Search For:

Displaying 1-4 out of 4 total
Information Assurance Technology Forecast 2008
Found in: IEEE Security and Privacy
By Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo
Issue Date:January 2008
pp. 16-23
A virtual roundtable (featuring panelists Steven Bellovin, Terry Benzel, Bob Blakely, Dorothy Denning, Whitfield Diffie, Jeremy Epstein, and Paulo Verissimo) discussing the next 15 years in computer security.
 
Crossing the Great Divide: From Research to Market
Found in: IEEE Security & Privacy
By Terry V. Benzel,Eric O'Brien,Robert Rodriguez,William Arbaugh,John Sebes
Issue Date:March 2013
pp. 42-46
A successful technologist who transferred from within, a start-up company founder who moved from university research to Microsoft, a venture investor, and an open source evangelist gathered recently for a roundtable discussion with guest editor Terry V. Be...
 
Crossing the Great Divide: Transferring Security Technology from Research to the Market
Found in: IEEE Security & Privacy
By Terry V. Benzel,Steve Lipner
Issue Date:March 2013
pp. 12-13
The challenges of transferring cybersecurity technologies are varied and span a wide range from detailed technical issues to market, sales, and production issues. It often seems that there is an art to successfully crossing the great divide. Are there cybe...
 
Systemic Security Management
Found in: IEEE Security and Privacy
By Laree Kiely, Terry V. Benzel
Issue Date:November 2006
pp. 74-77
In 2005, the University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP seeks to close the gap between the current corporate cybersecurity risk pr...
 
 1