• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Obama Administration Creates Cyber Czar to Secure IT Infrastructure

    June 1, 2009 Timothy Prickett Morgan

    It looks like the politicians have finally figured out how important–and how vulnerable–America’s digital infrastructure is. Last Friday, the Obama Administration said that it would be creating a “cyber czar” Cabinet-level position to help better secure government and private IT infrastructure. The edges between these, as you all know, has been blurred by the Big Gray Cloud, or the InterTubes, or whatever you want to call it. (OK, the Internet.)

    In his remarks to the press, President Obama made his concern over security IT assets clear by coming clean on the fact that his presidential campaign had been hacked. “It’s no secret that my presidential campaign harnessed the Internet and technology to transform our politics,” Obama said in his statement announcing the formation of the cyber czar position. “What isn’t widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising Website was untouched. [Laughter.] So your confidential personal and financial information was protected. But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA, with the FBI, and the Secret Service, and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths–in our case, our ability to communicate to a wide range of supporters through the Internet–could also be one of your greatest vulnerabilities.”

    (You can read President Obama’s full remarks at this link.)

    Obama also admitted that thousands of U.S. military systems had been infected with malware through the use of thumb flash drives, and said that enough is enough. To that end, the National Security Council and the Homeland Security Council have been instructed to do a top-to-bottom review of Uncle Sam’s IT security and the information and communications networks on which the country depends for our lives and jobs. And he added that he would be personally picking the new Cybersecurity Coordinator, who will orchestrate IT security for Uncle Sam as well as interfacing with the Office of Management and Budget to make sure security doesn’t get back-burnered when cuts have to be made. The big goal is to get Federal and state governments as well as the public and private companies that run the zillions of nodes on the Internet to provide coordinated countermeasures to attacks on the Internet when they occur.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 21 -- June 1, 2009

    Sponsored by
    FalconStor

    Simplify Secure Offsite Data Protection for IBM Power with FalconStor Habanero™

    IBM i teams are under growing pressure to ensure data is protected, recoverable, and compliant—without adding complexity or disrupting stable environments.

    FalconStor Habanero™ provides secure, fully managed offsite data protection purpose-built for IBM Power. It integrates directly with existing IBM i backup tools and processes, enabling reliable offsite copies without new infrastructure, workflow changes, or added operational overhead.

    By delivering and managing the service end-to-end, FalconStor helps organizations strengthen cyber resilience, improve disaster recovery readiness, and meet compliance requirements with confidence. Offsite copies are securely maintained and available when needed, supporting recovery, audits, and business continuity.

    FalconStor Habanero offers a straightforward way to modernize offsite data protection for IBM i: focused on simplicity, reliability, and resilience.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Clarification on IBM’s Power Systems Withdrawals IBM Sues to Stop Exec from Getting a Dell (Paycheck)

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 21

This Issue Sponsored By

    Table of Contents

    • IBM Makes the Case for Power Systems SSDs
    • Server Sales Breakdown Bigtime in the First Quarter
    • COBOL at 50: Same Age as Barbie, But More Like Rodney
    • Why Are Systems Programmers Always To Blame?
    • OCEAN Conference Emphasizes Higher Education, Lower Fees
    • Clarification on IBM’s Power Systems Withdrawals
    • Obama Administration Creates Cyber Czar to Secure IT Infrastructure
    • IBM Sues to Stop Exec from Getting a Dell (Paycheck)
    • Looks Like It Will be i 7 for that Future Release
    • IBM Kicks in $5 Billion in Financing to Chase Stimulus Projects

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Bob 1.0 Users Bugged By Lack Of One Feature
    • Here Come The AI-Based Code Modernization Offerings
    • Guru: Cohesion First – What A Procedure Should Be Responsible For
    • IBM Offers Trade-Ins On Storage To Grease The Upgrade Skids
    • IBM i PTF Guide, Volume 28, Number 14
    • What IBM i Ideas Are Cooking In IBM’s Ideas Portal?
    • Early Bob Excels In Medhost IBM i Tryout
    • Counting The Cost Of AI Inference – And Projecting It Far Out
    • IBM i PTF Guide, Volume 28, Number 13
    • The Next Generation Of IBM i Talent in GenAI Action

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle