelisting and execution control? Marcus Ranum talks with mobile security veteran Aaron Turner about the evolution of software restriction policies, from the early initiatives when he worked as a security strategist at Microsoft to the Apple model that is proving effective today. Aaron Turner An entrepreneur, who has launched several security technology companies, Turner is founder and CEO of IntegriCell, an enterprise mobile risk management consultancy. He was formerly head of RFinity, a mobile security startup spun out of the U.S. Department of Energy's Idaho National Laboratory. Marcus Ranum: I'd like to talk about a topic you and I have been over, off and on, for the last decade or so. Back in 2007, I wrote a piece in which I said I thought application whitelisting was the only effective answer to software security, and I've debated the issue with Bruce Schneier a couple of times. Now we are seeing that malware appears to remain unstoppable, but nobody's ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Devising a security strategy for the modern network

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...

  • The big data challenge: What's in store for NoSQL security

    In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...

  • A comprehensive guide to securing the Internet of Things

    As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...