Access "Editor’s desk: A chat with Peter G. Neumann"
This article is part of the May 2013 / Volume 15 / No. 4 issue of Compliance and risk modeling
We are honored this month to feature a Q&A with security pioneer Peter G. Neumann, who has logged more than 40 years at non-profit SRI International’s Computer Laboratory in Palo Alto, Calif., researching computer security platforms and trustworthy systems. Neumann is interviewed by fellow security system design expert and ISM columnist, Marcus Ranum, who shares similar views on the need for clean-slate architectures and a do-over on security to prevent unreliable systems and short-term solutions to far-sighted security problems. After 60 years in the industry, Neumann is still at it; working on clean-slate architectures with Robert N. Watson of Cambridge University’s Computer Laboratory, who developed Capsicum (POSIX API), which supports “object-like” security on Unix-like operating systems. Incremental adoption by developers is the way forward, Neumann told Ranum. “Capsicum and our current workshow that clean-slate architectures need not throw away everything and start from scratch, but rather that there are some evolutionary paths, if we can ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Editor’s desk: A chat with Peter G. Neumann
by Kathleen Richards
Peter G. Neumann shares his thoughts on the inherent complexity of trustworthiness and the evolutionary promise of clean-slate architectures.
-
Apple security update: Is it ready for the enterprise?
by Karen Scarfone
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior.
-
Editor’s desk: A chat with Peter G. Neumann
by Kathleen Richards
-
-
Reframing compliance with a threat model
by Tony UcedaVelez
Too many compliance programs miss the mark. Tony UcedaVelez explains how leveraging a threat model can re-energize your strategy.
-
Data breach protection requires new barriers
by Ernie Hayden, Contributor
Assumption of breach is the new norm. Can this shift help organizations build better levels of data breach protection?
-
Reframing compliance with a threat model
by Tony UcedaVelez
-
Columns
-
Marcus Ranum: Q&A with clean-slate pioneer Peter G. Neumann
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with clean-slate luminary Peter G. Neumann of SRI International and formerly Bell Labs.
-
IT security education climbs the corporate ladder
by Doug Jacobson and Julie A. Rursch
Managers need more training about technical security threats and input into IT policies that threaten productivity.
-
Marcus Ranum: Q&A with clean-slate pioneer Peter G. Neumann
by Marcus Ranum
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...