• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Obama Administration Creates Cyber Czar to Secure IT Infrastructure

    June 1, 2009 Timothy Prickett Morgan

    It looks like the politicians have finally figured out how important–and how vulnerable–America’s digital infrastructure is. Last Friday, the Obama Administration said that it would be creating a “cyber czar” Cabinet-level position to help better secure government and private IT infrastructure. The edges between these, as you all know, has been blurred by the Big Gray Cloud, or the InterTubes, or whatever you want to call it. (OK, the Internet.)

    In his remarks to the press, President Obama made his concern over security IT assets clear by coming clean on the fact that his presidential campaign had been hacked. “It’s no secret that my presidential campaign harnessed the Internet and technology to transform our politics,” Obama said in his statement announcing the formation of the cyber czar position. “What isn’t widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising Website was untouched. [Laughter.] So your confidential personal and financial information was protected. But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA, with the FBI, and the Secret Service, and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths–in our case, our ability to communicate to a wide range of supporters through the Internet–could also be one of your greatest vulnerabilities.”

    (You can read President Obama’s full remarks at this link.)

    Obama also admitted that thousands of U.S. military systems had been infected with malware through the use of thumb flash drives, and said that enough is enough. To that end, the National Security Council and the Homeland Security Council have been instructed to do a top-to-bottom review of Uncle Sam’s IT security and the information and communications networks on which the country depends for our lives and jobs. And he added that he would be personally picking the new Cybersecurity Coordinator, who will orchestrate IT security for Uncle Sam as well as interfacing with the Office of Management and Budget to make sure security doesn’t get back-burnered when cuts have to be made. The big goal is to get Federal and state governments as well as the public and private companies that run the zillions of nodes on the Internet to provide coordinated countermeasures to attacks on the Internet when they occur.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 21 -- June 1, 2009

    Sponsored by
    Midrange Dynamics North America

    Accelerate Change & Integration on IBM i

    Good change management unites IBM i and open systems development for productive collaboration. Developers work with their preferred tools and IDEs. Ultimate version control and traceability mean fast bug fixes and less stress. Rollback to a stable version in seconds.

    Change management gives managers, operations teams, and auditors the visibility they need, and developers can focus on what they like best: building great applications.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    COMMON Europe Needs Your Input on Top i Concerns OpenSpan Aims to Bring Mainframe Qualities to Desktop Integration

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 21

This Issue Sponsored By

    Table of Contents

    • IBM Makes the Case for Power Systems SSDs
    • Server Sales Breakdown Bigtime in the First Quarter
    • COBOL at 50: Same Age as Barbie, But More Like Rodney
    • Why Are Systems Programmers Always To Blame?
    • OCEAN Conference Emphasizes Higher Education, Lower Fees
    • Clarification on IBM’s Power Systems Withdrawals
    • Obama Administration Creates Cyber Czar to Secure IT Infrastructure
    • IBM Sues to Stop Exec from Getting a Dell (Paycheck)
    • Looks Like It Will be i 7 for that Future Release
    • IBM Kicks in $5 Billion in Financing to Chase Stimulus Projects

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • To Comfort The Afflicted And Afflict The Comfortable
    • How FalconStor Is Reinventing Itself, And Why IBM Noticed
    • Guru: When Procedure Driven RPG Really Works
    • Vendors Fill In The Gaps With IBM’s New MFA Solution
    • IBM i PTF Guide, Volume 27, Number 27
    • With Power11, Power Systems “Go To Eleven”
    • With Subscription Price, IBM i P20 And P30 Tiers Get Bigger Bundles
    • Izzi Buys CNX, Eyes Valence Port To System Z
    • IBM i Shops “Attacking” Security Concerns, Study Shows
    • IBM i PTF Guide, Volume 27, Number 26

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle