Oral history interview with Stephen Walker

Loading...
Thumbnail Image

View/Download File

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral history interview with Stephen Walker

Published Date

2012-11-08

Publisher

Charles Babbage Institute

Type

Oral History

Abstract

Steve Walker, a computer security pioneer and entrepreneur, began his career at the National Security Agency, before becoming a manager at ARPA’s Information Processing Techniques office in the first half the 1970s. He later served in the Office of the Secretary of Defense as an expert on computer security and organized key early meetings of some of the nation’s foremost computer security experts that were held at the National Bureau of Standards. In the early 1980s Walker’s career took an entrepreneurial turn as he founded Trusted Information Systems. This company became one of the earliest and most important computer security services and software products firms – producing Trusted Xenix and pioneering the firewall area of the computer security software industry. After TIS was sold, Walker worked for a number of years as an IT venture capitalist. Walker discusses his days at NSA, ARPA's IPTO, OSD, and his leadership of Trusted Information Systems in this interview. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Description

Transcript, 45 pp.

Related to

Replaces

License

Series/Report Number

Funding information

National Science Foundation, Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

Stephen Walker, OH 409. Oral history interview by Jeffrey R. Yost, 8 November 2012, Glenwood, MD. Charles Babbage Institute, University of Minnesota, Minneapolis. http://purl.umn.edu/144021

Suggested citation

Walker, Stephen. (2012). Oral history interview with Stephen Walker. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/144021.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.