Americas

  • United States

Asia

Oceania

Exactly how biased am I?

Opinion
Feb 20, 20073 mins
Data and Information Security

I’ve expect that as soon as we get into any meaty and interesting discussions, my current place of employment (Microsoft) will come into play, combined by assertions that I must be biased. It is fairly predictable, so I thought it might be interesting to just pre-empt it and open the question myself.

I’ve been a Director at Microsoft for a little over four years now, in the security group that works to drive security improvement across the company. For that alone, some may condemn me, so let’s dig into it.

In the engineering program at Purdue University, we all used Unix accounts and to this day, my fingers remember the key “vi” editing commands. My workstation and development platform for my first four years of work was a Sun workstation. Working from home after that, I used Slackware Linux as my primary workstation for two years starting in 1994. When we turned the TISFirewall Toolkit into the Gauntlet firewall, we did it on the BSD/OS.  (BTW, does anybody remember how “fun” it was to get two ethernet cards working on BSD?) Basically, I’ve used and done security analysis on most common operating systems over the past 20 years – even some uncommon and interesting proprietary ones by Unisys, Tandem and HP. In fact, over 75% of my security career came before Microsoft.

How did I end up at Microsoft? Let’s go back in time five years. At that point, it was commonly accepted by most people that Microsoft had some security problems. In contrast, most folks thought the Unix and Linux community (and vendors) historically had a better approach to security and would build on that. Around that time, I got a call from a respected former colleague (Steve Lipner), who convinced me that Microsoft management was committed to improving security across the company and was taking real steps to do it. I was skeptical, but ultimately convinced enough to join – where better to have real impact in computer security?

Still, I like to be practical about security. Does your team have deep Unix skills and no experience on Windows? If so, your risk will be better managed on some sort of Unix system, regardless of whether Microsoft security is better, worse or indifferent.

So, I’ve been around security a while and in the past four years I’ve personally participated in steps at Microsoft that, in my mind, are resulting in improved security for customers. Is it perfect? No. Are the products much better than predecessors? Certainly so. Is security improvement happening on Linux and Unix? Definitely. Who is doing better? Ah, that brings us back to the question doesn’t it – by what metric?

Am I biased? I do not think so, but let’s just all keep assuming I am, because I don’t mind. If I make comparisons, I’ll lay out my metrics. I’ll lay out my assumptions. I’ll describe the methodology. Then, if you want to dispute the results, debate the assumptions, or critique the methodology, I’ll ask the same of you. Regardless of the outcome, all sides will get presented, progress is made and that’s a win for interested readers.

Best regards ~ Jeff

Jeff Jones is a 24-year security industry professional that has spent the last several years at Microsoft helping drive security and privacy progress as part of the Trustworthy Computing group. In this role, Jeff draws upon his security experience to work with enterprise CSOs and Microsoft's internal security teams to drive practical and measurable security improvements into Microsoft process and products. Prior to Microsoft, Jeff was the vice president of product management for security products at Network Associates where his responsibilities included PGP, Gauntlet and Cybercop products, and several improvements in the McAfee product line. These latest positions cap a career focused on security, managing risk, building custom firewalls and being involved in Darpa security research projects while part of Trusted Information Systems. Jeff is a frequent global speaker and writer on security topics ranging from the very technical to more high level, CxO-focused topics such as Security TCO and metrics. Jeff is also a contributor the Microsoft Security Blog (http://blogs.technet.com/security) and writes on a wide range of personal interests (e.g. books, poker, gaming) at http://securityjones.com.