Feeds

Trustworthy Computing does Moon Walk (but not yet)

One small step for man, one giant leap for Windows XP

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Microsoft's Chief Security Strategist today compared the company's Trustworthy Computing initiative to the race to put the first man on the Moon.

Speaking at the UK first e-crime conference in London, Scott Charney raised eyebrows by comparing Microsoft's attempts to develop more secure products with NASA's Apollo Moon landing programme.

"I'd equate our Trustworthy Computing programme to Kennedy's pledge at the beginning of the Sixties to go to send a man to the Moon. Both are going to take quite a bit of time," he told delegates.

Responding to a question on the roles of government and private industry in promoting Net security, Charney said the industry as a whole must do more to deliver secure products and services. In a candid assessment he outlined the many steps MS needs to take to deliver on Bill Gates' Trustworthy Computing initiative.

"We need to look at the underlying protocols as well as actual products. It could take years," he said.

"A lot of fundamental work needs to be carried out in protocols, mechanisms, Public Key Infrastructures and security usability."

Making parallels between Trustworthy Computing and one of America's most expensive projects could be considered by some as hubris, but we liked Charney's candour. Unusually for someone in any software vendor, Charney has an extensive security background.

Charney joined Microsoft after a stint as a security consultant with PricewaterhouseCoopers. Prior to joining PWC, Charney served as the chief of the Computer Crime and Intellectual Property Section, Criminal Division, at the US Department of Justice, from 1991 to 1999. ®

Related Stories

Security 'impossible' for Win9x, buy XP now, says MS exec
Microsoft outlines 3D progress to Trustworthiness
Of TCPA, Palladium and Werner von Braun

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.