Oral history interview with Stephen Walker
2012-11-08
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Oral history interview with Stephen Walker
Authors
Published Date
2012-11-08
Publisher
Charles Babbage Institute
Type
Oral History
Abstract
Steve Walker, a computer security pioneer and entrepreneur, began his career at the National Security Agency, before becoming a manager at ARPA’s Information Processing Techniques office in the first half the 1970s. He later served in the Office of the Secretary of Defense as an expert on computer security and organized key early meetings of some of the nation’s foremost computer security experts that were held at the National Bureau of Standards. In the early 1980s Walker’s career took an entrepreneurial turn as he founded Trusted Information Systems. This company became one of the earliest and most important computer security services and software products firms – producing Trusted Xenix and pioneering the firewall area of the computer security software industry. After TIS was sold, Walker worked for a number of years as an IT venture capitalist. Walker discusses his days at NSA, ARPA's IPTO, OSD, and his leadership of Trusted Information Systems in this interview.
This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”
Description
Transcript, 45 pp.
Related to
Replaces
License
Collections
Series/Report Number
Funding information
National Science Foundation, Grant No. 1116862, “Building an Infrastructure for Computer Security History.”
Isbn identifier
Doi identifier
Previously Published Citation
Stephen Walker, OH 409. Oral history interview by Jeffrey R. Yost, 8 November 2012, Glenwood, MD. Charles Babbage Institute, University of Minnesota, Minneapolis. http://purl.umn.edu/144021
Other identifiers
OH 409
Suggested citation
Walker, Stephen. (2012). Oral history interview with Stephen Walker. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/144021.
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.